Cyber Operations Specialist

PeratonLinthicum, MD
1d$112,000 - $179,000Onsite

About The Position

Peraton has an opportunity for a Cyber Operations Specialist whose primary responsibility will be to serve as the lead for managing agency OPORDS & TASKORDs from receipt through completion. This role is central to the operational tempo of the organization, requiring you to be the primary liaison between government leadership, the Information Technology department, and the Cyber Security team. The successful candidate will be responsible for interpreting operational directives and collaborating with technical and security teams to translate them into actionable plans, ensuring the security and integrity of network operations. Additionally, this role will cross-train to support the Information System Security Engineer (ISSE) efforts, developing techniques and procedures focused on emerging threats to network security. The successful candidate will perform the following: As the lead for operational orders, you will develop detailed execution plans for a range of cyber operations through direct collaboration with planners, operators, analysts, and government leadership. You will analyze, review, and monitor incoming strategies, doctrine, and policies to ensure all actions comply with mandated government regulations. A key function will be to draft and provide briefings, information papers, and official correspondence on the status of all orders. You will assist leadership by identifying and implementing process improvements and developing Standard Operation Procedures (SOPs) to close documentation gaps. This involves reviewing, prioritizing, and submitting operational requirements for the acquisition of new cyber capabilities and applying specific guidance for integration into NOC and SOC activities. In support of the technical teams, you will take ownership of projects to implement security solutions, ensuring requirements are met at the system level by coordinating with system leads and project managers. You will utilize DevSecOps methodologies to integrate security throughout the development lifecycle. As part of your cross-training, you will support the ISSO with log reviews using tools like Splunk, execute security scans with ACAS, provide oversight to the remediation of findings, and assist with the analysis and completion of DISA STIGs to ensure compliant solutions. This is a three-month (potentially longer) surge support effort. This position requires full-time, onsite attendance Monday through Friday in the Baltimore metropolitan area.

Requirements

  • Extensive hands-on experience in managing DoD OPORDS & TASKORDs, including breaking them down into requirements, developing implementation schedules, and managing them to completion.
  • Experience collaborating with technical teams on security policy, identifying security requirements, and providing guidance to meet deadlines for legacy systems.
  • Ability to analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
  • Knowledge of cyber security principles, operations security, cyber threats and vulnerabilities, and national regulations as they relate to cyber security.
  • Good analytic and problem-solving skills.
  • Active TS with SCI eligibility.
  • Active CompTIA Security+ certification.
  • Associates degree and 10+ years of experience; OR Bachelor’s degree and 8+ years of experience; OR Master’s Degree and 6+ years of experience; OR 3 years with PhD.
  • Bachelor’s or Master’s degree should be within one of the following fields of study: Computer Science, Cybersecurity, Information Systems, Information Technology, Data Science, or Software Engineering. However, four (4) years of additional relevant experience or specialized training may be considered in lieu of a Bachelor’s degree.

Nice To Haves

  • PMP certification.
  • DISA STIGs and STIG Viewer experience.
  • Experience working with AWS/Google cloud-hosted information systems or applications.
  • Ability to prepare assessments and cyber threat profiles of current events based on the collection and analysis of classified and open-source information.
  • Ability to develop and maintain analytical procedures to meet changing requirements and ensure maximum DevSecOps capabilities.
  • Ability to support cloud security tasks.
  • Experience working with Red Hat or CentOS Linux operating systems.
  • Experience creating and using security tools for scanning, testing, monitoring, and reporting.
  • Experience in planning and overseeing configuration changes for major applications across multiple networks.

Responsibilities

  • Serve as the lead for managing agency OPORDS & TASKORDs from receipt through completion.
  • Be the primary liaison between government leadership, the Information Technology department, and the Cyber Security team.
  • Interpret operational directives and collaborating with technical and security teams to translate them into actionable plans, ensuring the security and integrity of network operations.
  • Cross-train to support the Information System Security Engineer (ISSE) efforts, developing techniques and procedures focused on emerging threats to network security.
  • Develop detailed execution plans for a range of cyber operations through direct collaboration with planners, operators, analysts, and government leadership.
  • Analyze, review, and monitor incoming strategies, doctrine, and policies to ensure all actions comply with mandated government regulations.
  • Draft and provide briefings, information papers, and official correspondence on the status of all orders.
  • Assist leadership by identifying and implementing process improvements and developing Standard Operation Procedures (SOPs) to close documentation gaps.
  • Review, prioritize, and submit operational requirements for the acquisition of new cyber capabilities and applying specific guidance for integration into NOC and SOC activities.
  • Take ownership of projects to implement security solutions, ensuring requirements are met at the system level by coordinating with system leads and project managers.
  • Utilize DevSecOps methodologies to integrate security throughout the development lifecycle.
  • Support the ISSO with log reviews using tools like Splunk, execute security scans with ACAS, provide oversight to the remediation of findings, and assist with the analysis and completion of DISA STIGs to ensure compliant solutions.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service