We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Cyber Security Engineer

Peraton
United States, Arizona, Fort Huachuca
Jan 06, 2025

Cyber Security Engineer
Job Locations

US-AZ-Fort Huachuca


Requisition ID
2025-153443

Position Category
Cyber Security

Clearance
Top Secret/SCI



Responsibilities

Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).
* Defensive Cyber Infrastructure (DCI) Support. Perform the following DCI functions:
* Develop and distribute content provided by security platform vendors at least weekly and as needed.
* Develop and distribute in-house content based on tippers from higher organizations and the Threat Hunt team.
* Provide content development and distribution to tactical edge customers and develop TTPs for doing so.
* Consolidate different data sources into a single view used to assess the status of a specific threat on the network.
* Develop and/or maintain dashboards displaying specific CSSP items of interest (i.e. top 10 attackers, top 10 destinations, top attack vector, etc.) and all active cyber incidents, in near real time, within each respective AOR.
* Maintain, update, test, and implement signatures and policies for each sensor managed by GCC.
* Changes must be approved through the established ITIL process.
* Develop signatures and policies that include both network- and host-based sensors.
* Update as necessary to minimize false positives and validate for proper syntax.
* Conduct all development and testing on isolated networks.
* Document and conduct testing activity with plan procedures, results, and operational procedures as signatures are developed and/or updated.
* Update and validate plan at least annually. A signature test plan shall be developed.



Qualifications

Basic Qualifications:

    8 years with BS/BA; 6 years with MS/MA; 3 years with PhD
  • Certifications: DCWF Code 521 Advanced: Certified Information Systems Security Professional (CISSP) or GIAC Certified Intrusion Analyst (GCIA) or GIAC Cloud Security Essentials (GCLD) or GIAC Defensible Security Architecture (GDSA) or GIAC Global Industrial Cyber Security Professional (GICSP) or GIAC Security Essentials Certification (GSEC) or Information Systems Security Architecture Professional (ISSAP) or Information Systems Security Engineering Professional (ISSEP)
  • Active TS/SCI Clearance
  • Ability to conduct vulnerability assessments and monitor networks to support test and operational environment requirements.
  • Solid understanding of data transport, encryption, networking, IT systems, and cybersecurity fundamentals.


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.



Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
Applied = 0

(web-776696b8bf-cvdwt)