Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.
As a government contractor, Peraton abides by the following provision
Pay Transparency Nondiscrimination ProvisionThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).
Qualifications - Minimum 15 years of experience with cybersecurity or information assurance
- Minimum of Bachelors Degree in a technical or business discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline
- Minimum DOD 8140/DOD 8570 IAM Level II Certification
- Strong attention to detail and organizational skills. Excellent communications skills.
- TS/SCI w/Polygraph
Responsibilities - Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services
- Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise
- Identifies, plans, and documents improvements to security controls currently in place
- Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems
- Develops and interprets cybersecurity requirements as part of the IT acquisition development process and assists in the formulation of cybersecurity/IT budgets
- Plans and schedules the installation of new or modified security hardware, operating systems, and software applications
- Ensures the assessment and implementation of identified computer and network environment fixes such as system patches and fixes associated with specific technical vulnerabilities as part of the Cybersecurity Vulnerability Management program
- Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program, including boundary defense, incident detection, and response
- Possesses a thorough understanding and ability to apply intermediate concepts of cyber engineering and cybersecurity
- Maintains thorough knowledge and understanding of the DOD cybersecurity policies and the Risk Management Framework
- Initiates actions to conduct cybersecurity engineering research and analysis and provides recommendations for the implementation of security mechanisms
- Initiates actions to apply advanced concepts of cyber engineering and cybersecurity to development and architecture projects
- Coordinates effort to develop cybersecurity documentation, concept papers, and test plans required by Command policies and the Risk Management Framework
- Analyzes complex information independently and takes appropriate actions, and reviews and implements recommendations from others
- Maintains extensive knowledge and understanding of DOD and/or IC engineering efforts, across multiple engineering disciplines
- Develops and delivers articulate and effective briefings/presentations on complex cybersecurity engineering topics as applicable to assigned projects to any size audience that may include high-level decision makers
- Prioritizes competing requirements and tasks, and manages long-term and short-term obligations
- Coordinates effort to develop all cybersecurity documentation, concept papers, and test plans required by Command policies and the Risk Management Framework
- Initiates actions to evaluate functional operation and performance in light of test results and makes recommendations regarding C&A
- Effectively provides engineering guidance to cybersecurity engineers Level I and II