Peraton
Cyber Intelligence Threat Analyst
This job is now closed
Job Description
- Req#: 2025-156441
- Minimum of 5 years experience in Cyber Systems Engineering with a Bachelor’s degree in a STEM field or Business Administration; an additional 4 years of experience in lieu of degree may be considered.
- Must be able to qualify for technical expert status accreditation (TESA) by having a bachelor's degree in a STEM field or Business Administration plus 3 years of specialized experience OR an associate’s degree plus 7 years of specialized experience OR a major certification plus 7 years of specialized experience.
Certification:
Active DoD Approved 8140 Certification for DCWF: 541 Intermediate (Security+, GCED, GCIH, GICSP, GSEC, PenTest+, or an Advanced certification as listed in the current 8140 matrix)
8140 Residential within 90 days of acceptance (any SANS GIAC Certification, Microsoft Certified Security Operations Analyst Associate, Zero Point RTO, or Offensive Security OSDA).
- U.S. citizenship required.
- An active DoD Top Secret security clearance.
- Full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations.
- Fluent in all aspects of government and corporate communications media to include all MS Office products and common task ticketing systems.
- Must have a good breadth of knowledge of common ports and protocols of system and network services.
- Must have the demonstrated ability to communicate with a variety of stakeholders in a variety of formats.
- Proven experience working with Security Information and Event Management (SIEM) tools to create analytics and detect patterns or anomalies.
- Strong understanding of adversary tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework.
- Demonstrated ability to analyze complex software systems, identifying functionality, intent, and potential vulnerabilities.
- Knowledge of network protocols, operating systems, and cybersecurity principles.
- Experience conducting cyber threat research and presenting findings to technical and non-technical stakeholders.
- Ability to resolve advanced malware and intrusion issues and design effective countermeasures.
- Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations.
- Experience with intrusion detection systems such as Snort, Suricata, and Zeek.
- Strong written and verbal communication skills for preparing technical reports and delivering briefings to leadership and stakeholders.
- Assist all sections of the Cyber Security Service Provider Division as required in performing Analysis and other duties as assigned.
- Experience with the Elastic SIEM.
- Experience in packet captures and analyzing a network packet.
- Experience with intrusion detection systems such as Snort, Suricata, and Zeek.
- Experience with SIEM systems such as Splunk, ArcSight, or Elastic.
- Experience with Microsoft Windows event IDs.
- Experience with Linux audit log analysis.
- Familiarity with Git and VScode.
- Experience with one or more scripting languages such as PowerShell, Bash, Python.
- Self-starter with excellent judgment, capable of independent decision making.
- Working as an expert, conduct research and evaluate audit data with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US DoD information networks.
- Analyze host and network events to determine the impact on current operations.
- Conduct research to determine advisory capability and develop analytics based on indicators of compromise to leverage the SIEM.
- Execute hunt missions for various threat actors to determine the risk to the DoD information network and recommend mitigations to reduce the attack surface.
- Prepare assessments and cyber threat reports of current events based on the research and analysis of classified and open-source information.
- Correlate threat data from various sources.
- Develop and maintain analytical procedures to meet changing requirements and ensure maximum operations.
- Produce high-quality papers, presentations, recommendations, and findings for senior U.S. government intelligence and network operations officials.
Requirements:
Additional requirements include:
Preferred Qualifications:
Peraton is currently seeking an experienced Cyber Intelligence Threat Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).
Location: Wiesbaden, Germany. On-site, full-time.
In this role, you will be:
#RCC-E
About the company
Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure.
Notice
Talentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at accessibility@talentify.io or 407-000-0000.
Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility.
An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: www.talentify.io/bias-audit-report. NYC applicants may request an alternative process or accommodation at aedt@talentify.io or 407-000-0000.