Peraton is seeking to hire an experienced Cyber Threat Analyst for its’ Federal Strategic Cyber division. In this role, you will research and analyze open source and classified reporting to identify current and emerging threat trends and work with cyber community and Intelligence Community partners to produce and offer threat intelligence products and briefings to internal and external partners and stakeholders. You will document and report current and emerging threats that will exploit vulnerabilities of Department of Homeland Security stakeholders and to the Government. You will communicate, coordinate, share information, and work closely with customer components. You will document Indicators of Compromises and behaviors of new or high-impact tactics, techniques, and procedures (TTPs), used to infiltrate networks, systems, and assets. You will develop informational and analytic products daily designed to increase situational awareness and advanced warning of current and emerging cybersecurity threats and risks. You will report on underlying patterns of behavior by conducting detailed analysis of incidents, threats and risks and associated impacts and consequences, vulnerabilities, tactics, techniques, and procedures (TTP), and other malicious and non-malicious indicators. You will develop operational-level trends analysis products that leverage customer internal data repositories, classified and unclassified open-source reporting to provide situational awareness of emerging cyber threat and risk trends to customer partners, stakeholders, and customers. You will provide operational analysis coordination, research, and reporting support to the customer during internal cyber incident management exercises as well as national-level cyber exercises. You will identify and leverage new threat-based frameworks and methodologies for analyzing adversaries’ activities based on network and system vulnerabilities, adversary tactics, techniques, and procedures (TTPs), (e.g., scanning, unsuccessful attempts, malware, phishing campaigns, privilege escalation, user and root-level intrusions, lateral movement, and data exfiltration). You will enrich information within the Threat Indicator/Information Database to provide additional context to partial information sources and give additional information about specific IP addresses, DNS lookups and perform queries of other DHS systems or information repositories to pull additional information. You will respond to requests for analysis and searches for corroborating, clarifying, or enhancing information or intelligence related to cyber threat activity. You will evaluate reports of cyber threat activity by leveraging either the internally developed Threat Scoring Methodology (TSM) or the National Security Concern Score (NSCS). You will produce weekly, monthly, quarterly, and annual performance metrics reports.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees