Cyber Defensive Operator III
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Qualifications
Requires:
Expert in Cyber Warfare techniques, methods, and processes.
Experience detecting, monitoring, analyzing, and mitigating cyber threats.
Familiarity with CJCSM 6510.01B
Edu/Exp: HS 16+ Years, BA/BA 10+ Years, or MA/MS 8+ Years.
Requires TS//SCI clearance with a CI POLY and MADO SIP cleared for Fort Gordon, GA.
Requires IAT Level II AND CSSP. Must hold the appropriate DoD 8570.01 baseline certification prior to beginning work.
Support a 12x5 shift schedule (with on call surge support as required)
Responsibilities
Support ARCYBER G3 Defensive Cyber Operations (DCO) Respond Team.
Tasks include:
-provide detection, correlation, identification, and characterization of questionable cyber activity
- execute internal response actions or direct/coordinate response actions from external cyber forces as appropriate.
- provide status updates to the Monitor
Team for tracking and situational awareness
- assist in executing Respond Team activities
- Maintain artifacts required to for ARCYBERs certification and accreditation as a CSSP
- Provide daily/weekly/monthly briefing and/or report of operations
- Provide planning support for DCO or Crisis Action Team (CAT) events.
General Duties:
Provides feedback to design engineers and evaluates end-to-end systems and systems-oriented products through their entire life cycle. Working as expert, conducts research and evaluates technical performance of software products and overall segments and systems. Ensures products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verification methods. Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks. Assesses performance using evaluation criteria and technical performance measures. Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis. Participates in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements. Reviews test plans/procedures and ensures they verify/validate the requirements. Develops and maintains analytical procedures to meet changing requirements. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and operations officials.
Industry
Posted: 2021-06-29 Expires: 2023-06-07