Peraton-posted 2 months ago
$80,000 - $128,000/Yr
MacDill AFB, FL
5,001-10,000 employees
Professional, Scientific, and Technical Services

Peraton requires Cybersecurity Analysts to support the Special Operation Command Information Technology Enterprise Contract (SITEC) - 3 EOM. This position is located at MacDill AFB in Florida. The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365.

  • Oversee and refine threat detection processes to proactively counter advanced persistent threats (APTs) and emerging risks.
  • Integrate threat intelligence from internal and external sources to anticipate adversarial activities.
  • Develop mitigation strategies against nation-state actors and other sophisticated threat groups targeting USSOCOM systems.
  • Manage high-severity security incidents, coordinating response efforts across SOC teams, J6 staff, and external stakeholders.
  • Create and execute containment, eradication, and recovery plans to ensure minimal operational disruption.
  • Deliver executive-level briefings and post-incident reports with actionable insights and recommendations for process improvement.
  • Ensure SOC operations align with DoD cybersecurity policies and USSOCOM standards.
  • Conduct audits and assessments, offering recommendations to improve policies and streamline compliance processes.
  • Act as a liaison between SOC operations and USSOCOM leadership to meet governance objectives.
  • Mentor junior and Journeyman analysts, fostering their technical growth and professional development.
  • Lead training sessions and knowledge-sharing initiatives to elevate SOC capabilities and team preparedness.
  • Serve as an escalation point for complex technical issues, providing strategic direction and solutions to the SOC team.
  • Research and implement cutting-edge tools, methodologies, and automation to enhance SOC efficiency and capabilities.
  • Drive orchestration initiatives to streamline threat detection, response, and reporting processes.
  • Stay informed on emerging cybersecurity trends and adversarial tactics to ensure USSOCOM remains ahead of evolving threats.
  • Operate within a 24/7 SOC environment, which may require shift work, including nights, weekends, and holidays.
  • Handle sensitive and classified information in compliance with DoD and USSOCOM requirements.
  • Min 12 years with HS Diploma, 10 years AS/AA degree, 8 years with BS/BA degree, 6 years with MS/MA, 3 years with a PhD.
  • A DoD TS/SCI clearance is required.
  • DoD 8570 IAT II certifications AND CSSP Incident Responder OR CSSP Analyst.
  • Deep expertise in cybersecurity concepts, including threat detection, malware analysis, network security, and threat intelligence.
  • Extensive experience with one or more tools such as SIEM platforms, IDS/IPS, endpoint protection solutions, forensic analysis tools, and threat intelligence platforms.
  • Proven ability to lead incident response efforts and handle complex, high-severity security incidents.
  • Exceptional analytical and problem-solving skills with the ability to provide strategic recommendations.
  • Effective communication skills, including the ability to deliver executive-level briefings and reports.
  • Demonstrated leadership and mentorship capabilities in a fast-paced, team-oriented environment.
  • Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).
  • Advanced certifications such as CISSP, GIAC (e.g., GCIA, GCIH, GPEN), OSCP, or CISM.
  • Experience with scripting, automation tools (e.g., Python, PowerShell), and advanced threat hunting techniques.
  • Expertise in threat intelligence analysis, integration, and dissemination.
  • Salary range: $80,000 - $128,000, determined by various factors including experience, education, and geographic location.
  • Eligibility for overtime, shift differential, and discretionary bonus in addition to base pay.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service