Senior Security Threat Analyst

Fort Huachuca, AZ, United States


Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page


Responsibilities include, but are not limited to:• Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems• Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findings• Evaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusions• Perform analysis of complex software systems to determine both functionality and intent of software systems• Resolve highly complex malware and intrusion issues• Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations• Create analytics with a SIEM to identify patterns, anomalies, and compromising indicators to alert Cyber Incident responders• Prepare and presents technical reports and briefings• Perform documentation and vetting of identified vulnerabilities for operational use• Assist all sections of the Defensive Cyber Operations team as required in performing analysis• Travel to customer sites to perform network security evaluations• Write reports of vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture


Basic Qualifications:• Active Top-Secret/SCI • Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD• Certified Ethical Hacker (CEH)• GIAC Certified Intrusion Analyst (GCIA)• Possess DoD 8570.01-M Information Assurance Technician (IAT) Level II Baseline Certification• Must posses an active, OR have the ability to obtain within 90 days of hire date, an ITIL Foundations Certification• Must have a full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations• Must have a good breadth of knowledge of common ports and protocols of system and network services• Experience in packet captures and analyzing a network packet• Experience with intrusion detecti on systems such as Snort, Suricata, and Zeek• Experience with SIEM systems such as Splunk, ArcSight, or Elastic


Desired Qualifications:• DoD 8570 IAT III (CISSP, CASP, CISA, GCED, GCIH)• Experience in developing complex dashboards, report, and automated searches in Splunk, ArcSight, or Elastic/Kibana• Experience with analyzing packets using Arkime• Experience with Microsoft Windows event IDs• Experience with Linux audit log analysis• Familiarity with Git and VScode• Experience with one or more scripting languages such as PowerShell, Bash, Python

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: Analytics ArcSight Bash CASP+ CEH CISA CISSP DCO DoD DoDD 8570 Exploit GCED GCIA GCIH GIAC IDS ITIL Linux Log analysis Malware Network security PhD PowerShell Python Scripting SIEM Snort Splunk Threat Research Vulnerabilities Windows

Region: North America
Country: United States
Job stats:  4  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.