Senior Cyber Systems Engineer (SETA)

PeratonChantilly, VA

About The Position

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Requirements

  • Must possess an active TS/SCI clearance with polygraph.
  • BS/BA with 12 years of experience, or MS/MA with 10 years.
  • 10+ years of experience working with relevant components of the IC.
  • 5+ years of experience supporting the IC in a technical operations role with a strong technical background in cyber and data analysis specific to operations.

Nice To Haves

  • Experience in cyber network operations.
  • A bachelor's degree or higher in Computer Science, Cybersecurity, Information Security, IT, Computer Engineering, Network Engineering, or Computer Forensics.
  • Relevant certifications: CEH, CCNA, CISSP.

Responsibilities

  • Serving as an expert on tradecraft associated with computer network operations.
  • Task selectors and perform PCAP analysis.
  • Leverage analytical tools like Splunk and Wireshark among others to assist in the analysis.
  • Conduct technical computer network analysis to include network infrastructure, logical network topology, data flows, and security posture.
  • Utilize knowledge of computer and network operating systems (e.g. Windows, Linux, etc.), hardware/network management tools and equipment (e.g. routers, switches, servers, etc.), and protocols (e.g. TCP/IP, SMTP, TLS/SSL, etc.).
  • Utilize knowledge of reconnaissance (active or passive) to include foot-printing, scanning networks, and enumeration.
  • Stay abreast of current attack vectors and unique methods for exploitation of computer networks.
  • Communicate complex technical information to non-technical or less-technical audiences at all levels.

Benefits

  • Overtime
  • Shift differential
  • Discretionary bonus
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service