Cyber IT Specialist / First Shift Support

Beltsville, MD, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

Peraton is seeking a Cyber IT Specialist to become part of Peratons’ Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective, and secure business processes. 

 

Location: Beltsville, MD. 

 

This is for the first shift, from 6:00 AM - 2:00 PM, EST. 

 

What you’ll do:

  • Monitor email for service requests and respond within 30 minutes of receipt.
  • Clearly and accurately detail, monitor and track all work through events logged and resolved in government furnished ITSM tool (ticketing system).
  • Diagnose and resolve customer reported system incidents, problems, and events. Keep users apprised of incident and resolution status.
  • Implement industry recognized ITSM processes to support organizational increase on high reliable IT services.
  • Provide status and outage communication via the phone system, email communication, and applicable web sites within 15 minutes of identification.
  • Coordinate and/or maintain call back lists, escalation lists, special events, etc., with appropriate customer representative and COR.
  • Develop, maintain, and implement a Major Incident Response (MIR) plan to support priority service restoration, stakeholder & Government awareness, and escalation path for significant service degradations as outlined by the Government.
  • Provide service restoration support to include implementing corrective action on documented/known issues, escalating issues for support, and acting as incident coordinator maintaining incident journals, setting up conference calls, contacting and coordinating support with Security Tools SMEs, managing service degradation notifications.

 

Qualifications

Required: 

  • Bachelor’s degree and a minimum of 2 years’ experience. An additional 4 years of experience may be substituted in lieu of degree.
  • Ability to support 24x7x365 system monitoring, customer, and technical support role.
    • Must be able to support 1st shift - 6am - 2pm.
  • Possess ONE of the following certifications: 
    • CASP+ CE; CCNA-Security; CISSP (or Associate); CND; CSSLP; CySA+; GICSP; GSEC; Security+ CE, or SSCP.
  • U.S. citizenship required and active Secret security clearance with the ability to obtain a final Top Secret security clearance.

 

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$66,000 - $106,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: CASP+ CISSP Clearance CND GICSP GSEC Incident response Monitoring Security Clearance SSCP Top Secret

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  2  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.