Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Qualifications Required skills:
- Familiarity with the use of special communications systems, how they are utilized to support operations to include an understanding of the risks which need to be mitigated
- Experience assessing technologies and software to identify and determine the security and cyber issues/concerns.
- Exposure to computer network defense operations (proxy, firewall, IDS/IPS)
- Understanding of network communications using protocols and services as TCP/IP protocols, DNS, and DHCP
- Experience working with WiFi access points to include 802.lla/b/g/n Wireless technologies
- Holds a BA in CS or demonstrated experience with a minimum of 5 years in the field. Minimum 3 years' experience examining any of the following media types: cell phones, hard drives, thumb drives, flash media, compact disks, etc.
- Experience with any of the standard commercial forensic tools including FTK, Paraben, Helix, llook, Xways, WireShark, FireEye
- Experience working with Windows based platforms.
- Experience working with computer software/hardware, associated peripherals, and telecommunications networks - Knowledge and familiarity with computer hardware and software, especially network security/monitoring applications and configuration.
- Critical Thinking - Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
- Complex Problem Solving - Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
- Systems Evaluation - Identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
- Component Evaluation - Identifying measures or indicators of component operation, and the actions needed to identify or correlate component utility, relative to the communications profile of the intended operational environment.
- Coordination - Ability to adjust/coordinate work activities based on changing priorities in relation to others' actions.
- Oral Comprehension - The ability to listen to and understand information and ideas presented through spoken words and sentences.
- Written Comprehension - The ability to read and understand information and ideas presented in writing.
- Deductive Reasoning - The ability to apply general rules to specific problems to produce answers that make sense.
- Experience with the Macintosh Operating System
- Experience in mobile IT technologies
- Experience with Linux/Unix
Desired skills:
- Programming experience with Java, C, C++, Perl, Python or Enscripts
- Applicant should have 2 years' experience working in the IC
- One or more of the following Certifications:
- Microsoft Certified Systems Engineer (MCSE)
- Microsoft Certified IT Professional (MCITP)
- Familiarity with RF communications technologies and protocols to include specific knowledge regarding potential vulnerabilities which could create a concern
Responsibilities The Cyber Security Forensic Analyst (CSFA) will support the Sponsor in executing elements of multi-faceted programs to support dynamic mission sets. This includes using project concepts and principles to complete tasks as directed by the Sponsor. The CSFA will coordinate and complete activities for all source risk assessments of communications technologies and the overall Sponsor's objectives in a timely manner. This position requires some local travel, as required.
The customer is seeking a Cyber Security Forensic Analysts/Senior Level with Network Engineering cyber-centric experience and skills. The analyst will support the customer's overall threat analysis efforts by performing technical assessments on IT infrastructure components, malicious code, and Advance Persistent Threat capabilities as they relate to computer networking or mobile communications. The position's candidate will be expected to conduct IT network forensic assessments across a full spectrum of computer and network devices, Windows/Linux hosts, mobile devices, virtual machines, and software and hardware, to determine potential weaknesses and vulnerabilities that may affect the confidentiality, integrity, and availability of corporate protected and sensitive information systems and data. This will require skills in protocol packet-level analysis and developing comprehensive technical reports that provide recommendations of countermeasures as based on the identified techniques, tactics, procedures, and behavior patterns used by adversaries .
The position candidate is expected to perform vulnerability assessment and penetration testing of internal, perimeter, external and wireless network devices and web applications. Duties include, but are not restricted to:
- Assess new and evolving special communications applications/devices for cyber risks that are realized when such products are utilized in support of operations.
- Establish functional and technical specifications and standards, solve hardware and software interface problems, define input/output parameters, and ensure integration of the entire systems or subsystem.
- Work with other engineers, systems analysts, programmers, technicians, scientists and top-level managers in the design, testing and evaluation of systems or subsystem components.
- Work with Mission Department POC's to schedule and coordinate maintenance missions.
- Establish and maintain baseline functional and technical specifications/standards for each (system) deployed.
- Track and research hardware and software problems and/or anomalies reported or identified by audit activities.
- Coordinate with other team members and ensure problem solution, appropriate risk reduction, and resolution activities.
- Test and evaluate hardware and software to determine efficiency, reliability, and compatibility with existing systems, and make purchase recommendations.
- Estimate software/hardware acquisition, testing, and delivery requirements to include a tentative cost and schedule for each.
- Research new technology and implement it or recommend its implementation.
- Provide frequent contact with customers, traceability within program documents, and the overall computing environment and architecture
- Plan, coordinate, and implement network security measures to protect data, software, and hardware. Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Confer with stakeholder about how to solve existing system problems.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
As a Cyber Security Forensic Analyst, personnel may often times find him/herself attending meeting at various other sites, including McLean.
ADDITIONAL SECURITY REVIEW PROCESS Requirement
All personnel coming into the organization undergo an additional security review that can take anywhere from 7 business days to 30 days or more