VIEW
SAVED
JOBS

Cloud Monitoring Analyst Team Lead

2024-146286
Cyber Security
Top Secret

Location:

Rosslyn
,
VA

Secondary Location:

Beltsville
,
MD
,

Telecommute Options:

Flexible for occasional telework – must be local to work location
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Responsibilities

Peraton is currently seeking an experienced Cloud Monitoring Analyst Team Lead to support the CIRT Team in supporting the Department of State’s (DoS) Computer Incident Response Team leveraging deep knowledge of computer forensic techniques, malware analysis and monitoring / incident response to work with key stake holders in an effort to develop methodologies and processes to support the Department’s migration and integration of cloud-based services.

 

Location: Rosslyn, VA and Beltsville, MD. The customer requires every employee to be on-site for the first 90 days. After the 90 day period, a hybrid schedule may be offered. This position will support Monday – Friday from 8:00am to 5:00pm.  

 

In this role, you will:

 

  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks.
  • Lead and manage other Cloud analysts on a daily basis.
  • Participate in strategic modernization planning and lines of effort.
  • Collaborate with cross functional teams with in the division.
  • Collaborate with all teams within CIRT.
  • Analyze network events to determine the impact on current operations and conducted all-source research to determine advisory capability and intent.
  • Prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open- source information.
  • Correlate threat data from various sources. able to develop and maintain analytical procedures to meet changing requirements and ensuring maximum operations.
  • Collect data via a combination of standard intelligence methods and business processes.
  • Produce high-quality papers, presentations, recommendations, and findings for senior government and network operations officials.

#DSCM

Qualifications

Required:

  • Bachelor’s degree and a minimum of 5 years’ relevant experience. An additional 4 years of experience may be considered in lieu of degree.

  • Must have ONE of the following certifications:
    • CASP+ CE; CCNA Cyber Ops; CCNA-Security; CCNP Security; CEH; CFR; CHFI; CISA; CISSP (or Associate); CySA+; GCED; GCFA; GCIH; SCYBER
  • Advanced knowledge and experience with cloud computing technologies to include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
  • Advanced knowledge of and experience with networking architecture, design and security.
  • Expertise in planning, implementation and usage of security incident and event management tools.
  • Demonstrated ability to interact with key stakeholders and provide both technical and information briefing materials to a range of audiences.
  • Demonstrated knowledge utilizing native security and logging tools (M365, Azure, AWS, GCP) and planning for centralized log aggregation utilizing a variety of methods.
  • Demonstrated knowledge of the Incident Response Lifecycle and ability to apply to both cloud, legacy and hybrid environments.
  • Ability to identify and communicate remediation steps for cybersecurity events.
  • Demonstrated ability to utilize and leverage forensic tools to assist in determining scope and severity of a cybersecurity incident.
  • U.S. citizenship and an active Secret security clearance. 
    • Ability to obtain Top Secret security clearance is required, 

Preferred: 

 

  • Familiarity with monitoring Cross Domain Solutions. 
  • Understanding of Machine Learning and User and Entity Behavior Analytics. 
  • Ability to analyze static and dynamic malware analysis reports. 
  • Understanding of Cloud Development with Microsoft Azure/MDE. 
  • Understanding of Security Operations Center processes and workings. 

 

 

Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range

EEO

An Equal Opportunity Employer including Disability/Veteran.

Our Values

Benefits

At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children