Peraton
Required Qualifications:
Bachelor’s degree (or equivalent) in related technical field from an accredited college/university
Active TS/SCI with Poly
1 year’s experience in three or more of the following: analysis, network engineering, network security, offensive experience, technical collection, penetration testing, ‘red teaming,’ hardware engineering, software reverse engineering, and computer exploitation
Desired Qualifications:
Relevant certifications: CISSP, CCFP, CCSP, CEH, GCFA, GCIA
Splunk
Linux
Detects, mitigates, and analyzes threats. Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment. Analyzes technical and non-technical data and metadata to determine normal patterns of events, pro-actively identify abnormalities, and determine root-cause of abnormalities. Correlates threat data from various sources. Prepares assessments and presentations of analyses and findings. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior intelligence officials.
#J-18808-Ljbffr
Bachelor’s degree (or equivalent) in related technical field from an accredited college/university
Active TS/SCI with Poly
1 year’s experience in three or more of the following: analysis, network engineering, network security, offensive experience, technical collection, penetration testing, ‘red teaming,’ hardware engineering, software reverse engineering, and computer exploitation
Desired Qualifications:
Relevant certifications: CISSP, CCFP, CCSP, CEH, GCFA, GCIA
Splunk
Linux
Detects, mitigates, and analyzes threats. Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment. Analyzes technical and non-technical data and metadata to determine normal patterns of events, pro-actively identify abnormalities, and determine root-cause of abnormalities. Correlates threat data from various sources. Prepares assessments and presentations of analyses and findings. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior intelligence officials.
#J-18808-Ljbffr