Information Assurance and Security

PeratonHerndon, VA

About The Position

Peraton has an exciting opportunity for a cleared Information Assurance Specialist to join a dynamic multi-disciplinary team, developing a next generation satellite terminal on a mission critical Space and Intelligence Program. The Information Assurance Specialist will be responsible for monitoring, analyzing, and detecting cyber events and incidents within information systems and networks. They will develop techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, evaluate and test hardware, firmware, and software for possible impact on system security, and investigate and resolve security incidents such as intrusion, attacks, or leaks. The role involves performing security reviews, identifying gaps in security architecture, and developing a security risk management plan. Additionally, the specialist will plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks, and review requests for security relevant changes to mission infrastructures, ensuring risk is adequately mitigated. Responsibilities also include patch management and vulnerability remediation for IT assets, ensuring compliance with security benchmarks (DISA STIGs, CIS Benchmarks, SCAP). The specialist will ensure that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security. Support for the implementation of Zero Trust Architecture (ZTA) and Identity & Access Management (IAM) controls is required. The role also involves conducting security reviews for third-party applications and vendors to mitigate supply chain risks. Frequent communication with the customer IA team regarding asset changes, policy changes, and evolving IA requirements is expected. The specialist will also assist in securing cloud-based environments (AWS, Azure, Google Cloud) through security controls like CASB, CSPM, and cloud encryption, and work with engineering and operations teams to review and update procedures and SOPs for positive cybersecurity outcomes.

Requirements

  • Bachelor’s degree and eight years of experience
  • Four (4+) years of experience with NIST 800-53 security controls and Risk Management Framework (RMF) process with a U.S. Government agency.
  • Two (2+) years of experience with vulnerability management for networks, operating systems, and software.
  • Familiarity with Cyber security tools such as Splunk, Nessus Security Center, etc. Capable of designing user-focused dashboards and reports.
  • Current Security+ or similar DoD 8570 IAT certification
  • Must possess an active, current Top Secret/Sensitive Compartmented Information (TS/SCI) and the ability to pass a polygraph

Nice To Haves

  • Splunk reports and dashboards

Responsibilities

  • Monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision.
  • Develop techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, attacks, or leaks.
  • Performs security reviews, identify gaps in security architecture, and develop a security risk management plan.
  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.
  • Reviews requests for security relevant changes to mission infrastructures, ensuring risk is adequately mitigated.
  • Perform patch management and vulnerability remediation for IT assets, ensuring compliance with security benchmarks (DISA STIGs, CIS Benchmarks, SCAP).
  • Ensures that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security.
  • Support the implementation of Zero Trust Architecture (ZTA) and Identity & Access Management (IAM) controls.
  • Conduct security reviews for third-party applications and vendors to mitigate supply chain risks.
  • Communicates frequently with customer IA team regarding any asset changes, determine impact of any upcoming policy changes, and flow down information about other evolving IA requirements.
  • Assist in securing cloud-based environments (AWS, Azure, Google Cloud) through security controls like CASB, CSPM, and cloud encryption.
  • Work with engineering and operations teams to review and update procedures and SOPs to produce positive cybersecurity outcomes.

Benefits

  • overtime
  • shift differential
  • discretionary bonus
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service