What are the responsibilities and job description for the Threat Hunting Analyst position at Peraton?
Responsibilities
Peraton is seeking a Threat Hunting Analyst to join our team of qualified and diverse individuals. The qualified applicant will become part of Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program, for the Bureau of Consular Affairs (CA). This initiative is to provide IT Operations and Maintenance to modernize the legacy networks, applications, and databases supporting CA services globally.
Day to Day Work Responsibilities:
- Conducts research and data correlation using a variety of enterprise data sources with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures.
- Analyzes network events to determine the impact on current operations and conduct research to determine adversary capability and intent.
- Analyzes identified malicious network and system log activity to determine weaknesses exploited, exploitation methods, effects on systems and information.
- Collects and analyzes network device integrity data for signs of tampering or compromise.
- Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of information.
- Conducts data analysis in support of directed assessments, anomaly investigations, long term trending and system check out.
- Develops and maintains analytical procedures to meet changing requirements and customer inquiries.
- Serves as the cyber technical liaison to stakeholders, explaining investigation details.
- Tracks and documents incident response activities and provides updates to leadership through executive summaries and in-depth technical reports.
- Create, discuss and explain Cyber investigative documentation.
- Resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering.
- Characterize and analyze network traffic, identify anomalous activity / potential threats, and analyze anomalies in network traffic using metadata.
Qualifications
Basic Qualifications:
- US Citizenship required and an active TOP SECRET clearance.
- BS degree and 12 to 15 years', experience or MS degree with 10 to 13 years', experience or a high school diploma/equivalent with minimum 16 years', experience.
- Possess CISSP or similar cybersecurity certification.
- 8 years of directly relevant experience in cyber forensic and network investigations using leading edge technologies and industry standard forensic tools.
- Experience with reconstructing a malicious attack or activity.
- In depth knowledge and experience of identifying different classes and characterization of attacks and attack stages.
Preferred Qualifications:
- Knowledge of cybersecurity frameworks and standards
- Ability to track incidents using MITRE ATT&CK and Cyber Kill Chain methodology.
- Knowledge of cloud security
- Knowledge of current IT security best practices
- Knowledge of system administration, networking, and operating system hardening techniques
- Mixed operating systems experience: (Linux, Windows)
- Scripting/coding experience
Shift/Hours: 1st Shift - Monday through Friday
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.
Target Salary Range
$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
EEO Tagline (Text Only)
An Equal Opportunity Employer including Disability/Veteran.