AECOM Technology Corporation has flagged the Information Assurance / Cyber Security - Intrusion Analyst job as unavailable. Let’s keep looking.

Specialist, Information System Security II, SISS2

Peraton

This is an exciting new program and our Intelligence Analysts will have the opportunity to:

  • Be responsible for the overall collection of operational and logistical data for assigned UAS at assigned location.
  • Verify all data for accuracy, make appropriate changes to improve the accuracy, and transmit the data via established timelines and procedures.
  • Acts as focal point for quality control from other sites, runs edits, corrects errors, and responds to customer contract requirements.
  • Collects operational and logistical data on all assigned UAS platforms at your assigned location.
  • Participates as a team member performing threat analyses based on knowledge on electronic warfare/intelligence systems and concept.
  • Contributes to development of analytical threat models and provides functional guidance and direction to threat studies team in overall conduct of project(s).
  • Supports team performing expert-level research and analysis of intelligence and related data support of threat studies. Provides advice, guidance, and direction to threat studies team.
  • Supports team providing other technical services such as computer software system design/development, installation and integration planning, testing, and support of a wide range of systems that support intelligence functions.
  • Meets with corporate and customer representatives project team members to facilitate and coordinate study activities.
  • Conducts project briefings to assess study progress and to ensure consistency in meeting study objective.
  • Participates in and manages the preparation of proposals in response to RFPs from potential customers.
  • Assists other corporate representatives in related proposal development.
  • Prepares, submits, and presents reports and issue papers to customer representatives.

Basic Qualifications:

  • TS/SCI with polygraph
  • Associate degree or higher in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering from an accredited college or university and 2 years of experience in the field and CASP+, CCSP, Cloud+, or CLSSP certifications OR
  • 4 years of experience as a Threat Analyst with experience in either Host analysis or Network analysis managing SIEM or SOAR platforms such as Elastic, Splunk, Sentinel or other open-source or government provided solutions OR
  • 4 years of experience in Offensive Cyber Operations as an Exploitation Analyst. OR
  • 4 years of experience in the SIGINT community as a Target Digital Network Analyst or Digital Network Exploitation Analyst
  • Detailed knowledge of threat/war doctrine and concepts and threat forces.
  • Knowledge of advanced threat analysis technology in such areas as telecommunications, computer science, electronic warfare and/or nuclear/biological, or chemical warfare.
  • Detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods and production resources and responsibilities.
  • Skills and abilities in supervising the handling classified information.
  • Working knowledge with military order of battle, chain of command and communications/information security.
  • Strong knowledge of technology related to electronic warfare.

Demonstrated Experience in at least 3 of the following:

  • Correlation of data from multiple sources, including host, network, user, and intelligence reports to uncover threats.
  • Collection, aggregation, and interpretation of log data from various sources.
  • Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort, Yara, and Sigma.
  • Deep packet inspection and identification of malicious traffic using packet analysis tools, such as Wireshark or Network Miner.
  • Threat hunting to identify advanced persistent threats and zero-day vulnerabilities using various threat hunting methodologies

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.

Read Full Description
Confirmed 7 hours ago. Posted 30+ days ago.

Discover Similar Jobs

Suggested Articles