Cyber Network Security Analyst Job at Peraton, Arlington, VA

Y2ZNYktVUnJjNTQ2aHl3SVRYbXNVRUdTdHc9PQ==
  • Peraton
  • Arlington, VA

Job Description

Responsibilities

Peraton is hiring a Cyber Network Security Analyst for its' Federal Strategic Cyber programs.

Location: Arlington, VA 

As the world’s leading mission capability integrator and transformative enterprise IT provider, Peraton delivers trusted and highly differentiated national security solutions and technologies that keep people safe and secure. We serve as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets.

In this role, you will:  

  • Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity and data; this includes, but is not limited to network flow (i.e., NetFlow) or related forms of session summary data, signature-based IDS alert/event data, full packet capture (PCAP) data, proxy, and application server logs (various types).
  • Triage IDS alerts, collect related data from various network analysis systems, review available open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise, or unintended/high-risk exposure.
  • Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
  • Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
  • Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics.
  • Document key event details and analytic findings in analysis reports and incident management systems.
  • Identify, extract, and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
  • Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems.
  • Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
  • Develop IDS signatures, test, and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
  • Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
  • Provide technical assessments of cyber threats and vulnerabilities.
  • Communicate and collaborate with analysts from other SOC organizations to investigate cyber events.
  • Produce final reports and review incident reports from junior analysts.
  • Monitor and report on trends and activity on network sensor platforms.
  • Produce and update technical analysis documentation (processes, procedures, analysis criteria, report templates, etc.).

#CISA

Qualifications

Minimum Requirements Are: 

  • 6 years related technical experience.  
  • Working knowledge of security concepts, protocols, processes, architectures, and tools (vulnerabilities, threats and exploitation, authentication & access control technologies, threat intelligence data and sources, WHOIS and DNS referential data and sources, intrusion detection/prevention capabilities, network traffic analysis, SIM technology, incident handling, media/malware analysis, etc.).
  • Working knowledge of networking concepts, protocols, and architectures (OSI-model, TCP/IP, major application protocols such as DNS/ LAN/WANs, VPNs, routers/routing, addressing, etc.).
  • Detailed knowledge of intrusion detection engines, capabilities, and signature formats in general, with a specific focus on Snort/Sourcefire variations and regular expressions (REGEX).
  • Understanding of ICS systems and components that make up an ICS environment
  • Know and explain the different devices and roles they have within an ICS environment
  • Experience analyzing ICS Network traffic with various tools (Wireshark, Bro/Zeek, etc.)
  • Knowledge of cyber policy & issues, the global cyber community, roles of major organizations how they interrelate and interact, and challenges in these structures.
  • Analyze host forensic data for possible malicious activity.  
  • Analyze a variety of OT, host, and network logs to determine intent.  
  • Utilize an OT network Sensor for network investigations.  
  • Awareness of the common cyber products and services, an understanding of their limitations, and a comprehensive understanding of the disciplines of cybersecurity.
  • Demonstrated ability to be innovative in solving problems and providing solutions.
  • Ability to produce results in a fast-paced environment with the ability to meet iterative deadlines.
  • U.S. citizenship required.
  • An active Top Secret security clearance with SCI eligibility required.
    • In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.

EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.

Job Tags

Local area,

Similar Jobs

Sarmad

Scrum Master Job at Sarmad

 ...We are seeking an experienced Scrum Master to join our dynamic team at Sarmad. As a Scrum Master, you will play a crucial role in overseeing...  ...high-quality products efficiently. Requirements Proven experience as a Scrum Master or in a similar Agile role Strong... 

Compass Group, North America

CONTROLLER, ASSOC - University of Alaska Job at Compass Group, North America

At over 300 college & universities around the country, Chartwells Higher Education is re-inventing the on-campus dining experience. We are challenging the norm and setting new standards by investing in high-tech, food-infused social spaces that bring people together to... 

Inceed

Sales Account Manager Job at Inceed

 ...Potential! Ginormous Penthouse Office! World Peace! The listings for sales jobs make some pretty outrageous claims (see above). But at...  ...around here. So we dont bury them under a blanket of middle management. Wanna talk to the partners? Do it. ~ High Turnover: We must... 

Cardinal Health

Delivery Driver - Pharmacy Services Job at Cardinal Health

 ...opportunity, please submit application as soonas possible.**_What Pharmacy Services & Delivery contributes to Cardinal Health_**Pharmacy Operations is...  ...here to watch a short video about what a Nuclear Pharmacy Driver does at Cardinal Health (**_Shift/Schedule_**+ Monday -... 

ActiveSoft, Inc

Splunk Expert / Developer Lead (Java + AWS) Job at ActiveSoft, Inc

 ...Required Skills & Experience ~ Splunk ~ Advanced knowledge of Splunk queries, dashboards, and real-time troubleshooting. ~ Ability to perform quick log analysis and identify system anomalies. ~ Familiarity with Splunk Enterprise Security (SES) or IT Service Intelligence...