Full-Time

Data Security Analyst

Confirmed live in the last 24 hours

Peraton

Peraton

10,001+ employees

Provides technology solutions for defense and intelligence

Compensation Overview

$51k - $82k/yr

Mid, Senior

Fort Huachuca, Sierra Vista, AZ, USA

US Top Secret Clearance Required

Category
Cybersecurity
IT & Security
Requirements
  • 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree
  • Certifications: DCWF Code 422 Intermediate: TBD
  • Secret Clearance
  • 2-6 years of relevant experience to include all of the following:
  • Demonstrated experience in information security or related field
  • Demonstrated experience developing data security standards
  • Experience in application level, database, file system and full disk encryption
Responsibilities
  • Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).
  • Cyber Defense Operations (CDO) Support. Provide sufficient staffing to maintain on-site capability IAW PWS paragraph 5.4: Place of Work and Work Hours to work directly with GCC Operations personnel in conducting initial triage/cyber incident analysis to include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-incident response ticket, making an initial determined category of cyber incident (IAW Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510), and/or notifying DCO/ARCYBER/Higher Headquarters IAW Commander’s Critical Information Requirements (CCIR) reporting requirements. All other CDO operations must have an on-call capability to take actions as required to respond to cyber incidents IAW policy and/or Government direction.
  • Incident Analysis and Mitigation. Provide incident analysis and mitigation support by conducting incident analysis and recommending mitigation measures in response to general or specific Advanced Persistent Threats (APT), (attempted exploits/attacks, malware delivery, etc.) on Army networks. In support of incident analysis and mitigation, the Contractor shall:
  • Block/deny access by hostile sites or restrict access by specific ports/protocols and/or applications.
  • Provide recommendations to the supporting operations and maintenance organization to take necessary action where the CSSP-D Division does not administratively control the sensor grid.
  • Provide justification of IDMs and/or operational impact (implied or accepted risk) to a Configuration Control Board (CCB) and/or Authorizing Official (AO), as required, for mitigation action (IDM) approval. If deemed appropriate (or as requested), the internal defensive measure may involve coordination of a Network Damage Assessment (NDA), Network Assistance Visit (NAVs), or other version of the Computer Defense Assistance Program (CDAP) mission.
  • Monitor all sensors and agents managed by the GCC for security event analysis and response and maintain/update the triage database with current threat data and response methods in real-time with follow-up recurring within 72 hours of last response. The Contractor shall respond to a detected event and perform triage, ensure proper handling of the associated trouble ticket (TT), and process events accordance with appropriate TTPs.
  • Provide all initial cyber incident reports to Law Enforcement and Counterintelligence (LE/CI) agencies and:
  • Maintain an up-to-date POC list for LE/CI agencies as routinely provided by the Major Cybercrimes Unit (MCU) and Cyber Counterintelligence agencies.
  • In cases where an active investigation will be opened, LE/CI agencies will provide written request that will include the official case number, specific data logs, and other required information IAW local TTPs.
  • Provide support and expertise include the provision of the required data along with a summary or analysis of the data. Data and answers provided in the analysis shall pertain specifically to requirements in the LE/CI official request or within CSSP-D TTPs.
  • Provide all initial cyber incident investigation reports to LE/CI.
  • Maintain a Master Station Log (MSL) to document high visibility cyber incidents, defined as events identified in an ARCYBER Task Order, a Named Operation, or a Category 1 (CAT1), with status, discuss DCO topics, share internal tasks between shifts, document call outs, and share any additional relevant instructions between shifts and up through GCC Leadership and Operations reporting channels. The MSL must be available for Government inspection at any given time to ensure accurate tracking of the above information.

Peraton provides advanced technology solutions and services primarily for government clients in the defense, intelligence, and critical infrastructure sectors. The company focuses on creating cyber-hardened systems, systems engineering, and mission-critical support to address complex national security challenges. Peraton works closely with other firms through partnerships that enhance its capabilities, ensuring effective communication and mutual growth. Its revenue comes from long-term contracts with government agencies, which often involve high-value projects requiring specialized expertise. Additionally, Peraton actively recruits veterans and military spouses, valuing the unique skills they bring to the workforce. The company's goal is to contribute to national security and technological advancement while supporting the military community.

Company Size

10,001+

Company Stage

Grant

Total Funding

$60M

Headquarters

Herndon, Virginia

Founded

2017

Simplify Jobs

Simplify's Take

What believers are saying

  • Growing demand for AI-driven fraud detection boosts Peraton's market potential.
  • Tony Encinias' appointment may expand technological strategies for state and local services.
  • Recognition as a VETS Indexes Employer enhances workforce diversity and innovation.

What critics are saying

  • Layoffs due to NASA contract cancellation suggest potential instability in future contracts.
  • AI tool launches may expose Peraton to risks like algorithmic bias or technical failures.
  • New CSO appointment may indicate previous security challenges or need for enhanced measures.

What makes Peraton unique

  • Peraton specializes in defense, intelligence, and critical infrastructure for government clients.
  • The company emphasizes veteran recruitment, enhancing workforce diversity and innovation.
  • Peraton's business model focuses on long-term government contracts and strategic partnerships.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Paid Vacation

Performance Bonus

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

0%

2 year growth

0%
Peraton
May 7th, 2025
Your Future, Our Mission: Find High-Impact Careers at Peraton's Virtual Hiring Event on May 21

Your future, its mission: find high-impact careers at Peraton's Virtual Hiring Event on May 21.

ExecutiveBiz
May 6th, 2025
Peraton Launches AI-Enabled Anti-Fraud Tool

Peraton launches ai-enabled anti-fraud tool.

Peraton
May 5th, 2025
Peraton Introduces Rapid Fraud Intelligence to Revolutionize Government Fraud Detection

Peraton today announced the launch of Rapid Fraud Intelligence (Rapid FI), an advanced fraud detection and prevention solution that combines artificial intelligence with decades of federal fraud-fighting expertise.

WashingtonExec
Apr 27th, 2025
Tony Encinias to Lead Peraton's Citizen Security and Public Services Sector

Peraton has named Tony Encinias to its Citizen Security and Public Services sector, where he will lead the technological strategy for the state and local government services business unit.

Peraton
Apr 17th, 2025
Peraton Recognized as a 2025 VETS Indexes Employer for Third Consecutive Year

Peraton was named, yet again, in this year's VETS Indexes Employer Awards program.