Tier III Analyst

Cyber Security
Public Trust



Secondary Location:


Telecommute Options:

Flexible for occasional telework – must be local to work location
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit to learn how we’re keeping people around the world safe and secure.


We are seeking a Tier III Analyst to join our Peraton team who will lead and actively participate in the investigation, analysis, and resolution of Tier 3 and escalated cybersecurity incidents.


What you’ll do:


The Tier III Analyst is also responsible for the following but not limited to:

  • Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences
  • Serve as a subject matter expert in handling incidents of varying complexity, providing guidance and support to Tier 1 and Tier 2 analysts during investigations
  • Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks
  • Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders
  • Develop and operationalize advanced security analytics use cases to detect and respond to sophisticated cyber threats in real-time
  • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy
  • Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions
  • Support the mentoring and training of more junior IR staff
  • Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
  • This role is on-site,  some telework (25%) may be permitted.

Work location: Can be either one of the following: 

  • Martinsburg, WV
  • Washington, D.C
  • Austin, TX


**Shift:  2nd Shift (3pm-11:30PM EST); Tuesday - Saturday 


Basic Qualifications:

  • Minimum of 5 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD or 8 years experience in lieu of degree
  • 3+ years of experience supporting large-scale IT related projects.
  • 3+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)
  • A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment.
  • Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools
  • Experience with enterprise ticketing systems like ServiceNow
  • Must have one of the following certifications (or equivalent) within 6 months of onboarding:
    • GIAC Certified Incident Handler
    • EC-Council’s Certified Incident Handler (E|CIH)
    • GIAC Certified Incident Handler (GCIH)
    • Incident Handling & Response Professional (IHRP)
    • Certified Computer Security Incident Handler (CSIH)
    • Certified Incident Handling Engineer (CIHE)
  • Must be a US Citizen
  • Must have the ability to obtain a Public Trust Clearance


Preferred Qualifications:

  • Bachelor’s Degree
  • Knowledge in a public health environment.
  • Knowledge of VA culture, mission, and IT environment
  • Strong verbal and written communication skills
  • Excellent analytical and problem-solving skills.
  • Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight.

Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range


An Equal Opportunity Employer including Disability/Veteran.

Our Values


At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children