Peraton - Tampa, FL

posted about 2 months ago

Full-time - Mid Level
Tampa, FL
Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services

About the position

Peraton is seeking a Cyber Security Analyst to support the Special Operation Command Information Technology Enterprise Contract (SITEC) - 3. This position is located at the SOCOM Headquarters at MacDill AFB, FL, and at various TSOC and Component locations both in the United States and abroad. The SITEC 3 Enterprise Operations and Maintenance (EOM) Task Order aims to provide USSOCOM, its Component Commands, Theater Special Operations Commands (TSOCs), and deployed forces with essential Operations and Maintenance (O&M) services. These services are critical for maintaining Network Operations (NetOps), systems and network infrastructure, end-user support, configuration management, and conducting training, among other responsibilities. The Cyber Security Analyst will play a pivotal role in ensuring the security and integrity of the network and systems that support the operations of USSOCOM and its global missions. The responsibilities of the Cyber Security Analyst include investigating alerts, anomalies, errors, intrusions, and malware to identify the extent of security incidents and isolate responsible agents. The analyst will maintain multiprotocol routers, multilayer switches, network security devices, and network management systems. They will perform systems administration, maintenance, and computer security support for servers on networks and Computer Network Defense-Service Providers (CND-SPs). The role also involves making changes to routers, switches, and encryption devices, recommending improvements to automated information system security policies, and maintaining a service support program that provides comprehensive systems administration and security support. Additionally, the Cyber Security Analyst will conduct system, security, and operational testing to ensure that government data is protected from unauthorized disclosure and remains under government control. They will monitor systems security, respond to security incidents, and participate in security systems testing to ensure the integrity and confidentiality of sensitive data. The analyst will also conduct log file analysis using various tools such as Remedy, Splunk, and Office Automation to perform their duties effectively. Some positions may require work outside of traditional hours to meet customer needs.

Responsibilities

  • Investigate alerts, anomalies, errors, intrusions, malware, etc. to identify the extent of a security incident and help isolate responsible agents.
  • Maintain multiprotocol routers, multilayer switches, network security devices, and network management systems.
  • Perform systems administration, maintenance, computer security, and support for servers on networks and Computer Network Defense-Service Providers (CND-SPs).
  • Make changes to associated routers, switches, and encryption devices.
  • Recommend improvements to automated information system security policies.
  • Maintain and operate a services support program that provides systems administration, maintenance, computer security, and support for servers on networks.
  • Conduct system, security, and operational testing/evaluation events.
  • Test to ensure Government data is protected from unauthorized disclosure and remains under Government control.
  • Test to verify configuration and protections of external and internal data flows between applications, containers, virtual devices, virtual machines, and cloud infrastructure.
  • Test to verify data at rest encryption on cloud infrastructure.
  • Detect network intrusions and cyber incidents.
  • Identify and alert the Government of possible attacks/intrusions, anomalous activities, and misuse activities.
  • Assist in incident response and monitor systems security.
  • Participate in security systems testing and ensure integrity and confidentiality of sensitive data.
  • Prevent and detect intrusion, supporting incident containment and remediation recommendations.
  • Conduct log file analysis using various tools such as Remedy, Splunk, and Office Automation.

Requirements

  • Bachelor's degree in a relevant field or equivalent experience.
  • 2 years of experience in cybersecurity; 6 years of experience without a degree.
  • Experience with SIEM, log analysis, vulnerability analysis, and some scripting experience.
  • DoD 8570.01M IAT and CSSP Analyst OR CSSP Incident Responder certification required.
  • A DoD Top Secret clearance or higher is required.

Nice-to-haves

  • Experience with cloud infrastructure and encryption technologies.
  • Familiarity with the DoD environment and operations.
  • Strong analytical and problem-solving skills.

Benefits

  • Paid parental leave
  • Paid holidays
  • Disability insurance
  • Health insurance
  • Dental insurance
  • Tuition reimbursement
  • Paid time off
  • Vision insurance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service