We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Cyber Security Analyst

Peraton
United States, D.C., Washington
Mar 28, 2025

Cyber Security Analyst
Job Locations

US-DC-Washington


Requisition ID
2025-155730

Position Category
Intel and Threat Analysis

Clearance
Top Secret/SCI



Responsibilities

Peraton is currently seeking a Cyber Incident Response Analyst ll to support a government Cyber Security Operation Center (CSOC). The program provides comprehensive Computer Network Defense and Incident Response support monitoring and analysis of potential threat activity targeting the enterprise. The Incident Response Analyst will conduct security event monitoring, advanced analytics, and response activities in support of the CND operational mission. We are seeking candidates with diverse backgrounds in cyber security systems operations, analysis and incident response.


Position Description:

    Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity, host activity, and data. This includes, but is not limited to: network flow (i.e. netflow) or related forms of session summary data, signature-based IDS/IPS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types).
  • Triage IDS/IPS alerts, collect related data from various systems, review open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.
  • Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
  • Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
  • Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
  • Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
  • Develop IDS/IPS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
  • Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
  • Develop security metrics and trend analysis reports


Qualifications

Required:

  • BS with 2+ Years of relevant experience, MS with 0 Years, 4 additional relevant years of experience may be considered in lieu of a degree
  • Active TS/SCI clearance is required
  • Bachelor's degree in Computer Science, Information Systems, or equivalent education or work experience (additional relevant work experience can be substituted for a degree)
  • Must have a current DoD 8570.1-M IAT Level II certification

Desired Skills:

  • Desired Certifications: CEH, GCIH, GCIA, GCFA
  • 1+ year in a SOC or Incident Response role
  • Experience with Cisco Firepower, Cisco Sourcefire, Cisco Advanced Malware Protection, Cisco Stealthwatch, Cisco Umbrella
  • Experience with deploying and writing signatures (Snort, YARA, HIPS)
  • Experience with network hunting utilizing Zeek/Bro
  • Experience with McAfee ePO, HBSS
  • Splunk: Create log searches, dashboards, setting up alerts, and scheduled reports to help detect and remediate security concerns.
  • Experience with ArcSight
  • Experience with Wireshark and packet analysis
  • Experience with Tanium or other endpoint solutions
  • Working knowledge of scripting languages such as Python, PowerShell, Shell
  • Knowledge of Regular Expressions
  • Knowledge of server and client operating systems
  • Participate in development and reporting of security metrics
  • Experience in a SOC or Incident Response role

Benefits: Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.



Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.



Target Salary Range

$104,000 - $166,000. This represents the typical salary range for this position based on experience and other factors.


EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Applied = 0

(web-6468d597d4-w6ps7)