Cyber Security Analyst
Company: Peraton
Location: Washington
Posted on: April 24, 2025
Job Description:
ResponsibilitiesPeraton is currently seeking a Cyber Incident
Response Analyst lll to support a government Cyber Security
Operation Center (CSOC). The program provides comprehensive
Computer Network Defense and Incident Response support monitoring
and analysis of potential threat activity targeting the enterprise.
The Incident Response Analyst will conduct security event
monitoring, advanced analytics, and response activities in support
of the CND operational mission. We are seeking candidates with
diverse backgrounds in cyber security systems operations, analysis
and incident response.Position Description:
- Perform technical analysis on a wide range of cybersecurity
issues, with a focus on network activity, host activity, and data.
This includes, but is not limited to: network flow (i.e. netflow)
or related forms of session summary data, signature-based IDS/IPS
alert/event data, full packet capture (PCAP) data, proxy and
application server logs (various types).
- Triage IDS/IPS alerts, collect related data from various
systems, review open and closed source information on related
threats & vulnerabilities, diagnose observed activity for
likelihood of system infection, compromise or unintended/high-risk
exposure.
- Prepare analysis reports detailing background, observables,
analysis process & criteria, and conclusions.
- Analyze large volumes of network flow data for specific
patterns/characteristics or general anomalies, to trend network
activity and to correlate flow data with other types of data or
reporting regarding enterprise-wide network activity.
- Leverage lightweight programming/scripting skills to automate
data-parsing and simple analytics. Document key event details and
analytic findings in analysis reports and incident management
systems. Identify, extract and characterize network indicators from
cyber threat intelligence sources, incident reporting and published
technical advisories/bulletins.
- Assess cyber indicators/observables for technical relevance,
accuracy, and potential value/risk/reliability in monitoring
systems. Recommend detection and prevention/mitigation signatures
and actions as part of a layered defensive strategy leveraging
multiple capabilities and data types.
- Develop IDS/IPS signatures, test and tune signature syntax,
deploy signatures to operational sensors, and monitor and tune
signature and sensor performance.
- Fuse open-source threat & vulnerability information with data
collected from sensors across the enterprise into cohesive and
comprehensive analysis.
- Develop security metrics and trend analysis
reports.QualificationsRequired:
- BS with 5-7 Years of relevant experience, MS with 3-5 Years or
PHD with 0-2 Years of relevant experience; 4 additional years of
relevant experience may be considered in lieu of a degree.
- Active TS/SCI clearance is required.
- Bachelor's degree in Computer Science, Information Systems, or
equivalent education or work experience (additional relevant work
experience can be substituted for a degree).
- Must have a current DoD 8570.1-M IAT Level II
certification.Desired Skills:
- Desired Certifications: CEH, GCIH, GCIA, GCFA.
- 3+ years in a SOC or Incident Response role.
- Experience with Cisco Firepower, Cisco Sourcefire, Cisco
Advanced Malware Protection, Cisco Stealthwatch, Cisco
Umbrella.
- Experience with deploying and writing signatures (Snort, YARA,
HIPS).
- Experience with network hunting utilizing Zeek/Bro.
- Experience with McAfee ePO, HBSS.
- Splunk: Create log searches, dashboards, setting up alerts, and
scheduled reports to help detect and remediate security
concerns.
- Experience with ArcSight.
- Experience with Wireshark and packet analysis.
- Experience with Tanium or other endpoint solutions.
- Working knowledge of scripting languages such as Python,
PowerShell, Shell.
- Knowledge of Regular Expressions.
- Knowledge of server and client operating systems.
- Participate in development and reporting of security
metrics.
- Experience in a SOC or Incident Response role.Benefits: Peraton
offers enhanced benefits to employees working on this critical
National Security program, which include heavily subsidized
employee benefits coverage for you and your dependents, 25 days of
PTO accrued annually up to a generous PTO cap and participation in
an attractive bonus plan.Peraton OverviewPeraton is a
next-generation national security company that drives missions of
consequence spanning the globe and extending to the farthest
reaches of the galaxy. As the world's leading mission capability
integrator and transformative enterprise IT provider, we deliver
trusted, highly differentiated solutions and technologies to
protect our nation and allies. Peraton operates at the critical
nexus between traditional and nontraditional threats across all
domains: land, sea, space, air, and cyberspace. The company serves
as a valued partner to essential government agencies and supports
every branch of the U.S. armed forces. Each day, our employees do
the can't be done by solving the most daunting challenges facing
our customers. Visit peraton.com to learn how we're keeping people
around the world safe and secure.Target Salary Range$135,000 -
$216,000. This represents the typical salary range for this
position based on experience and other factors.EEOEEO: Equal
opportunity employer, including disability and protected veterans,
or other characteristics protected by law.
#J-18808-Ljbffr
Keywords: Peraton, Centreville , Cyber Security Analyst, Professions , Washington, Virginia
Didn't find what you're looking for? Search again!
Loading more jobs...