Job Details

ID #16402071
State Virginia
City Chantilly
Job type Permanent
Salary USD TBD TBD
Source Perspecta
Showed 2021-07-06
Date 2021-07-01
Deadline 2021-08-30
Category Architect/engineer/CAD
Create resume

Cyber Analyst IV

Virginia, Chantilly, 20151 Chantilly USA

Vacancy expired!

Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.

We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.

As a government contractor, Peraton abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).

Qualifications
  • Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
  • Bachelors degree (or equivalent) in CS, IS, Comp Engineering, or Math
  • Minimum of decree plus six years of direct experience in Intelligence Community cyber analysis or cyber targeting (e.g. selectors targeting, monitoring, behavior analysis or verification, reporting, technical analysis, or counterintellingence)
  • Demonstrated proficiency with Splunk and Python
  • Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
  • Demonstrated working knowledge of telecommunications protocols
  • Demonstrated working knowledge of IC data sets and tools for telecommunications analysis
  • Demonstrated ability to work well with teams or individually with minimal supervision

Desired Qualifications:
  • Masters degree in Computer Science, Information Systems, Cyber Security, Computer Engineering, Information Assurance, or related technical field
  • Familiarity with other IC agencies
  • Computer network defense experience
  • Relevant certification (CISSP, CCNA, CEH, etc.)
  • Experience with operational communications

Responsibilities At Peraton, we help our customers achieve their missions, transform to digital environments, secure, modernize and optimize their enterprises, and innovate for the future.

The Cyber Analyst is responsible for the following:
  • Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment.
  • Detects anomalous activity in raw and processed log files for deeper exploration using IC tools and databases. Differentiates between general and targeted or suspicious scanning.
  • Identifies trends cyber systems and performs behavior analysis. Uses Splunk dashboards to create alerts and investigate log files.
  • Correlates threat data from various sources.
  • Writes concise assessments that highlight findings supported by evidence, articulating the impact of conclusions.

Vacancy expired!

Subscribe Report job