Responsibilities
Peraton requires a Cyber Security Technical Lead to support the Special Operation Command Information Technology Enterprise Contract (SITEC) 3 EOM. This position is located at MacDill AFB in Florida.
The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM its Component Commands its Theater Special Operations Commands (TSOCs) and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration change license and asset management; conduct training and perform Install Move Add Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM the CIO/J6 organization and ultimately the end-user who operate around the globe 24x7x365.
A Cyber Security Technical Lead focuses on designing building and implementing technical solutions that enable and enhance an organizations cybersecurity posture. This role emphasizes engineering innovative tools systems and processes that proactively address security challenges ensuring the organizations IT infrastructure is resilient against cyber threats. The Solutions Engineer leads a team of multi-talented cyber systems maintainers and collaborates with stakeholders to translate security requirements into technical solutions and integrates these solutions into existing cyber defense infrastructure.
- Leads a team of security engineers and administrators responsible for maintaining cybersecurity tools and platforms supporting endpoint network and SIEM operations.
- Provides technical direction workload prioritization and mentorship to ensure consistent engineering standards and effective tool sustainment.
- Oversees configuration management patching and lifecycle operations for cyber tools to ensure operational readiness and resilience.
- Conducts technical reviews validation and troubleshooting of service configurations and integrations.
- Coordinates with the Operations Manager to maintain uptime service health and compliance with defined service-level objectives.
- Provide technical leadership architectural direction and engineering oversight for all cybersecurity tools platforms and services that protect and enable the enterprise environment.
- Provides technical direction workload prioritization and mentorship to ensure consistent engineering standards and effective tool sustainment.
- Oversees configuration management patching and lifecycle operations for cyber tools to ensure operational readiness and resilience.
- Conducts technical reviews validation and troubleshooting of service configurations and integrations.
- Leads architecture and design discussions across cyber enclaves network zones and cloud environments to establish secure scalable and integrated solutions.
- Develops and maintains architecture diagrams design patterns and engineering standards for cybersecurity tools and data integrations.
- Defines integration architectures across systems such as SIEM EDR SOAR firewalls and identity platforms to maximize telemetry and detection fidelity.
- Collaborates closely with the Service Owner Lead to review design concepts and translate them into actionable technical strategies and implementation roadmaps.
- Evaluates emerging technologies and contributes to modernization and zero-trust architecture initiatives that enhance enterprise security posture.
- Provides senior technical oversight for sustainment operations across all cybersecurity platforms and services.
- Ensures robust configuration documentation version control and engineering discipline for all tool deployments and changes.
- Advises the Service Owner Lead on technical risk areas dependency impacts and resourcing needs for sustainment and modernization.
- Oversees technical validation during service transitions migrations and new tool onboarding to ensure smooth production integration.
- Serves as the primary technical liaison between cybersecurity services enterprise architecture and IT infrastructure teams.
- Ensures that architectural changes are communicated effectively across all operational and engineering teams.
- Develops and maintains comprehensive system and architecture documentation including network diagrams data flows and integration topologies.
- Documents engineering processes tool configurations and maintenance procedures in accessible repositories for team use and knowledge continuity.
- Supports version-controlled documentation practices within GitLab or Git repositories for traceability and technical integrity.
- Contributes to the creation and maintenance of engineering runbooks technical standards and design rationales that support consistent operations.
Qualifications
Required Qualifications:
- Min 16 years with HS Diploma 14 years with AS/AA degree 12 years with BS/BA 10 years with MS/MA and 7 years with PhD
- Strong understanding of Defensive Cyber Operations (DCO) Zero Trust Architecture and Cyber Enclave tools (Endpoint Network SIEM ACAS)
- A DoD TS/SCI clearance is required
- DoD 8570 IAT II certifications AND
- CEH OR
- CFR OR
- CCNA Cyber Ops OR
- CCNA-Security OR
- CySA OR
- CHFI OR
- GCIA OR
- GCIH OR
- GCFA OR
- GICSP OR
- Cloud OR
- SCYBER OR
- PenTest
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$104000 - $166000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
ResponsibilitiesPeraton requires a Cyber Security Technical Lead to support the Special Operation Command Information Technology Enterprise Contract (SITEC) 3 EOM. This position is located at MacDill AFB in Florida.The purpose of the Special Operations Forces Information Technology Enterprise Contr...
Responsibilities
Peraton requires a Cyber Security Technical Lead to support the Special Operation Command Information Technology Enterprise Contract (SITEC) 3 EOM. This position is located at MacDill AFB in Florida.
The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM its Component Commands its Theater Special Operations Commands (TSOCs) and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration change license and asset management; conduct training and perform Install Move Add Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM the CIO/J6 organization and ultimately the end-user who operate around the globe 24x7x365.
A Cyber Security Technical Lead focuses on designing building and implementing technical solutions that enable and enhance an organizations cybersecurity posture. This role emphasizes engineering innovative tools systems and processes that proactively address security challenges ensuring the organizations IT infrastructure is resilient against cyber threats. The Solutions Engineer leads a team of multi-talented cyber systems maintainers and collaborates with stakeholders to translate security requirements into technical solutions and integrates these solutions into existing cyber defense infrastructure.
- Leads a team of security engineers and administrators responsible for maintaining cybersecurity tools and platforms supporting endpoint network and SIEM operations.
- Provides technical direction workload prioritization and mentorship to ensure consistent engineering standards and effective tool sustainment.
- Oversees configuration management patching and lifecycle operations for cyber tools to ensure operational readiness and resilience.
- Conducts technical reviews validation and troubleshooting of service configurations and integrations.
- Coordinates with the Operations Manager to maintain uptime service health and compliance with defined service-level objectives.
- Provide technical leadership architectural direction and engineering oversight for all cybersecurity tools platforms and services that protect and enable the enterprise environment.
- Provides technical direction workload prioritization and mentorship to ensure consistent engineering standards and effective tool sustainment.
- Oversees configuration management patching and lifecycle operations for cyber tools to ensure operational readiness and resilience.
- Conducts technical reviews validation and troubleshooting of service configurations and integrations.
- Leads architecture and design discussions across cyber enclaves network zones and cloud environments to establish secure scalable and integrated solutions.
- Develops and maintains architecture diagrams design patterns and engineering standards for cybersecurity tools and data integrations.
- Defines integration architectures across systems such as SIEM EDR SOAR firewalls and identity platforms to maximize telemetry and detection fidelity.
- Collaborates closely with the Service Owner Lead to review design concepts and translate them into actionable technical strategies and implementation roadmaps.
- Evaluates emerging technologies and contributes to modernization and zero-trust architecture initiatives that enhance enterprise security posture.
- Provides senior technical oversight for sustainment operations across all cybersecurity platforms and services.
- Ensures robust configuration documentation version control and engineering discipline for all tool deployments and changes.
- Advises the Service Owner Lead on technical risk areas dependency impacts and resourcing needs for sustainment and modernization.
- Oversees technical validation during service transitions migrations and new tool onboarding to ensure smooth production integration.
- Serves as the primary technical liaison between cybersecurity services enterprise architecture and IT infrastructure teams.
- Ensures that architectural changes are communicated effectively across all operational and engineering teams.
- Develops and maintains comprehensive system and architecture documentation including network diagrams data flows and integration topologies.
- Documents engineering processes tool configurations and maintenance procedures in accessible repositories for team use and knowledge continuity.
- Supports version-controlled documentation practices within GitLab or Git repositories for traceability and technical integrity.
- Contributes to the creation and maintenance of engineering runbooks technical standards and design rationales that support consistent operations.
Qualifications
Required Qualifications:
- Min 16 years with HS Diploma 14 years with AS/AA degree 12 years with BS/BA 10 years with MS/MA and 7 years with PhD
- Strong understanding of Defensive Cyber Operations (DCO) Zero Trust Architecture and Cyber Enclave tools (Endpoint Network SIEM ACAS)
- A DoD TS/SCI clearance is required
- DoD 8570 IAT II certifications AND
- CEH OR
- CFR OR
- CCNA Cyber Ops OR
- CCNA-Security OR
- CySA OR
- CHFI OR
- GCIA OR
- GCIH OR
- GCFA OR
- GICSP OR
- Cloud OR
- SCYBER OR
- PenTest
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$104000 - $166000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
View more
View less