Peraton Labs is seeking an experienced Senior Research Scientist to join our team supporting fully cleared research efforts for our Maryland customer. You will work on cutting-edge research and development projects in a collaborative and innovative team environment and will be instrumental in solving the most complex challenges in a broad range of initiatives in computer network defense, secure-by-design techniques, and cyber operations and experimentation platforms. Your expertise and areas of interest may be applied on one or more programs, providing you numerous opportunities to learn and grow.
GEF Capability Management. Provide the following capability management functions to enable and ensure that the IT systems are controlled, balanced, and aligned to Enterprise needs:
• Provide draft Project Schedules, Implementation Plans, Information System Support Plans and Project Spend Plans for NETCOM Capability Manager approval.
• Schedule project meetings, provide project management, and support services for NETCOM while providing recommendations for classified and unclassified environments and integration services in coordination with Government personnel to support and implement Enterprise initiatives. These services include support to the following: Enterprise Fabrics, Data Center, Management Services, Network (routing, switching,...
Cyber Protection, Assessment and Authorization, and Risk Management Framework (RMF). Provides cybersecurity functional support for assessments, authorizations, and documentation Enterprise-fielded systems managed by NETCOM HQ. Efforts include using the Enterprise Mission Assurance Support Service (eMASS) to record RMF activities such as control implementation of all applicable security controls as identified via information system security categorization in accordance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and Committee on National Security Systems Instructions (CNSSI) 1253. The number of families and controls will vary depending on the security categorization, the application of overlays (privacy, classified,...
Cyber Protection, Assessment and Authorization, and Risk Management Framework (RMF). Provides cybersecurity functional support for assessments, authorizations, and documentation Enterprise-fielded systems managed by NETCOM HQ. Efforts include using the Enterprise Mission Assurance Support Service (eMASS) to record RMF activities such as control implementation of all applicable security controls as identified via information system security categorization in accordance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and Committee on National Security Systems Instructions (CNSSI) 1253. The number of families and controls will vary depending on the security categorization, the application of overlays (privacy, classified,...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Model-Driven DevOps for Scaled Brownfield Network Automation....
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Sensor Operation and Management. The GCC uses network and host monitoring systems (IPS/IDS, SIEM, and other sensor systems) to monitor, detect, identify, verify, and report security events. Support the Government by installing, maintaining, deploying, managing, and hardening multiple types of...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Sensor Operation and Management. The GCC uses network and host monitoring systems (IPS/IDS, SIEM, and other sensor systems) to monitor, detect, identify, verify, and report security events. Support the Government by installing, maintaining, deploying, managing, and hardening multiple types of...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Virtualization Management / SAN / Backup. The GCC operates, maintains, secures, and monitors Virtual Infrastructure (VI) internally and within Enterprise virtual systems owner environments. The GCC uses various cloud and cloud computing services. Most virtual environments are Private Cloud...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Enterprise Protected Domain Name Service (EP-DNS). The GCC manages...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Directory Services. The GCC operates, maintains, secures, and troubleshoots authentication and directory services IAW system owner policies and guidance. Manage, sustain, and deploy authentication, directory, ands policy services in support of the GCC AOR, Army Unified Directory Services...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Enterprise Protected Domain Name Service (EP-DNS). The GCC manages...
Portal Development and Maintenance. Performs the below functions in support of the Government’s SharePoint requirements.
• Design, develop, and implement, SharePoint portals supporting NETCOM-wide business processes and information sharing requirements.
• Design, develop, and implement automated workflows based on Government requirements.
• Design and develop web sites, web pages, web parts and custom list solutions based on Government requirements.
The Knowledge Management (KM) Section is responsible for enabling knowledge flow to enhance a shared understanding, learning, and decision-making across the GCC. The KM section develops, executes, and monitors the GCC KM Program. Additionally, the KM Section conducts Content and Information Management, and Records Management, through the utilization of tools such as ARIMS, SharePoint Online, Microsoft Teams, Microsoft OneDrive, and other cloud and on premises solutions, in line with Army doctrine. The KM Section consists of the KM Working Group (KMWG) with representatives from each of the GCC divisions, and is lead by the KM Officer (KMO). All GCC KM efforts are authorized, overseen, and guided by the GCC Chief Knowledge Officer (CKO), the Deputy Director.
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Network Services. The GCC defends the DoDIN-A by secure operation...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Network Services. The GCC defends the DoDIN-A by secure operation...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Sustainment Division Support. The Sustainment Division provides GCC mission services to improve the efficiency and effectiveness of operational support services for both the GCC and the Warfighter. The Sustainment Division provides foundational services such as continual process improvement, cost control, mission planning, and opportunities for organizational efficiencies which include development of tools, asset management (HW/SW) for LCM and property accountability and security control to protect GCC CONUS managed DODIN-A services (NIPRNet and SIPRNet).
• Cyber and Physical Security Services. Perform cybersecurity services to secure DODIN-A information systems and networks (NIPRNet, SIPRNet) as dictated by AR 25-2, AR 380-5, AR 190-13, and all other...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Peraton is seeking a Contracts Administration, Advisor to join our Cyber Solutions Business Unit within the Cyber Mission Solutions (CMS) Sector. The Contracts Administrator would be responsible for:
- Manage a portfolio of contract of various contract types, complexities, and sizes monitor invoices/budgets against contracts and mitigate cost overruns
- Ensure project compliance with government contracting...
As our Cyber Software Engineer you will have the opportunuty to:
- Implement, test, and operate advanced software security techniques in compliance with technical reference architecture.
- Perform on-going security testing and code review to improve software security.
- Troubleshoot and debug issues that arise.
-
Peraton is looking for a Senior Software Engineer to join our Cyber Intel team here in Laurel, MD! In this role, you will have the opportunity to support a program that provides Cyber Security and Data Management to critical Intelligence Community missions. Our software engineers are responsible for, but not limited to, the below tasks:
- Implements, tests, and operates advanced software security techniques in compliance with technical reference architecture
- Performs on-going security testing and code review to improve software security
- Troubleshoots and debugs issues that...
Responsibilities:
The Cyber Software Engineering, Senior Advisor implements, tests, and operates advanced software security techniques in compliance with technical reference architecture. Performs on-going security testing and code review to improve software security. Troubleshoots and debugs issues that arise. Provides engineering designs for new software solutions to help mitigate security vulnerabilities. Contributes to all levels of the architecture and maintains technical documentation. Consults team members on...
Responsibilities:
The Cyber Systems Engineering, Senior Advisor monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision. Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs. Establishes a framework by which cyber risk can be measured and quantified in the marketplace. Determines security requirements by evaluating business...
As our Cyber Systems Engineer you will have the opportunity:
- Monitor, analyize, and detect cyber events and incidents within information systems and networks under general supervision.
- Assist with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs.
- Establish a framework by which cyber risk can be measured and quantified in the marketplace.
-
As our Cyber Systems Engineer you will have the opportunity:
- Monitor, analyize, and detect cyber events and incidents within information systems and networks under general supervision.
- Assist with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs.
- Establish a framework by which cyber risk can be measured and quantified in the marketplace.
-
Peraton has an immediate opportunity for a Cloud Software Engineer to join our Cyber Intel team here in Laurel, MD! As a Cloud Software Engineer, you are expected to perform requirements analysis, software development, installation, integration, evaluation, enhancement, maintenance, testing, andproblem diagnosis/resolution at a high level of proficiency and independence. You are expected to communicate directions and provide guidance to more junior programmer/analysts, as required. Cloud Software Engineers must be adept at developingsolutions which integrated or extended COTS or GOTS products. Additionally, Software Engineers may be responsible for evaluating project needs, determining tasks and durations,and generating and reviewing...
Peraton is seeking a seasoned Systems Engineer to join our Cyber Intel team here in Laurel, MD. In this role, you will get the opportunity to help support our program that provides cyber security and data management to critical intelligence community national security missions. As a Systems Engineer on our team, you will be responsible for, but not limited to, the below tasks:
- Monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision
- Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous...
As our Cyber Systems Engineer you will have the opportunity to:
- Monitor, analyize, and detect cyber events and incidents within information systems and networks under general supervision.
- Assist with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs.
- Establish a framework by which cyber risk can be measured and quantified in the marketplace.
-
Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most...
As a Cloud Network / Systems Engineer, you will play a key role in designing, building, and optimizing cutting-edge cloud-based network solutions that power mission-critical operations. This role offers an exciting opportunity to:
- Collaborate closely with customers to review and refine their requirements, ensuring seamless integration of advanced network systems that drive mission success.
-
Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most...
Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most...
Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most...
Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most...
Peraton’s Cyber Mission supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. We deliver unique intelligence, analytics, and data management solutions to address the world’s most difficult challenges.
Peraton’s Cyber Mission supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. We deliver unique intelligence, analytics, and data management solutions to address the world’s most difficult challenges.
Peraton’s Cyber Mission supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. We deliver unique intelligence, analytics, and data management solutions to address the world’s most difficult challenges.
The Technical Targeting Analyst (TTA) will provide mission critical support to the Intelligence Community (IC) by reviewing, analyzing, and responding to requests for a variety of analytic products covering a wide spectrum of topics relevant at the national and global level. The successful TTA candidate will leverage critical thinking and an entrepreneurial mindset in data exploitation, processing, and visualization, and be capable of independently leveraging collection to drive follow-on efforts. All team members are expected to positively support a blended government and contractor team environment through excellent verbal and written communications skills.