Cyber Systems Architect

Chantilly, VA, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

The candidate will be a part of a cybersecurity compliance team procuring, building, testing, deploying, and maintaining internet architectures. Position supports the full lifecycle of the compliance program including orchestrating the program Plan of Action & Milestones (POAM), draft and shepherd architecture designs through the Sponsor’s Assessment & Authorization (A&A) process; procure, configure, and test site-specific architectures; organize, train, and equip Sponsor for distributed operations and maintenance.

Duties:

  • Assist sponsor with site surveys for infrastructure changes needed to install and upgrade accredited internet systems.
  • Survey sites for resource and infrastructure changes needed to install accredited internet systems.
  • Serving as an IT Specialist performing Information Security (INFOSEC) and Security System Management duties.
  • Work with Sponsor to procure, receive, and stage system equipment.
  • Develop, test, and deploy remote access system components providing audit and remote management capabilities.
  • Develop and refine IDS signatures to reduce false positives and establish effective review of IDS alerts and elevate to Cyber Incident Response Team (CIRT).
  • Coordinate shipping system components.
  • Provide remote installation and troubleshooting support.
  • Occasional travel within WMA

Qualifications

  • TS/SCI with Polygraph level clearance is required.
  • BS in a related discipline and 8+ years of experience or MS and 6+ years; additional experience may be considered in lieu of degree.
  • Ability to work in a team environment, and independently identify and resolve challenges.
  • Excellent oral and written communication and interpersonal skills and the ability to work independently and on a team.
  • Outstanding attention to detail, prioritization, and multitasking.
  • Strong personal network with components capable of providing remote facilitation.
  • Self-starter with robust problem-solving skills.
  • Experience with Snort IDS, Zeek, and Cisco IOS.

Benefits:

Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and eligibility to participate in an attractive bonus plan.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: Clearance Compliance IDS Incident response iOS Polygraph Snort TS/SCI

Perks/benefits: Salary bonus

Region: North America
Country: United States
Job stats:  9  0  0
Category: Architecture Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.