VIEW
SAVED
JOBS

Exploitation Analyst (EA), Lead Associate

2023-135315
Cyber Security
Top Secret/SCI with Poly

Location:

Fort Meade
,
MD

Secondary Location:

,
HI
,

Telecommute Options:

No remote/telework allowed
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Responsibilities

Peraton’s Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation’s security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world’s most difficult challenges.

 

The Exploitation Analyst collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Responsibilities may include:

  • Assess data for new or continued opportunities
  • Communicate complex information concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means
  • Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation and provide technical assistance
  • Analyze intelligence information, technical data, and exploitation opportunities
  • Evaluate, analyze, and synthesize large quantities of data into high quality, fused targeting/intelligence products
Qualifications

Basic Qualifications:

  • A Bachelor’s degree plus 5 years of relevant experience, or a Master’s degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate’s degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
  • Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). 
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering, additionally, must have experience in network or system administration. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT). Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). 
  • Active TS/SCI security clearance with a current polygraph is required

Desired Qualifications:

  • CEH Certified Ethical Hacker
  • CFR CyberSec First Responder
  • CySA+ CompTIA Cybersecurity Analyst
  • GCFA GIAC Certified Forensics Analysis
  • GCIH GIAC Certified Incident Handler
  • SCYBER Cisco Cybersecurity Specialty Certification
  • CNDSP Computer Network Defense Service Provider
  • CSSP-IR DoD Cyber Security Service Provider for Incident Responder

#MPOJobs

#NextGenFF

#AJCM

#AJCM

#AJCM

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range

EEO

An Equal Opportunity Employer including Disability/Veteran.

Our Values

Benefits

At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children