Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.
As a government contractor, Peraton abides by the following provision
Pay Transparency Nondiscrimination ProvisionThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).
Qualifications - Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
- Requires an active DOD TS/SCI Security Clearance.
Responsibilities Plans and develops internal analysis strategies to provide innovative methods and assistance in social network intelligence analysis and presentation of the findings in support of other team members analysis. Strategies and methods may focus on individuals, groups, events, locations, or special associations, based on the project needs. Provides specific skills and understanding of the regional media environment and different technologies to engage on weblogs. Tracks key communicators (media outlets, journalists, academics, terrorists, government officials, NGO leaders, etc.) to map the influence of each within the media space. Track penetration and resonance of quotes and statements to measure viral effectiveness of themes and messages over time. Locates, synthesizes, and interprets large amounts of textual and technical data such as IIRs, FINTEL, filtered real-time data feeds, message traffic, directed-searches results, and task-specific, specialized data sources. Performs appropriate methods of social network analysis to meet specific project needs. Methods may include classification, pattern analysis, trend/geo-temporal studies, and link analysis based on analysis of transaction data, message (phone, e-mail, blog) traffic, and other data sources in collaboration with other project analysts. Assemble facts and information from a variety of data sources and work products made available by various federal, state, regional, and tribal enforcement and intelligence agencies; these may include data contributed by, but not be limited to, ICE, CBP, NCTC, FBI, NDIC, DEA, DIA, NSA, and open source materials. Offers suggestions for improvements in social network analysis, potential data sources, and project workflow/organization, as needed. Employs advanced computer tools, applications, and tradecraft to understand relationships (leadership, affiliations, aliases, etc.), temporal and spatial interdependencies, and conceptual scenarios which yield draft and finished social network analyses. Works on projects addressing a broad range of global supply chain activities such as terrorism, counterdrug, narcoterrorism, counterintelligence, and operations which threaten the security of designated programs, organizations, and systems. Analysis may focus on specific target threat countries or events, but may also include non-state actors and insurgent/terrorist individuals or groups. Products (documents, presentations) include a coherent and usable assembly of facts, inferences, charts, and findings which highlight the social network aspects of supply chain events, fraud detection, deception/denial, illegal activities, regulatory infractions, and similar project-specific needs.