Job Listings

Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.

 

Click here to view telework/hybrid opportunities.

 

Click here for full remote opportunities.

Use this form to perform another job search

The system cannot access your location for 1 of 2 reasons:
  1. Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
  2. Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort

Search Results Page 7 of 22

Job Locations US-DC-Washington
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 4:19 PM)
Peraton is seeking Security Operations Center (SOC) Analysts to join our team of qualified and diverse individuals to identify, analyze, and report events within a cloud environment, providing cybersecurity monitoring and alerts.   What you’ll do:   The SOC Analyst's will  also be responsible for the following but not limited to: - Conduct an analysis of current operations of the SOC, analyze how the work is being done, review alerts, and SOPs to make recommendations for proposed changes and improvements to SOC operations and response metrics. - Develop and execute an Incident Response Plan and SOC Playbook. - Utilize the authorized security tools to perform security analysis and triage security alerts and events to prevent, detect, contain, and remediate security and privacy incidents. - Identify, analyze, triage, report, and coordinate with CSIRT and other stakeholders to remediate all information security incident types. - Utilize the authorized Security Tool Set) to perform security analysis and triage security alerts and events to prevent, detect, contain, and remediate security and privacy incidents. - Coordinate with the SIEM team to create and maintain security dashboards. - Report all information security incidents through the proper authority. - Investigate and positively identify anomalous events that are detected by security devices. or reported to the SOC from external entities, system administrators, and the user community, via security monitoring platform and tools, incoming phone calls, emails, and the Service Desk and Incident Tracking System. - Conduct monitoring and analysis activities - Utilize network-based intrusion detection systems and other Security Information tools such as Event Management solutions (SIEM/Splunk) and Network Security Management solutions (such as Skybox Security, CISCO IPS/IDS, and Nessus) for the assessment, identification, and remediation of the incidents. - Support Incident Management and Response requirements across the security incident lifecycle phases. - Perform ad-hoc searches for suspect activity and reverse engineering of malicious software. - Provide investigation, review, and recommendation documentation as necessary. - Support development of reports and documentation including SOC Improvement Plan, Security Incident Reports, Program Status Report with reporting against Objectives and SLAs, Shift Change Reports, Measurable Activities Report (WAR), SOC Playbook updates,Incident Escalation Reports, daily Monitoring Reports - Cross-train with Network O&M/Telephony/Mobile Computing Management to assist the monitoring of all communications connectivity (e.g., VSAT, DTS-PO, VPN, SD-WAN, MPLS, and TICs), as well as the devices that terminate communications links, to ensure uninterrupted communications and in the event of a failure, provide rapid identification and resolution of problems per defined SLAs. - Monitor the wireless network infrastructure; networks used by software development teams; bandwidth utilization and availability of communications links; and LAN device security logs, identifying and ascertaining the nature of potential security violations, and protocol configuration, route table maintenance, and alternate path mechanisms.                                     This role is contingent upon contract award. 
Requisition ID
2024-145517
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 12:49 PM)
Peraton is seeking an experienced Cybersecurity Engineer to join our USCYBERCOM team.   Location: Fort Meade, MD.   In this role you will: - Possess an in-depth understanding and the ability to apply intermediate concepts of cyber engineering and cybersecurity. - Maintain in-depth knowledge and understanding of the DoD cybersecurity policies and the Risk Management Framework. - Independently conduct cybersecurity engineering research and analysis, provide recommendations for the implementation of security mechanisms, and provide advise or counsel on recommended cybersecurity practices and requirements. - Contribute substantive content to the development of cybersecurity documentation, concept papers, and test plans required by Command policies and the Risk Management Framework. - Maintain comprehensive knowledge and understanding of DoD and/or Intelligence Community (IC) engineering efforts, across multiple engineering disciplines. - Independently evaluate functional operation and performance, and based on test results and inspections, make recommendations regarding C&A. - Be the liaison between the operators, the developers and the system engineers; ensure compliance with DoD and NIST requirements. - Assess infrastructure requests; provide recommendations and guidance on development.
Requisition ID
2024-145510
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Chantilly
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 12:46 PM)
Peraton is seeking a Senior Systems Engineer in our Chantilly, VA office in support of our Department of Defense (DoD) Community customer as part of a highly talented, highly motivated and high-performing team. As part of the systems engineering team you will support an exciting program which involves design, development, test, and deployment of an exciting and complex system in an Agile construct to contribute to mission success for a variety of stakeholders.  Join us and be part of the next generation of innovators as we blaze a trail forward for our profession and company.   What you'll do: - Work closely with DoD customer and stakeholders throughout system lifecycle in development, integration & test, deployment, and operations of a highly sophisticated ground system architecture. - Help build mission-critical, highly available, high-performance networked systems in a team-oriented environment. - Develop systems engineering-related documentation to include operational concept, requirements, specifications, interface control documents, and validation & verification plans. - Conduct system planning and design for expansion of these resources to meet program needs. - Support ground system related trade studies.
Requisition ID
2024-145507
Telecommute Options
No remote/telework allowed
Job Locations US-GA-Fort Gordon
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 2:21 PM)
Peraton seeks a Multi-Cloud Application Developer for Development Security Operations (DevSecOPs) Services.  Location:  Fort Eisenhower, GA.  In this role, you will be a critical member of the team responsible for developing, integrating, and maintaining a suite of DevSecOps tools and applications across a multi-cloud and on-premises environments. This role focuses on creating software solutions that enhance the efficiency, security, and reliability of DevSecOps processes within the enterprise, catering to user needs and ensuring seamless operation across diverse cloud platforms. Tasks include:   - Software Solution Development: Analyze user needs to develop software solutions that streamline and optimize DevSecOps workflows. Create robust, scalable, and secure applications tailored to the enterprise's operational requirements. - Database Analysis and Design: Engage in the analysis and design of databases to support the applications, ensuring data integrity, security, and accessibility across multi-cloud and on-premises environments. - Security Implementation: Prioritize the security of software systems and applications through the integration of security best practices and protocols from the initial stages of development.
Requisition ID
2024-145505
Telecommute Options
Flexible for occasional telework
Job Locations US-VA-Chantilly
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 1:20 PM)
Overall Assignment Description:   At Peraton we drive missions of consequence spanning the globe.  As the world’s leading mission capability integrator and transformative enterprise engineering provider we deliver trusted engineering capabilities to our nation’s security and provide solutions which keep our nation safe. The Space and Intelligence Sector is seeking an Expert-Level (18+ years) Modeling, Simulation and Analysis Engineer to work within our dynamic Enterprise Engineering team in Chantilly, VA. The Enterprise Engineering team supports the Government by providing systems engineering and integration support for NGA’s Sensor Integrations (TIS) Office.  This team provides strategic and solutions-level systems engineering support for the integration of new sensor capabilities into the Enterprise architecture.  Modeling, Simulation and Analysis (MS&A) Engineers guide and conduct modeling, simulation and analysis activities in support of business stakeholders, analysts, and warfighters to define and analyze system and data requirements to support NGA business and mission processes to ensure timely and accurate GEOINT.
Requisition ID
2024-145504
Telecommute Options
No remote/telework allowed
Job Locations US-CO-Colorado Springs
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 7:34 AM)
We are seeking an Entry Level Systems Testing and Integration Analyst to perform testing, evaluation, and integration on the Command Control Systems Consolidated (CCS-C) for the United States Space Force (USSF). The CCS-C system provides USSF and United States Space Command (USSPACECOM) satellite control capabilities. Current programs include the Defense Satellite Communications System (DSCS) III, Milstar Satellite Communications System, Advanced Extremely High Frequency (AEHF), and Wideband Global Satellite (WGS) Communication Systems.    The Systems Testing and Integration Assosciate will be responsible for the following but not limited to:   - Executes against designs, implements test and evaluation strategies, plans and methods to assure reliability of systems in conjunction with system specifications and defined CCS-C capabilities, and integrates system and enterprise elements together so they work as a whole - Reviews, evaluates, and derives requirements for testability - Ensures systems and CCS-C capabilities comply with requirements and standards through formal verification methods and IAW SMC-S-012, Software Development for Space Systems and SMC-S-024.  - Participates in reviews of systems and elements under development to ensure traceability of requirements compliance through verification and validation - Support the submission of test plans and procedures, for Government review and approval, via e-mail and contractor managed share site 2 weeks prior to formal testing unless otherwise granted relief by the Government.  - Provide technical and test support for operations checkout of software releases in conjunction with 4th Space Operations Squadron (4 SOPS) operators - Support Creation, Development, Reviews, & Execution of: Software Test Plans (STP), Software Test Descriptions (STD), Software Test Report (STR), Finacial Reports, Estimates to Complete Reports, and Monthly Status Reports.  - Test software releases/modifications and hardware installations/upgrades to ensure changes will fix the problem or provide the enhancement identified in the CR and not degrade the integrity of the system
Requisition ID
2024-145503
Telecommute Options
No remote/telework allowed
Job Locations US-FL-MacDill AFB
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 5:07 PM)
Peraton requires Cyber Security Analyst (JRNY) to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3. Positions are located at the SOCOM Headquarters at MacDill, AFB FL, and at the TSOC and Component locations in the United States and abroad.   The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and  common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365.   Duties and responsibilities include but are not limited to:   • Investigate alerts, anomalies, error, intrusions, malware, etc. to identify the extent of a security incident and be able to help isolate the responsible agents. • Maintains multiprotocol routers, multilayer switches, network security devices and network management systems. • Performs systems administration, maintenance, computer security, and support for servers on networks and Computer Network Defense-Service Provider (CND-SPs) • Performs changes to associated routers, switches, and encryption devices. • Recommends improvements automated information system security polices • Maintains and operates a services support program that provides systems administration, maintenance, computer security, and support for servers on networks. • Provides systems administration, maintenance, computer security, and support for physical servers, • Performs system, security, and operational testing/evaluation events. • Tests to ensure Government data is protected from unauthorized disclosure and remains under Government control. • Tests to verify configuration and protections of external and internal data flows between applications, containers, virtual devices, virtual machines, and cloud infrastructure. • Tests to verify data at rest encryption on cloud infrastructure. • Tests the build and related procedures. • Detects network intrusions and cyber incidents • Detects, identifying, and alerting the Government of possible attacks/intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign activities. • Assists in incident response • Monitors systems security and responding to security incidents • Participates in security systems testing • Ensures integrity and confidentiality of sensitive data • Prevents and detecting intrusion • Supporting incident containment and remediation recommendations • Conducts log file analysis • Uses various tools such as Remedy, Splunk, and Office Automation to perform duties • Some positions may require work outside a traditional work schedule to support the needs of the customer  
Requisition ID
2024-145501
Telecommute Options
No remote/telework allowed
Job Locations US-IL-Scott AFB
Requisition Post Information* : Posted Date 2 weeks ago(4/10/2024 3:35 PM)
As a Data Warehouse Programmer, you will focus on data team support for the Commercial Services PMO for commercial carrier contracts. This role will focus on the monthly ETL processing for the commercial data resulting in the contract compliance KPI and financial reporting. You will maintain the established process utilizing Teradata and IBM Cognos and support the transition to a cloud-based platform for backend database and Business Intelligence (BI) tools utilized for each program.  Finally, you will assist with maintaining any required Business Intelligence (BI) tools, and work with the Staff members to provide maintenance/upgrades throughout the life of the BI tools to meet PMO data analysis and reporting requirements.   As a member of a team of technical and functional logistics experts, this position requires an individual to be able to help design, develop, implement, and maintain IT solutions to support USTRANSCOM and the Department of Defense.     Key Responsibilities: - Translates application and end user system requirements into technical requirements. - Create and maintain supporting analytical data framework to enable Key Performance Indicator (KPI) dashboards and other BI Tool reporting requirements. - Apply business rules and processes to cleanse, consolidate, and integrate transactions to create decision ready data to feed dashboards or performance reporting. - Consume and store carrier transactional level data to be presented in BI tools and reports. - Maintain and perform upgrades as required throughout the BI Tool life cycle.
Requisition ID
2024-145500
Telecommute Options
Flexible for occasional telework
Job Locations US-VA-McLean
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 9:14 AM)
- Analyze workforce data, such as hiring, retention, attrition, and organizational mobility metrics, to identify trends and labor projections - Build/modify data visualization dashboards, reports, and other products to suit client needs - Assist in development of position description libraries - Administer relational databases - Normalize, standardize, and integrate disparate raw data sets - Assist with survey design and execution across 18 IC agencies - Provide data analytic support for surveys, data calls, and other human capital efforts - Ability to clearly communicate technical or analytic findings in a easily understood narratives via graphical, written, and verbal formats - Processes/Activities:  Manage HR data, conduct analysis   
Requisition ID
2024-145499
Telecommute Options
Flexible for occasional telework
Job Locations US-VA-Arlington
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 3:03 PM)
Peraton requires PC Technicians to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3.  Positions are located at the SOCOM Headquarters at MacDill, AFB FL, and at the TSOC and Component locations in the United States and abroad.    The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365.   Under the direction of the Sr. PC Technician, the PC Technician must have excellent problem-solving and customer service skills, as well as extensive experience with desktop hardware, software applications, operating systems, and network connectivity. This position must be customer service-oriented and proactive in anticipating and resolving problems while maximizing efficient use of computing resources. The PC Technician may be required to provision and maintain mobile devices (NIPR, SIPR and Gray). PC Technicians shall provide system and network infrastructure services to operate, maintain, monitor, defend, and manage hardware, software, MAN routing and switching infrastructures, including network hardware and software.   Duties include but are not limited to: - Troubleshooting and proactively resolving technical issues. - Responding to requests for technical - Providing recommendations for technical - Providing technical problem solving for customer support of database - Installing, configuring, and maintaining desktop and laptop PCs, mobile devices and peripherals, such as printers - Installing and configuring application and operating system software and upgrades - Troubleshooting and repairing hardware and network connectivity issues - Removing old equipment and performing data migration to new machines - Maintaining an inventory of installed software, managing software licensing, and creating policies and procedures for upgrades - Working with hardware and software vendors to verify timely product delivery and ensuring that new equipment is installed and ready to operate on schedule - Analyzing and making recommendations for hardware and software standardization - Some positions may require shift work and/or an ability to work a non-standard work schedule to support the USSOCOM mission
Requisition ID
2024-145498
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 12:46 PM)
Peraton is currently seeking to hire an experienced Cyberspace Intelligence Analyst for the USCYBERCOM program located at Fort Meade, MD.   In this role you will: - Lead and act as a full participant in JPGs and OPG/OPTs developing and integrating cyber capabilities into planned operations, and in support of Combatant Commander regionally-focused planning efforts - Contribute to the development of cyberspace operations through the analysis of intelligence products; perform a vast array of cyberspace intelligence analyst duties with limited guidance - Possesses an in-depth understanding of intelligence analytic concepts to monitor, assess, and report on cyberspace operations, capabilities, and vulnerabilities - Contribute substantive content for operational level reports, briefings, and Operational plans (OPLANS) - With no guidance, advises stakeholders and coordinate actions - Develop, integrate, and maintain operational TTPs, SOPs, and Concept of Operations (CONOPs) - Evaluate countermeasure assessments and provide recommendations to leadership on implementation of counter measures - Contribute substantive content to the development of complex analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence exists - Perform other ad hoc tasks in execution of Commander's Cyber Mission assessment priorities.
Requisition ID
2024-145493
Telecommute Options
No remote/telework allowed
Job Locations US-VA-McLean
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 9:14 AM)
- Develops graphics, digital media, cartography, and other multimedia products - Utilizes request management tools to provide swift, high quality customer support for communication requests - Coordinates with UI/UX designer in Knowledge Management, to ensure graphics products provide an engaging and user friendly experience - Creates graphic designs for a variety of written and digital products - Develops design concepts and implements designs for new web pages, mobile applications, newsletters, ads, infographics, banners, illustrations, logos, and other types of digital content that will be presented online - Ensures products conform to all production standards, copywrite laws, accessibility compliance requirements, public release clearances - Conducts technical quality checks - Manages an approved concept and build in HTML/CSS so it complies with responsive design principles - Provides Cartography support, as needed, to design thematic and reference maps
Requisition ID
2024-145492
Telecommute Options
No remote/telework allowed
Job Locations US
Requisition Post Information* : Posted Date 6 days ago(4/17/2024 4:23 PM)
The Department of Interior (DOI) CHS III program will be leading the way for Cloud Hosting and Applications Modernization across DOI and its subordinate bureaus. CHS III will facilitate migration of legacy on-premises applications to a modern, secure and scalable multi-cloud platform.  From sensors in active volcanic regions to earthquake detection data, CHS III will be DOI's central cloud processing and data solution.    The Candidate will be expected to Architect multiple cloud-based AI solutions.  Experience working with large-scale data sets, neural network models, machine learning and pattern recognition is preferred.  Familiarity and experience with costing and estimation of workload sizes is preferred.  Familiar with migrating processes to AWS.  Candidate will be expected to collaborate with all stakeholders to bring about success.   
Requisition ID
2024-145491
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 6 days ago(4/17/2024 4:22 PM)
The Department of Interior (DOI) CHS III program will be leading the way for Cloud Hosting and Applications Modernization across DOI and its subordinate bureaus. CHS III will facilitate migration of legacy on-premises applications to a modern, secure and scalable multi-cloud platform.  From sensors in active volcanic regions to earthquake detection data, CHS III will be DOI's central cloud processing and data solution.    The Security Administrator is expected to have experience securing cloud-based workloads and ensuring security best-practices are followed is required.  Responsible for A&A ATO documentation (SSPP, CP, CM, FIPS-199).  Experience with obtaining FISMA and NIST Compliance is required.    
Requisition ID
2024-145487
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 6 days ago(4/17/2024 4:21 PM)
The Department of Interior (DOI) CHS III program will be leading the way for Cloud Hosting and Applications Modernization across DOI and its subordinate bureaus. CHS III will facilitate migration of legacy on-premises applications to a modern, secure and scalable multi-cloud platform.  From sensors in active volcanic regions to earthquake detection data, CHS III will be DOI's central cloud processing and data solution.    The Candidate will be expected to support the implementation of multiple cloud-based AI solutions.  Experience working with large-scale data sets, neural network models, machine learning and pattern recognition is preferred.    Familiar with migrating processes to AWS.  Candidate will be expected to collaborate with all stakeholders to bring about the success of the AI/ML processes. 
Requisition ID
2024-145486
Telecommute Options
Remote work allowed 100%
Job Locations US-VA-Chantilly
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 8:08 AM)
Peraton is looking for a Digital Forensic Analyst to support one of our longstanding customers. This autonomous role supports active operations and presents the candidate with cutting edge challenges in the digital forensic arena. This rewarding position will be responsible for the deep dive analysis on a variety of types of media. The candidate will be expected to support cases involving intrusion/compromise, malware, user technical profiling and other tasks, as required. This customer promotes a relaxed environment and understands the importance of work/life balance.
Requisition ID
2024-145484
Telecommute Options
Flexible for occasional telework
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:50 AM)
  If you are a skilled IAM Engineer with a passion for implementing and managing cutting-edge IAM solutions, we encourage you to apply for this exciting opportunity. Join us in safeguarding our organization's assets and data against cyber threats and ensuring compliance with regulatory requirements.   We are seeking an experienced and motivated Identity and Access Management (IAM) Engineer to join our dynamic team.  As an IAM Engineer, you will play a critical role in designing, implementing, and maintaining our IAM infrastructure using industry-leading solutions.  This role requires deep technical expertise in IAM technologies and a strong understanding of security best practices. This is a Telework position.     What you will do:   - Design, implement, and manage identity and access management solutions using industry-leading solutions like AWS IAM, IBM Security Identity Manager, SailPoint, and Ping Identity to ensure the security and integrity of our systems and data. - Collaborate with cross-functional teams to gather requirements, design IAM solutions, and integrate them with existing systems and applications. - Configure and manage user identities, roles, and access permissions across various platforms and environments. - Develop and implement IAM policies, procedures, and standards to enforce security controls and compliance requirements. - Conduct access reviews, audits, and risk assessments to identify security vulnerabilities and ensure adherence to regulatory frameworks. - Monitor IAM systems for security incidents and proactively respond to threats and vulnerabilities. - Automate IAM processes and workflows using scripting languages and automation tools to improve efficiency and scalability. - Provide technical guidance and support to internal teams on IAM-related issues and initiatives. - Stay current with emerging technologies and trends in IAM to continuously improve our IAM infrastructure and practices. - Participate in incident response activities and collaborate with security teams to investigate and mitigate security incidents. - Stay abreast of emerging technologies and trends in IAM, cloud security, and identity governance to continuously improve our IAM architecture and practices. - Collaborate with enterprise architecture teams to ensure that IAM solutions align with overall IT architecture principles and standards. - Participate in incident response and security incident investigations related to IAM systems. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. Coordinate communication of release schedules and changes to all relevant parties
Requisition ID
2024-145481
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:49 AM)
  If you are a skilled IAM Engineer with a passion for implementing and managing cutting-edge IAM solutions, we encourage you to apply for this exciting opportunity. Join us in safeguarding our organization's assets and data against cyber threats and ensuring compliance with regulatory requirements.   We are seeking an experienced and motivated Identity and Access Management (IAM) Engineer to join our dynamic team.  As an IAM Engineer, you will play a critical role in designing, implementing, and maintaining our IAM infrastructure using industry-leading solutions.  This role requires deep technical expertise in IAM technologies and a strong understanding of security best practices. This is a Telework position.     What you will do:  - Design, implement, and manage identity and access management solutions using industry-leading solutions like AWS IAM, IBM Security Identity Manager, SailPoint, and Ping Identity to ensure the security and integrity of our systems and data. - Collaborate with cross-functional teams to gather requirements, design IAM solutions, and integrate them with existing systems and applications. - Configure and manage user identities, roles, and access permissions across various platforms and environments. - Develop and implement IAM policies, procedures, and standards to enforce security controls and compliance requirements. - Conduct access reviews, audits, and risk assessments to identify security vulnerabilities and ensure adherence to regulatory frameworks. - Monitor IAM systems for security incidents and proactively respond to threats and vulnerabilities. - Automate IAM processes and workflows using scripting languages and automation tools to improve efficiency and scalability. - Provide technical guidance and support to internal teams on IAM-related issues and initiatives. - Stay current with emerging technologies and trends in IAM to continuously improve our IAM infrastructure and practices. - Participate in incident response activities and collaborate with security teams to investigate and mitigate security incidents. - Stay abreast of emerging technologies and trends in IAM, cloud security, and identity governance to continuously improve our IAM architecture and practices. - Collaborate with enterprise architecture teams to ensure that IAM solutions align with overall IT architecture principles and standards. - Participate in incident response and security incident investigations related to IAM systems. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. Coordinate communication of release schedules and changes to all relevant parties
Requisition ID
2024-145480
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:49 AM)
If you are a talented IAM professional with a passion for designing secure and scalable IAM solutions, we encourage you to apply for this exciting opportunity. Join us in shaping the future of our IAM architecture and protecting our organization's digital assets.   We are seeking an experienced and motivated Identity and Access Management (IAM) Architectto join our dynamic team.  As the IAM Architect, you will be responsible for architecting IAM systems that meet our security, compliance, and business requirements. This is a Telework position.      What you will do:   - Architect and design IAM solutions that meet business requirements and align with industry best practices and regulatory standards. - Lead the implementation and integration of IAM solutions across cloud and on-premises environments, leveraging market leading solutions such as AWS IAM, IBM Security Identity Manager, SailPoint, and Ping Identity technologies. - Collaborate with cross-functional teams to define IAM requirements, develop architectural designs, and implement IAM solutions that meet the needs of various stakeholders. - Develop IAM architecture blueprints, design patterns, and technical specifications to guide the implementation and configuration of IAM systems. - Evaluate and recommend IAM technologies, tools, and vendors to support our organization's evolving security and business needs. - Conduct risk assessments and security reviews of IAM systems to identify vulnerabilities, mitigate risks, and ensure compliance with regulatory requirements. - Provide technical leadership and guidance to IAM engineers and administrators in designing, configuring, and troubleshooting IAM solutions. - Stay abreast of emerging technologies and trends in IAM, cloud security, and identity governance to continuously improve our IAM architecture and practices. - Collaborate with enterprise architecture teams to ensure that IAM solutions align with overall IT architecture principles and standards. - Participate in incident response and security incident investigations related to IAM systems. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. Coordinate communication of release schedules and changes to all relevant parties. Participation in Technical Change Advisory and Review boards as required.
Requisition ID
2024-145479
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:48 AM)
  If you are a highly motivated professional with a passion for technology and a proven track record in IAM and project management, we invite you to join our team and contribute to our success. We offer competitive compensation, comprehensive benefits, and opportunities for professional growth and development in a collaborative and supportive work environment. Apply now to become part of our innovative and forward-thinking organization!   We are looking for a skilled IAM Senior Technical Project Manager to oversee the planning, implementation, and execution of IAM projects within our organization. The ideal candidate will possess strong technical understanding of IAM systems and technologies, and a strong understanding of security best practices, along with proven project management skills to drive successful project outcomes. This is a Telework position.     As the lead Project Manager, you will play a critical role in leading the team of IAM Architects and Engineers which play a critical role in designing, implementing, and maintaining our IAM infrastructure using industry-leading solutions.     What you will do: - Lead the planning, coordination, and execution of IAM projects from initiation to completion, ensuring adherence to project timelines, budget, and quality standards. - Collaborate with cross-functional teams, including IT security, infrastructure, application development, and business stakeholders, to gather requirements, define project scope, and establish project objectives. - Develop comprehensive project plans, including resource allocation, task assignments, and risk management strategies, to ensure successful project delivery. - Manage the implementation and configuration of IAM solutions, including identity lifecycle management, role-based access control (RBAC), single sign-on (SSO), and multi-factor authentication (MFA). - Conduct thorough assessments of existing IAM processes and systems, identifying areas for improvement and implementing best practices to enhance security posture and efficiency. - Serve as a subject matter expert on IAM technologies and methodologies, providing guidance and recommendations to internal teams on IAM-related initiatives and projects. - Facilitate communication and collaboration among project stakeholders, ensuring alignment of priorities, expectations, and deliverables throughout the project lifecycle. - Monitor project progress, track key performance indicators (KPIs), and prepare regular status reports and presentations for senior management and stakeholders. - Ensure compliance with regulatory requirements and FISMA and NIST industry standards related to IAM. - Stay informed about emerging trends, technologies, and best practices in IAM and cybersecurity, continuously enhancing knowledge and skills to drive innovation and excellence. - Collaborate with cross-functional teams to lead requirements gathering and solution design sessions. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. - Coordinate communication of release schedules and changes to all relevant parties.  - Participaties in Technical Change Advisory and Review boards as required.
Requisition ID
2024-145478
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 3:29 PM)
Thank you for your interest in the Peraton Talent Network! Technology capabilities are changing rapidly. What doesn't change are the technical skills we hire for at Peraton: - Architects - Cloud Specialists - Corporate Roles - Cyber Professionals - Engineers - Intelligence Professionals - Research Scientists - Satellite Systems Specialists - Systems Administrators By applying here, you will be joining our network of talented individuals interested in exploring Peraton opportunities. Your resume and profile will be one of the first stops for our Talent Acquisition (TA) team members as they look for well-qualified candidates to fill our many roles!    Join Our Talent Network By Applying Below Today!   You should expect to be contacted by any one of our numerous TA team members if you are identified as a potential fit for any of our exciting opportunities.  Once you are connected with our TA member, you will work side by side to determine if you are interested in moving forward.   This will not replace any of your active applications.  Please continue to visit the Peraton careers page and apply to any position you are interested in and qualified for.   If you have any questions or need assistance, please contact our Enterprise Sourcing Team members at the contact provided below.   Gabe Bryant (gbryant@peraton.com) John Eells (jeells@peraton.com)   **This posting represents all opportunities at Peraton and does not represent a set minimum or maximum compensation range. Salary range is based on geographical location and experience.**    
Requisition ID
2024-145476
Telecommute Options
No remote/telework allowed
Job Locations US-CO-Colorado Springs
Requisition Post Information* : Posted Date 1 week ago(4/16/2024 10:21 AM)
We are hiring a Senior Systems Administrator supporting our Air Force Modernization Program at Peterson Air Force Base in Colorado Springs, Co.   What you'll do: - Provides support for implementation, troubleshooting and maintenance of Information Technology (IT) systems. - Design, install, configure, and manage of on-prem Active Directory environment including configuration and implementation of GPOs - Ensure systems are compliant within required DoD security standards. - Configures and manages Windows operating systems and installs/loads operating system software, troubleshoots, maintains integrity, and configures network components along with implementing operating systems enhancements to improve reliability and performance. - Provides support for the escalation and communication of status to agency management and internal customers. - Provide Tier 3 escalation support to IT tickets using the BMC Remedy Tool - Manage, coordinate, and implement software upgrades, patches, hot fixes on servers, workstations, and network hardware - Collaborate with other teams and team members to develop automation strategies and deployment processes - Identify issues and create improvement processes to help with the reduction of incident outage times. - Develop and maintain O&M Standard Operating Procedures for developed capabilities. - Create detailed system design and standard operating procedure documents for the VMware/VxRail solution. - Installation/Configuration/Management of the VMware environment
Requisition ID
2024-145469
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 1 week ago(4/15/2024 12:35 PM)
Peraton is hiring a Windows Server \ Web and Database Systems Administrator for the Military intelligence Center of Excellence (MIITS Contract) support to G6 Systems Operations team.  This role is located at Fort. Huachuca, AZ.   What you'll do: - System Administration of Windows Server 2019 and later  - System Administration of SQL server 2019 and later  - Install and configure SQL server and Microsoft IIS on Virtual Machines (VMs)  - Applying security patches and DISA STIGs to Windows, SQL and IIS servers  - Responsibilities also include:  - Preparing system documentation  - Automating processes with scripts  - Assisting other teams with OS, SQL and IIS troubleshooting   - Request and install CA signed certificates  - Maintains smooth operation of multi-user computer systems, including coordination with network engineers. - Monitors and manages system resources, including CPU usage, disk usage, and response times to maintain operating efficiency. - Performs systems security administration functions, including creating user profiles and accounts. - Other duties may include setting up administrator accounts, maintaining system documentation, tuning system performance, installing system wide software and allocating mass storage space. Interacts with users and evaluates vendor products.Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery.Develops and monitors policies and standards for allocation related to the use of computing resources.  
Requisition ID
2024-145468
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Home
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 8:52 AM)
Peraton is seeking a Security Operations Center (SOC) Analyst (SOC Analyst) to join our team of qualified and diverse individuals. The SOC Analyst will be part of the Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program for the Bureau of Consular Affairs (CA). The CAEIO Program provides IT Operations and Maintenance to modernize the legacy networks, applications, and databases supporting CA services globally.   Responsibilities   The SOC Analyst is a member of a team that enhances CA’s security posture. The SOC Analyst uses tools, such as Splunk, to monitor the environment, investigates alerts, and performs threat hunting. The SOC Analyst performs Computer Network Defense monitoring, analytics, and incident responding. Identifies and escalates incidents following document procedures and SOPs. Coordinates with internal and external teams to address threats and risks via investigation and forensic analysis. Able to perform direct and advisory roles in oversight planning and implementation of projects and initiatives. Responsible for advising management and team members of risks associated with technologies and implementation approaches and identify methods of risk. Support problem resolution and identify process improvements.   Tasks the SOC Analyst performs include, but are not limited to:  - Implement automation orchestration to replace repetitive tasks which are being conducted. - Develop monitoring via advanced dashboards, alerts, data models, reports. - Design and customize complex search queries and promoting advanced searching for computer/network forensics. - Perform log analysis to identify trends, abnormal behavior, correlate events, and detection of TTPs. - Participate in incident, problem, and change management processes. - Perform real-time cyber defense incident handling tasks (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation)  to support Incident Response Teams (IRTs). - Develop new and maintain/update  documentation for SOPs, Playbooks, and job aids. - Provide system/equipment/specialized training and technical guidance. - Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. - Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. - Analyze log files from a variety of sources (e.g., individual host, network traffic, firewall, and intrusion detection system (IDS) logs) to identify possible threats to network security. - Perform assessments to identify and resolve monitoring gaps. - Communicate with customers and teammates clearly and concisely. Core Work Schedule: First and weekend shift (Saturday - Wednesday, 7:00 AM – 3:30 PM)   Work Location: Hybrid: remote AND up to two days per week in the office in Sterling, VA or Washington, DC.
Requisition ID
2024-145465
Telecommute Options
Flexible for occasional telework
Job Locations US-VA-Herndon
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 9:09 AM)
  Join our dynamic team as a Senior ISSO and become a pivotal figure in safeguarding classified information systems. If you're passionate about ensuring the utmost security and compliance standards are met, this role is tailor-made for you.   Responsibilities: - Strategic Advisor: Serve as the go-to expert on all matters concerning information assurance for classified information systems, providing guidance and expertise on technical and procedural aspects. - Compliance Champion: Ensure strict adherence to agency information security policies, standards, and procedures, bolstering the operational security posture of our systems. - Documentation Guru: Develop and maintain comprehensive Assessment & Authorization (A&A) documentation, including System Security Plans (SSP) and Security Test Plans (STP), utilizing cutting-edge tools such as Xacta and following industry best practices like RMF processes. - Proactive Monitoring: Conduct thorough auditing of security information and events within assigned systems, utilizing advanced tools like Splunk to detect and mitigate potential threats, ensuring the integrity of our network resources. - Incident Response: Support the reporting and resolution of security incidents and vulnerability compliance gaps, swiftly addressing any issues that may arise. - Collaborative Leadership: Work closely with software developers and architects to embed security requirements into project plans, offering invaluable guidance on security policy implementation. - Continuous Improvement: Spearhead the development and management of action plans, collaborating with project managers and engineers to implement corrective actions and ensure ongoing compliance. - Persistent Monitoring: Engage in continuous monitoring of operational systems, conducting regular audits to ensure proper usage and adherence to security protocols. - Remediation Expert: Review weekly security audits, working collaboratively with project teams to identify and address areas for improvement, ensuring a robust security infrastructure at all times.
Requisition ID
2024-145459
Telecommute Options
No remote/telework allowed
Job Locations US-KS-Topeka
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 10:50 AM)
Peraton is seeking a Program Support Center (PSC) Supervisor to join our team of diverse, qualified individuals.  The PSCSupervisor works at the United States Postal Service (USPS) Central Repair Facility (CRF) in Topeka, KS.  The CRF is a depot repair facility for USPS mail processing, delivery, and bulk mail systems repairable parts. Examples: repairing printed circuit boards, electrical, electronic, mechanical and electro-mechanical assemblies to component level. The CRF provides depot level maintenance for essential automation, mechanization, retail and bulk mail processing systems used in all mail processing and retail installations.   *Note-This is an On-Site position, no remote or hybrid work options.   Our PSC Supervisor manages the Program Support Center in all aspects of repairs, configuration, imaging, provisioning, kitting, and/or deployment of Delivery, Retail, and Telecommunications equipment. Oversees projects and tasks assigned to the organizational group performed by Unionized, non-exempt and/or exempt employees.  Specific tasks include: - Plan, schedule, and delegate work and special projects to employees on a priority basis - Evaluate manpower availability and employees' work performance and productivity to determine shop capabilities and required training and personnel reallocation - Make recommendations for promotions, merit increases, hiring of prospective employees, and ways to increase productivity and improve repair procedures - Help motivate workers and provides technical guidance - Deal with disciplinary actions - Review and evaluate proposed specification changes for correctness - Execute department procedures that typically affect individual employees within own department - Interpret and execute policies and procedures - Recommend modifications to operating policies - Monitor shop safety practices to include environment, chemicals, improper equipment or tools use and operation - Prepare reports as required - Extensive contact with internal personnel and outside customer representatives at various management levels concerning operations or scheduling or specific phases of projects or contracts - Conduct briefings and participates in technical meetings for internal or external representatives concerning specifics operations - Perform other related tasks as assigned #CRF2023
Requisition ID
2024-145458
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Herndon
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 2:28 PM)
Are you ready to work on a team that supports the development of cutting edge technology? Our program provides IT-based efforts required to support DoD and the IC for technology and concept development. The DoD intelligence mission is to provide accurate, relevant, and timely data and intelligence to tactical, operational, and strategic decision makers across the COCOM, nuclear, conventional, and Special Operations Forces. Decision superiority is the competitive advantage, enabled by an ongoing situational awareness that allows commanders and their forces to make informed decisions and implement them as fast and effectively as the situation warrants. Decision superiority is about improving the ability to observe, orient, decide, and act faster and more effectively than the adversary.   Our program supports unclassified and classified software development and integration services. Some of the work we will do is brand new Big Data, data analysis, Artificial Intelligence (AI), Machine Learning (ML), and advanced analytics, while other work will be refining and improving legacy development, as well as providing operations and maintenance   The Information Assurance Engineer will: - Design and implement safety measures and controls. Monitor network activity to identify vulnerable points. Address privacy breaches and malware threats. - Support the Assessment and Authorization (A&A) processes and Information Assurance documentation for multiple analytic and mission systems across all CLINs - Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems - Author, complete and maintain the System Security Plan (SSP) within XACTA - Develop the Security Controls Traceability Matrices (SCTM), and the Security Test Plan (STP) procedures within Xacta. - Analyze existing security systems and make recommendations for changes or improvements - Prepare reports and action plans in the event that a security breach does occur - Monitor the network and provide early warning of abnormalities or problems - Communicate the system status and keep users informed of downtime or changes to the system - Experience working with software developers and architects to understand security requirements - Experience guiding the application developers on security policy, identifying security requirements, providing technical guidance for the satisfaction of requirements - Experience creating and managing the plan of action and milestones (POA&Ms), and working with project managers and engineers to develop schedules and engineering actions that mitigate open findings - Experience supporting the Continuous Monitoring of operational systems; experience monitoring and auditing operational systems for proper use - Log Review/Analysis using SIEM tools (Splunk, etc.) - Vulnerability Analysis and Review (ACAS, TwistLock, SonarQube) - DISA STIGs and STIG Viewer experience
Requisition ID
2024-145457
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Laurel
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 4:40 PM)
Peraton has an immediate opportunity for a cleared Junior Systems Engineer to join our team here in Laurel, MD. This is a great opportunity for anyone who would like to join a large Cyber and Data Management program where they can continue to develop their skills and grow with our amazing technical team. As a Systems Engineer, you'll do the following tasks: - Creator of program artifacts to include compliance, performance, and operational documentation - Formulation and documentation of client performance strategies and initiatives - Researched, drafted, designed and developed individual system requirements to meet client specifications of compute, storage, capability, capacity and sustainment. - Create individual configuration, functional and system requirements for each system built in order to meet and exceed customer requirements - Gather technical information, prepare written text - Use Office tools such as MS Word, PowerPoint, Visio, etc.
Requisition ID
2024-145455
Telecommute Options
No remote/telework allowed
Job Locations US-HI-Halawa
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 12:47 PM)
PERATON OVERVIEW Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers. RESPONSIBILITIES Peraton requires a Lead Logistician for the Command, Control, Communications, Computer, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) services for the Long-Range Enterprise Intelligence Surveillance and Reconnaissance (ISR) Activity (LEIA) Task Order at Camp H.M Smith, Hawaii in support of Special Operations Command, Pacific (SOCPAC). SOCPAC requires contractor services to provide a broad spectrum of C5ISR capabilities to facilitate SOCPAC missions. SOCPAC requires flexible services including, but may not be limited to, Contractor Owned, Contractor Operated (COCO) capabilities using air, surface, subsurface, space, and cyber platforms to meet mission needs in an ever-changing threat and technology landscape. SOCPAC requires that these services continuously leverage the latest C5ISR technologies and best practices to rapidly refresh capabilities and ensure that platforms and intelligence operations provide optimal capabilities. SOCPAC requires these services to be performed primarily within the USINDOPACOM AOR, but ancillary and supporting activities may be performed globally. SOCPAC is a Theater Special Operations Command (TSOC) under the United States (U.S.) Special Operations Command (USSOCOM) and serves as the functional component for all special operations missions deployed throughout the Indo-Pacific region. SOCPAC coordinates, plans, and directs all special operations in the Pacific theater supporting U.S. Indo-Pacific Command (USINDOPACOM) as a sub unified command. The USINDOPACOM Area of Responsibility (AOR) is the priority theater for the Department of Defense (DoD), covering 51 percent of the globe and 60 percent of the world’s population. The USINDOPACOM AOR is like no other geographic region. The region is culturally, socially, economically, and geopolitically diverse, with more than 35 nations comprising the Asia-Pacific region and is home to more than 3,000 different languages, and several of the world’s largest militaries. More than one third of Asia-Pacific nations are smaller, island nations, including the smallest republic in the world and the smallest nation in Asia. Duties and responsibilities include but are not limited to: - Lead the management and control of program wide assets - Initiate and maintain the processes, systems, procedures, records, and methodologies necessary for effective and efficient control - Lead internal assessments, auditing of inventory, and oversight of Government Property Loss investigations - Lead proper property disposition in coordination with the AAS Property Administrator (PA) Location - Camp H.M. Smith, Hawaii
Requisition ID
2024-145454
Telecommute Options
Flexible for occasional telework
Job Locations US-CO-Schriever AFB
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 11:48 AM)
  Are you ready to make an impact?  Peraton is seeking a driven System Administrator to join our Consolidated Air Force Space Command Modifications, Maintenance, and Operations (CAMMO) program at Schriever AFB, CO. Be part of a fast-pace, mission-focused environment providing operations, maintenance and sustainment support of global Air Force Satellite Control Network (AFSCN) mission and non-mission equipment.     This poisition will work Mid-Shift (10:00 pm to 6:00 am)   Responsibilities: As a Systems Administrator, you will get a very broad range of hands-on work to include performing trunk/circuit testing and monitoring to ascertain compliance with specified parameters.   - Performs operations, maintenance and systems administration on the OSR Systems, WANIUs, encryption devices and other systems associated with Air Force Satellite Control Network (AFSCN) Operational Control Node (OCN) at Schriever  AFB, CO - Maintain computer networks including VPNs, router, switches and other physical hardware; install and configure network equipment; configure and manage firewalls as required; monitor computer systems to improve network performance for all systems - Coordinates efforts with customers, associate contractors and fellow CAMMO program personnel to ensure highly successful operations, configuration, and verification of connectivity - Develop/deploy ANETS VMware solutions; administer, configure, and troubleshoot/resolve VMWare environment issues; install operating systems, service packs, security patches and bug fixes as directed; provide technical support and document VMWare processes; keep informed of related developments in VMWare technologies and products; VMWare Certified Professional (VCP) preferred; extensive knowledge of the fundamentals of VMWare ESX and related technologies - Windows Server and Active Directory  knowledge; must have knowledge of server technologies; implement  highly-available server/networking/storage infrastructure; candidate may be involved in providing planning and execution of projects; troubleshoot and provide technical analysis concerning operating system, network, and application performance issues to resolution; coordinate problem management and resolution among a variety of functional areas and provide subject matter expertise support for diagnosing and resolving problems - Client/Server management and architecture work experience; client/server experience and provide judgment and analysis for the design, development and implementation of client/server system; analyze client/server requirements to ensure the system meets performance requirements; must be familiar with relational databases - Monitor and troubleshoot system/application activity and performance; perform functionality and integration testing for new and updated Endpoint Security Software; assist in the implementation of policies and standards related to the use of computing resources, overall implementation and operational aspects of multiple systems, operating environments and related software - Provide network engineering support and install, operate, configure, optimize, and maintain the Cisco Identify Services (ISE) tool for the enterprise; provide network engineering expertise to deploy Cisco ISE network access control features; implement, configure and administer CISCO ISE; provide remediation recommendations and mitigating strategies for vulnerabilities discovered and maintain in-depth knowledge of DISA Security Technical Implementation Guidance (STIG), STIG technologies such as Tenable Nessus, STIG Viewer, Security Requirements Guides (SRG), Security Content Checker (SCC), STIG benchmarks, open-source tools such as Vulnerator, and other automated tools that assist with the assessment of security controls and the presentation of security assessment results; support the development, documentation and delivery of training and training materials on all cyber tools, software, processes and policies. - Implement, maintain, and configure SolarWinds; continuously automate and tune monitors to limit false alarms; administer components as required; ability to implement, administer, configure and secure the SolarWinds suite of products - Develops procedures and trains personnel and performs complex operations - Accepts, develops and implements the more complex configuration changes associated with the OSR and related systems - Perform account management, systems and database administration, testing, PMIs and troubleshooting/fault repair - Perform systems administration, database administration and master document upkeep, account management, software support and maintenance, outage documentation review, and repair of computer systems. - Perform customer service, configuration and touch maintenance on office use personal computer systems and peripheral devices. - Perform simple operations and maintenance tasks on classified and unclassified audio/visual (AV) and video teleconferencing (VTC) equipment. - Perform inventory control of classified and unclassified personal computer desktop systems, printers, peripheral devices, AV and VTC equipment. - Interface with network system administrators and service desk teams to open and track job tickets on systems
Requisition ID
2024-145451
Telecommute Options
No remote/telework allowed
Job Locations US-VA-McLean
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 11:34 AM)
- Synthesizes intelligence information from multiple outlets into customer-specific reporting formats. - Manipulate myriad classified and open-source databases to aid in intelligence reporting. - Identify potential counterintelligence concerns/vulnerabilities. - Produce detailed targeting packages, written products and briefings.
Requisition ID
2024-145448
Telecommute Options
No remote/telework allowed
Job Locations US-GA-Fort Gordon
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 2:20 PM)
Peraton seeks a DevSecOps Engineer to support the design, implementation, and maintainance of  modern cloud infrastructure, with a focus on AWS for hosting DevSecOps tools.  Location:  Fort Eisenhower, GA. This position requires working closely with DoD and Army cybersecurity organizations to ensure secure and reliable infrastructure operations. The role involves architecting cloud solutions that support scalable, secure DevSecOps tools across AWS, Azure, and on-premises environments. Collaboration with cybersecurity teams is essential to enforce security measures across the multi-cloud ecosystem. The ideal candidate will have experience in platform development, Infrastructure as Code, Kubernetes, and CI/CD technologies, with a deep understanding of AWS and Azure platforms.   Tasks include: • Responsible for the overall design and implementation of modern cloud infrastructure and associated containerizations and software development platform. • Work with DoD and Army cyber organizations to ensure connectivity and reliable operations of the infrastructure. • Design and Implement Cloud Infrastructure in AWS:  focus on architecting and deploying modern cloud infrastructure specifically in AWS to serve as the primary hosting environment for DevSecOps tools, ensuring that these tools are scalable, secure, and resilient. • Ensure DevSecOps Tool Availability Across Multi-Cloud and On-Premises: Develop strategies and implementations that enable the secure and efficient distribution and operation of DevSecOps tools across the AWS and Azure platforms, as well as on-premises environments.  • Collaborate with Cybersecurity Teams to enforce strict security measures that are consistent and effective across the multi-cloud ecosystem and on-premises, focusing on securing the DevSecOps tools and the data they handle.
Requisition ID
2024-145445
Telecommute Options
Flexible for occasional telework
Job Locations US-AE-Vicenza
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 12:08 PM)
Peraton is currently seeking a talented Set the Theater Research Analyst to become part of Peraton’s U.S. Army Africa Mission Support program, which works to serve and protect U.S. Army forces operating and training in Africa.   Location: This position will be located in Vicenza, Italy.   Role: The Set the Theater Analyst will provide planning and operational support to the SETAF-AF G3 Directorate for a variety of supported Campaign Plan Lines of Effort and Objectives, Steady State Operations, Contingency Operations, Humanitarian and Disaster Relief Missions, Exercises, and other planning requirements to include open source intelligence and the task management of orders and messaging.  In this role, you will support the Set the Theater planning process for a Department of Defense agency serving and protecting U.S. Army personnel operating in austere and challenging locations.   What you’ll do: The Set the Theater Analyst will be responsible for the following, but not limited to: - Provide the G3 enterprise development and planning support for SETAF-AF exercises, real world activities, and orders and messaging utilizing the Task Management Tool. - Participate in planning efforts and working groups, providing executive summaries from B2C2WGs, producing staff estimates, developing Concepts of Intelligence, producing written reports, presentations, orders, respond to request for information (RFI), and provide other deliverables as required. - Conduct data entry and digital publishing on multiple platforms and Department of Defense systems of record to include but not limited to SharePoint, Office 365, C2IE, CPCE, BICES, and other systems as required. - Provide methods, results, and recommendations of identified issues and concerns to better synchronize and integrate Intelligence equities supporting the SETAF-AF Campaign and Objectives. - As required assist in providing detailed research, analysis, and assessments on all 53 Countries in the U.S. AFRICOM Area of Responsibility (AOR) and other contingency operations locations. - As required define the holistic operational environment to include critical infrastructure and identify intelligence gaps and provide analysis that considers risk, mitigation, and potential solutions for the Army to conduct intelligence operations in a competitive environment. #SETAF
Requisition ID
2024-145444
Telecommute Options
No remote/telework allowed
Job Locations US-GA-Fort Gordon
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 12:25 PM)
Peraton seeks a Cyber Threat Planner to support the ARCYBER G25.  Location: Fort Eisenhower, GA.  In this role, you will provide strategic, operational and some tactical intelligence planning, enabling situational awareness and threat warning, delivering intelligence products, and assisting ARCYBER’s targeting efforts in the human and information dimensions.  Demonstrated experience in IO / EW is strongly desired.   Tasks include: Provide a broad range of research, programmatic, and administrative functions in support of programming, capabilities, integration, organizational design, and force integration, as required. - Support current and long-term planning for Cyber Intelligence Preparation of the Environment (CIPE) and Course of Action (COA) development. - Participate in exchanges with partners, develop contacts with counterparts, establish analytic collaboration (i.e., subordinate units, higher agencies, the IC, and external partners) to maintain situational awareness to support services and joint common operations and to conduct intelligence and for information sharing. - Support the integration of OSINT collection, analysis, production, and dissemination of publicly available information. - Comply with DoD Directive (DoDD) 5148.13 Intelligence Oversight Section 4: report any Questionable.
Requisition ID
2024-145443
Telecommute Options
No remote/telework allowed
Job Locations US-DC-Washington
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 11:22 AM)
The CCNA / Networking Training Specialist will design, develop, and deliver hands-on training and assist with eLearning curriculum for adult learners. - Develops courseware, delivers training, sets up and maintains training environment, and uses student satisfaction survey input to evaluate and improve courseware. - Writings training manuals (instructor and participant guides), collaboration/wiki articles and user manuals. - Designs and produce training tools, such as printable job aids, how-to articles, practice exercises, assessments, and quick reference guides. - Delivers train-the-trainer and instructor-led training. - Serve as the primary customer representative for development and delivery of customized training solutions and documentation. - Works with subject matter experts to determine training requirements and deliver training to support these requirements. - Encourages classroom participation and facilitates change management for target audience. - Evaluates and adapts to variances in learning styles within an audience. - Efficiently works in fast-paced, dynamic environment with varying priorities. - Effectively works with a cross-functional team (cybersecurity, application developers, network engineers, subject matter experts and management). - Produces professional deliverables using Microsoft Office suite and collaboration tools, such as Confluence.
Requisition ID
2024-145435
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Annapolis Junction
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 4:38 PM)
Peraton has an immediate opportunity for a cleared Software Engineer to join our team here in Annapolis Junction, MD. We need a software engineer who can perform the following tasks: - Develop, maintain, and enhance complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm  development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. - Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. - Resolves software problem reports. Utilizes software development and software design methodologies appropriate to the development environment. - Provides specific input to the software components of system design to include hardware/software trade offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and requirements analysis and synthesis from system level to individual software components.
Requisition ID
2024-145434
Telecommute Options
Flexible for occasional telework
Job Locations US-MD-College Park
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 4:27 PM)
This position is an integral member of the Peraton Labs Network Systems and Cyber Mission Sector team supporting a customer site in College Park, Maryland.   Responsibilities may include: - Implement, maintain, and enhance complex and diverse research infrastructure systems and their appropriate security posture. - Perform Linux and Microsoft Windows system administration tasks. - Windows and Linux server system administration - Integrating GOTS/COTS/open-source solutions - Virtualization technologies - Networking and TCP/IP protocols - Storage technologies - Remote access - Install, configure, and troubleshoot IT/networking hardware and software in classified and unclassified spaces; Activate network ports including patch network when needed. - Interface with the customer as well as monitor and direct subcontract tasking - Implement, maintain, and enhance a complex and diverse development environment. - Prepare and maintain images for Linux and Microsoft Windows operating systems. - Configure new systems and apply best practice security configuration on computers, servers, and network equipment. - Perform system and anti-virus tool updates regularly. - Install, configure and troubleshoot hardware, networking devices and software. - Implement physical controls. - Physically setup, cable, and power computers in classified and unclassified spaces for new programs or new computer additions; Activate network ports including patch network when needed. - Devise information system backup mechanism for program’s specific requirements; perform system/date backup and archive logs according to security plan; exercise system and data recovery procedures regularly. - Create custom solution or provide commercial tool recommendations to automate audits procedures where SCAP Compliant Checker lacks proper functions to support. Examples include automated log rotation, mechanism to alert audit process failures, or scripts to detect inactive accounts. - Support ISSM to perform audit tasks as needed. - Develop and execute approved procedures for sanitizing and releasing system components and media. - Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. - Complete required trainings timely
Requisition ID
2024-145433
Telecommute Options
No remote/telework allowed
Job Locations US-NC-Fort Liberty
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 3:39 PM)
Peraton requires Storage Administrators to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3. Positions are located at the SOCOM Headquarters at MacDill, AFB FL, and at the TSOC and Component locations in the United States and abroad.   The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and  common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365.   Duties and responsibilities include but are not limited to: • Plans, leads, and independently executes storage administration in support of SIF/SIT requirements. • Ensures that storage area networks (SAN) and associated technologies provide expected benefits of safe and secure data through effective storage operations. • Establishes, updates, and analyzes system authentication protocols ensuring systems are optimized and prevent waste of resources. • Make required modifications and upgrades as required using solid ITIL change management processes to storage equipment and software. • Documents processes, procedures, upgrades, and the resolution of problems • Upgrades software, monitors performance, and evaluates trends and needs • Manages, transforms, and provides user access to large datasets • Installs, configures, supports, and maintains SANs and associated technology • Administers storage networks, servers, and their associated schedules • Supports team responses to incidents, reconfigurations, installations, or other physical changes • Performs troubleshooting on systems performance data from tools such as OS and application logs, Splunk and RavenVision. • Reviews and approves system and operational documentation and schematic diagrams (using tools such as Microsoft Word and Visio). • Some positions may require working a non-traditional work schedule to support the needs of the customer.
Requisition ID
2024-145432
Telecommute Options
No remote/telework allowed
Job Locations US-WA-Fort Lewis
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 9:36 AM)
Peraton is seeking a Machine Learning Operations (MLOps) Engineer to support the Multi Domain Task Force at Joint Base Lewis McChord, WA. As an MLOps Engineer, you will apply your understanding of data networks, databases, and cloud architecture to collect, gather, process, store, and provide timely data. This work will be CI/CD and MLOps based, supporting the data-driven decision process.   Tasks include: - Requirements Collaboration: Collaborates closely with customers, machine learning, and data science teams to thoroughly understand data science project requirements and objectives. - MLOps Leadership: Champions practices and tools for managing the end-to-end lifecycle of machine learning models. Includes: Data Versioning and Management, Model Versioning, Model Training and Validation Pipelines, Model Deployment and Monitoring, Infrastructure as Code (IaC), Collaboration and Governance, Security and Compliance. - CI/CD Support: Takes the lead in implementing robust Continuous Integration (CI) and Continuous Deployment (CD) code management pipelines for machine learning models. Ensures seamless automation of critical development stages, resulting in high-quality software releases and reduced errors. - Model Lifecycle Management: Ensures proper model training, validation, deployment, and ongoing monitoring. Maintains lifecycle model health and performance. - Infrastructure Design: Establishes infrastructure tailored to project requirements and constraints, enabling efficient model development and deployment.
Requisition ID
2024-145430
Telecommute Options
No remote/telework allowed
Job Locations US-CA-El Segundo
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 7:09 AM)
Ready to make an impact! Peraton is seeking an experienced Senior Crypto/COMSEC Cyber Engineer to work side by side with our client in El Segundo, CA!   As an engineer on our team, you’ll work with Peraton on the Remote Sensing SE&I program with the U.S. Space Force to develop and rapidly deploy the next generation of resilient Missile Warning (MW), Tactical Intelligence, Surveillance, and Reconnaissance (TISR), and Environmental Monitoring (EM) capabilities to deter attacks and provide critical information to our war-fighters to defeat our enemies in battle.  Your customer will trust you to not only test, analyze, evaluate, validate, and verify these systems, but also identify areas requiring urgent mitigation up front and early to develop this system with advanced technology solutions.    Grow your skills by merging innovative engineering methodologies and cross-disciplinary coordination to create tomorrow’s solutions. Join our team and create the future of Remote Sensing in the Space Force.    **Due to the nature of work performed within this facility, U.S. citizenship is required**   The Senior Crypto/COMSEC Cyber Engineer will be responsible for the following but not limited to: - Provides feedback to design engineers and evaluates end-to-end systems and systems-oriented products through their entire life cycle. - Working as expert, conducts research and evaluates technical performance of software products and overall segments and systems. - Ensures products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verification methods. - Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks. - Assesses performance using evaluation criteria and technical performance measures. - Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis. - Participates in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements. - Reviews test plans/procedures and ensures they verify/validate the requirements. - Develops and maintains analytical procedures to meet changing requirements. - Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and operations officials. - Monitors for continual process improvement and lessons learned, and reports to management periodically.
Requisition ID
2024-145429
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:03 PM)
Responsibilities include, but are not limited to: • Monitor and acti on SIEM platforms for alerts, events, and rules providing insight into malicious activities and/or security posture violatons • Review intrusion detection system alerts for anomalies that may pose a threat to the customer’s network • Identify and investigate vulnerabilities, asses exploit potential, and suggest analytics for automation in the SIEM engines • Report events through the incident handling process of creating incident tickets for deeper analysis and triage activities • Classify incident reports IAW Army and DoD regulations after identifying root cause and issuing remediation actions to system owners • Perform post intrusion analysis to determine shortfalls in the incident detection methods • Develop unique queries and rules in the SIEM platforms to further detection for first line cyber defenders • Determine IDS/IPS rule false positi ves to recommend tuning of rules to reduce noise and inceaefidelity • Respond to the higher headquarters on incidents and daily reports • Provide daily updates to Defensive Cyber Operations staff on intrusion detection operation and trends of events causing incidents • Prepare charts and diagrams to assist in metrics analysis and problem evaluation, and submit recommendations for data mining andanalytical solutions • Write reports of remotely exploitable vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis and other duties as assigned • Travel to customer sites to perform network security evaluations • May perform documentation and vetting of identified vulnerabilities for operational use
Requisition ID
2024-145426
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 2:12 PM)
Responsibilities include, but are not limited to: • Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects • Responsible for the end-to-end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments • Responsible for scoping, planning, executing, and monitoring the projects to keep projects on schedule, on budget, and following appropriate protocols with Technical Operations, Application Development and Business Intelligence teams • Performs strategic planning, coordination of a roadmap, development, construction, and implementation plan to address the software platform for the organization • Serves as CIO's representative on all application development projects, working with department heads to ensure seamless transition of new and existing customers in all aspects of IT and business operations • Works with new business implementation leads to identify workflows, protocols, information gathering for new client implementations • Develops project plans to manage the end-to-end project activities and execution approach • Establishes software development processes and metrics that measure and improve team performance • Establishes a Process Framework for all Development enhancements, projects, and releases. • Participates and works with Software Architects and Developers in the analysis and development of business requirements • Establishes and manages project timelines, goals, and objectives
Requisition ID
2024-145425
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:05 PM)
Responsibilities include, but are not limited to: • Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer • Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations on customer systems • Perform planning, execution, and documentation of penetration testing missions in accordance with Red Team methodologies • Perform web application testing using tools such as Burp Suite, Zap Proxy, Skipfish and Nikto, and open source toolsets • Travel to customer sites to perform network security evaluations, penetration tests, and brief customers on findings • Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques and procedures and how to apply them. Brief staff and leadership on these findings • Perform open-source intelligence gathering to prepare for missions • Write reports of vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis, System Administration, and other duties asassigned • Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations • Write reports of remotely exploitable vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Prepare and present technical reports and briefings
Requisition ID
2024-145424
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:09 PM)
Responsibilities include, but are not limited to: • Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems • Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findings • Evaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusions • Perform analysis of complex software systems to determine both functionality and intent of software systems • Resolve highly complex malware and intrusion issues • Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations • Create analytics with a SIEM to identify patterns, anomalies, and compromising indicators to alert Cyber Incident responders • Prepare and presents technical reports and briefings • Perform documentation and vetting of identified vulnerabilities for operational use • Assist all sections of the Defensive Cyber Operations team as required in performing analysis • Travel to customer sites to perform network security evaluations • Write reports of vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture
Requisition ID
2024-145423
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:06 PM)
Responsibilities include, but are not limited to: • Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers • Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies • Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics • Requires experience with application security, network security, reverse engineering, or malware • Requires strong knowledge of worms, viruses, Trojans, rootkits, botnets, Windows internals, and the Win32 API • Extensive experience required in programming (assembly and web) and system analysis with various tools, including IDA Pro, Ollydbg, PCAP tools, or TCP Dump
Requisition ID
2024-145422
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:08 PM)
Responsibilities include, but are not limited to: • Applies ITIL experience in performance analysis and development of existing processes, procedures and methods to promote effective business and systems operations through standardization, improvement, simplification and discontinuance • Provides ITIL subject matter expertise to develop, improve, integrate, measure, and report on operational processes throughout network • Leverages expertise in the identification, development, implementation, and monitoring of Continual Service Improvement (CSI) and Continuous Process Improvement (CPI) opportunities and initiatives • Performs Root Cause Analysis (RCA) and creates RCA reports to document lessons learned and CSI / CPI opportunities • Applies best business practices to assess, develop, maintain, and update ITIL infrastructure documentation • Provides ITIL training and facilitate knowledge transfer among Contractor and Government personnel • Recommends vision, strategy, and goals for each process to the Government. Recommend, for Government approval, and track an objective measurement structure to evaluate the current state of each process • Identifies and recommends improvement actions • Gathers, processes, and analyzes the process data used to report information to the Program Manager • Manages small to large projects in a cross-functional environment
Requisition ID
2024-145421
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Arlington
Requisition Post Information* : Posted Date 2 weeks ago(4/11/2024 6:16 PM)
Peraton is seeking a Senior Cyber Analyst - Team Lead to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.   Location: Rosslyn, VA.  Hybrid - See below:  Our customer requirement requires every employee to be on-site for approx. 90 days or until on-boarding is completed and Telework is approved. After the on-boarding period, a hybrid schedule may be offered.   In this role, you will:  - Perform consolidated and comprehensive information and intelligence analysis of threat data obtained from classified, proprietary, and open source resources to provide indication and warnings of impending attacks against information systems and personnel. - Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors. - Perform cyber and technical threat analyses of foreign countries, hacker groups, terrorist organizations and other entities with capabilities that could pose potential harm. - Assess the cyber threat environment for US Missions worldwide. - Provide cyber security guidance to personnel on threats to external accounts (e.g. employee personal accounts, official social media, etc.). - Provides supervisory guidance to team members, in accordance with customer and leadership objectives: - Allocate and manage contract resources. - Manage analysts’ day-to-day schedules, delegate tasks, and communication of goals. - Manage project/product progress and ensure metrics are met and reported. - Facilitate training and provide coaching to team members to fill in skill set gaps. - Identify training requirements and develop internal/external training plans. - Represent the team, and advocate for the team’s needs and additional resources - Ensures timely completion of tasks and quality of products and deliverables. #DSCM
Requisition ID
2024-145420
Telecommute Options
Flexible for occasional telework
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:07 PM)
Responsibilities include, but are not limited to: • Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS • Provide liaison support between the system owner and other IS security personnel • Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to risk assessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) • Coordinate system owner concurrence for correction or mitigation actions • Monitor security controls for ISs to maintain security Authorized to Operate (ATO) • Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase • Ensure that changes to an IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) • Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Requisition ID
2024-145419
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:14 PM)
Responsibilities include, but are not limited to: • Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems • Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols • Reports events or incidents that occur to mitigate immediate and potential network and host threats • Perform Incident Response through analysis of malicious data-sets and publicly known exploits or vulnerabilities for the creation of custom detection and prevention methods. Perform log analysis and event correlation to identify anomalous traffic. Upon discovery of anomalous traffic, initiate incident response in accordance with the Cyber Incident Response Plan (CIRP). • Perform computer forensics to assistance with internal investigations in accordance with DoD standards and industry best practices • Provide cyber threat summaries, to include all incident response activities directly affecting CND or supporting activities. • Monitor other service, DOD, and industry Computer Emergency Response Teams (CERT) Alerts, Warnings and Advisories, and use information gathered to protect associated systems
Requisition ID
2024-145417
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 2:11 PM)
Responsibilities include, but are not limited to: • Designs, develops, and implements cloud-based solutions • Designs cloud architecture and completes plans and specifications to develop solutions • Collaborates with product managers and engineers to develop specifications for new cloud-based products/services, applications, and solutions • Drives the roll-out of cloud management platforms, evaluates its performance and implements enhancements • Develops and enriches the product portfolio of cloud services and value-added services. • Creates solution recommendations to include Basis of Estimate for cloud services • Evaluates the cost/benefit of cloud vs. virtual private networks vs. dedicated hosting vs. in house solutions and identifying portions of the organization’s IT platform/infrastructure with the highest potential return for cloud deployment • Performs operations and maintenance of secure managed cloud platform solutions • Implements and maintains automation to enhance operation, alerting, and auto remediation of events. Develops, maintains, and deploys infrastructure as code using CI/CD pipelines
Requisition ID
2024-145414
Telecommute Options
No remote/telework allowed