About The Position

Peraton's to hire an experienced Cyber Intelligence Analyst to support a SOC for its Federal Strategic Cyber group. Location: Chandler, AZ. In this role, you will: Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and U.S. and DoD information networks. Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlate threat data from various sources. Develop and maintain analytical procedures to meet changing requirements and ensure maximum operations. Collect data using a combination of standard intelligence methods and business processes. Produce high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.

Requirements

  • Bachelor's degree and a minimum of 8 years experience.
  • Minimum of 7 years of Intelligence experience with IC Management or Supervisory experience.
  • Knowledge of MITRE ATT&CK, D3FEND, Diamond Model, and Kill Chain frameworks.
  • Possess and maintain one of the following certifications: CISM, CySA+, GCIA + CFR, Network+, Security+, or CEH
  • U.S. citizenship required
  • Active Top Secret/SCI security clearance.

Responsibilities

  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and U.S. and DoD information networks.
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
  • Prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information.
  • Correlate threat data from various sources.
  • Develop and maintain analytical procedures to meet changing requirements and ensure maximum operations.
  • Collect data using a combination of standard intelligence methods and business processes.
  • Produce high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service