VIEW
SAVED
JOBS

Cyber Intelligence, Senior Advisor

2024-150052
Intel and Threat Analysis
Top Secret/SCI with Poly

Location:

Linthicum
,
MD

Secondary Location:

,
,

Telecommute Options:

Flexible for occasional telework – must be local to work location
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Responsibilities

This Senior Analyst position supports the Department of Defense Cyber Crime Center (DC3) and participates as a team member serving as a Cyber Intelligence Analyst that applies intelligence analysis skills to monitor, assess, and report on cyberspace operations, capabilities, vulnerabilities, and personalities that could pose a threat to Department of Defense (DoD) critical assets, the DoD Information Network (DoDIN), Defense Industrial Base (DIB) networks and supports US Intelligence Community and Interagency cyber-focused portfolios. Conducts reviews, identifies gaps, recommends solutions, and evaluates large datasets from a myriad of sources. Develops expert-level reports, briefing artifacts, and delivers briefings to senior-level officials and represent analytical teams in Interagency and technical forums; may serve as a mentor to mid-level analysts and junior staff.

 

As an expert, you will research and analyze intelligence on Advanced Persistent Threat (APT) groups, malware, and cyber warfare tactics, assess impacts on DoD networks, develop threat profiles, maintain analytical procedures, collect data, and produce high-quality reports and presentations for senior US government officials.

 

Primary Responsibilities Include:

  • Threat Monitoring and Assessment: Monitor and analyze cyberspace operations and vulnerabilities, providing detailed assessments and reports on potential threats to DoD assets.
  • Data Evaluation and Recommendations: Conduct thorough reviews, identify gaps, make recommendations, and evaluate large datasets from various sources to enhance cybersecurity measures.
  • Report and Briefing Development: Develop expert-level reports and briefing materials. Deliver presentations to senior officials and represent analytical teams in interagency and technical forums.
  • Mentoring: Serve as a mentor to mid-level analysts and junior staff, providing guidance and expertise on best practices and methodologies.
  • All-Source Intelligence Research: Research and evaluate technical and all-source intelligence, with an emphasis on Advanced Persistent Threat Groups, malware analysis, network operations, and cyber warfare tactics.
  • Cyber Threat Analysis: Analyze cyber threat data from multiple sources to determine impacts on current operations and assess adversary capabilities and intent.
  • Profile Development: Prepare detailed assessments and cyber threat profiles of current events based on sophisticated collection, research, and analysis of classified and Open-Source information; develop, maintain and update organizational Rosetta for threat actor activity.
  • Procedure Development: Develop and maintain analytical procedures to adapt to changing requirements and ensure optimal operations.
  • Data Collection: Collect data using a combination of standard intelligence methods and business processes.
  • High-Quality Deliverables: Produce high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Qualifications
  • Minimum of 12 years with BS/BA; Minimum of 10 years with MS/MA; Minimum of 7 years with Ph.D.
  • Active TS/SCI with Poly eligibility.
  • Extensive experience in integrated cyber and business analysis, with advanced analytics and data science to support national security, criminal, cyber, and counterintelligence investigations and operations.
  • Expert-level proficiency using analytical tool suites common to the Intelligence Community and Cyber Threat Intelligence platforms (e.g., Splunk, Recorded Future, Virus Total, Flashpoint, Censys, Domain Tools, RiskIQ, Shodan).
  • Expert in MITRE ATT&CK framework for advanced threat analysis.
  • Demonstrated experience in gathering, analyzing, correlating, or evaluating information from various resources, including law enforcement databases, and supporting Law Enforcement/Counterintelligence (LE/CI) Operations and/or Cyberspace Operations.
  • Expert-level knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques, and cyber threat/adversary methodologies (TTPs).
  • Expertise in building extended cybersecurity analytics.
  • Proven experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.

 

Preferred Qualifications:

  • Fluency in either Japanese or Chinese Mandarin (desired but not required).
  • Joint Cyber Analysis Course (JCAC) graduate, or advanced degree in Cybersecurity.
  • Experience in intelligence-driven defense and/or Cyber–Kill Chain methodologies.
  • Possess current certifications such as IAM Level II & III, CSSP Analyst (Security+, CySA+, GICSP, GSEC, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH), GIAC Open Source Intelligence (GOSI) Certification, or SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis course.
  • Possess a deep understanding of Cloud Security Architecture and related aspects of cybersecurity operations/analysis, including incident response and management, forensic media analysis, malware analysis/reverse-engineering, and cyber threat intelligence analysis.

Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range

EEO

An Equal Opportunity Employer including Disability/Veteran.

Our Values

Benefits

At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children