Responsibilities
Peraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).
Location: Wiesbaden Germany.
In this role you will:
- Monitor analyze and act on SIEM alerts and events to detect malicious activities across information systems and networks as part of adedicated rotating 24/7 incident response team to ensure continuous operational coverage.
- Work on first second or third shift on a rotation to accomplish the duties and responsibilities.
- Support dynamic cyber defense operations by coordinating security toolsets and adhering to the Department of Defense framework for measuring and quantifying cyber risk.
- Conduct threat and vulnerability analysis by evaluating network and host activity against baseline requirements researching security standards reviewing vulnerability findings related to SIEM alerts and analyzing system logs for indicators of malicious intent.
- Manage incident response by documenting and classifying incidents (in accordance with Army and DoD regulations) determining root causes coordinating remediation efforts and performing post-intrusion analyses to identify detection gaps;
- Communicate effectively by providing timely incident updates and daily reports to higher headquarters and Defensive Cyber Operations staff and by preparing visual charts diagrams and comprehensive reports to support metrics analysis and enhance cybersecurity posture.
- Optimize detection capabilities by developing specialized SIEM queries tuning IDS/IPS rules to reduce false positives and documenting identified vulnerabilities for operational integration.
- Provide team and customer support by assisting various sections of the Defensive Cyber Operations team and conducting in-depth network security evaluations at customer sites.
Advanced Analysis and Expert Responsibilities:
- Utilize SIEM technologies for advanced cyber forensics to detect and deter malicious actors targeting networked weapons platforms and U.S. DoD networks.
- Analyze host and network events to assess operational impact and advisory capabilities.
- Develop analytics based on indicators of compromise and perform forensic investigations by dissecting host data to determine the root causes tactics techniques and tools used in cyber intrusions.
- Prepare high-quality strategic reports presentations and recommendations for senior U.S. government intelligence and network operations officials.
Qualifications
Minimum Qualifications:
- BS/BA with 3 years of relevant experience; Additional years of relevant experience may be considered in lieu of degree aligned with the TESA requirements below:
- Must be able to qualify for Technical Expert Status Accreditation (TESA) by having a bachelors degree in a STEM or Business field plus 3 years of specialized experience.
- Associates degree plus 7 years of specialized experience.
- Major certification plus 7 years of specialized experience.
- Active DoD Approved 8140 Certification in:
- DCWF 531 Intermediate (MB.S. in IT or one of the following: CEH ECIH GRID RCCE Level 1 CBROPS CCSP Cloud FITSP-O GCED GCIH GSEC PenTest Security or an Advanced certificate).
- 8140 Residential Certification (One of: Cisco Cyber Ops Proa SANS GIAC Cert Blue Team Level 1 Microsoft Certified Operations Analyst Associate or Offensive Security OSDA).
- Fluent in all aspects of government and corporate communications media to include all MS Office products and common task ticketing systems.
- Must have a solid understanding of networking protocols their uses and their potential misuses.
- Experience with one or more scripting languages such as PowerShell Bash Python or Perl.
- Ability to work independently as well as part of a team.
- Strong written and verbal communication skills required.
- U.S. citizenship required.
- Active Top Secret with SCI eligibility.
Preferred Qualifications:
- Experience with the Elastic SIEM.
- Experience in Microsoft MDE XDR or Sentinel.
- Experience in packet captures and analyzing a network packet.
- Experience with intrusion detection systems such as Snort Suricata and Zeek.
- Experience with Microsoft Windows event IDs.
- Experience with Linux audit log analysis.
- Familiarity with Git and VScode.
- Strong understanding of adversary tactics techniques and procedures (TTPs) and the MITRE ATT&CK framework.
- Experience with one or more scripting languages such as PowerShell Bash Python.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$80000 - $128000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
ResponsibilitiesPeraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).Location: Wiesbaden Germany.In this role you will:Monitor analyze and act on SIEM alerts and events to detect malicious activi...
Responsibilities
Peraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).
Location: Wiesbaden Germany.
In this role you will:
- Monitor analyze and act on SIEM alerts and events to detect malicious activities across information systems and networks as part of adedicated rotating 24/7 incident response team to ensure continuous operational coverage.
- Work on first second or third shift on a rotation to accomplish the duties and responsibilities.
- Support dynamic cyber defense operations by coordinating security toolsets and adhering to the Department of Defense framework for measuring and quantifying cyber risk.
- Conduct threat and vulnerability analysis by evaluating network and host activity against baseline requirements researching security standards reviewing vulnerability findings related to SIEM alerts and analyzing system logs for indicators of malicious intent.
- Manage incident response by documenting and classifying incidents (in accordance with Army and DoD regulations) determining root causes coordinating remediation efforts and performing post-intrusion analyses to identify detection gaps;
- Communicate effectively by providing timely incident updates and daily reports to higher headquarters and Defensive Cyber Operations staff and by preparing visual charts diagrams and comprehensive reports to support metrics analysis and enhance cybersecurity posture.
- Optimize detection capabilities by developing specialized SIEM queries tuning IDS/IPS rules to reduce false positives and documenting identified vulnerabilities for operational integration.
- Provide team and customer support by assisting various sections of the Defensive Cyber Operations team and conducting in-depth network security evaluations at customer sites.
Advanced Analysis and Expert Responsibilities:
- Utilize SIEM technologies for advanced cyber forensics to detect and deter malicious actors targeting networked weapons platforms and U.S. DoD networks.
- Analyze host and network events to assess operational impact and advisory capabilities.
- Develop analytics based on indicators of compromise and perform forensic investigations by dissecting host data to determine the root causes tactics techniques and tools used in cyber intrusions.
- Prepare high-quality strategic reports presentations and recommendations for senior U.S. government intelligence and network operations officials.
Qualifications
Minimum Qualifications:
- BS/BA with 3 years of relevant experience; Additional years of relevant experience may be considered in lieu of degree aligned with the TESA requirements below:
- Must be able to qualify for Technical Expert Status Accreditation (TESA) by having a bachelors degree in a STEM or Business field plus 3 years of specialized experience.
- Associates degree plus 7 years of specialized experience.
- Major certification plus 7 years of specialized experience.
- Active DoD Approved 8140 Certification in:
- DCWF 531 Intermediate (MB.S. in IT or one of the following: CEH ECIH GRID RCCE Level 1 CBROPS CCSP Cloud FITSP-O GCED GCIH GSEC PenTest Security or an Advanced certificate).
- 8140 Residential Certification (One of: Cisco Cyber Ops Proa SANS GIAC Cert Blue Team Level 1 Microsoft Certified Operations Analyst Associate or Offensive Security OSDA).
- Fluent in all aspects of government and corporate communications media to include all MS Office products and common task ticketing systems.
- Must have a solid understanding of networking protocols their uses and their potential misuses.
- Experience with one or more scripting languages such as PowerShell Bash Python or Perl.
- Ability to work independently as well as part of a team.
- Strong written and verbal communication skills required.
- U.S. citizenship required.
- Active Top Secret with SCI eligibility.
Preferred Qualifications:
- Experience with the Elastic SIEM.
- Experience in Microsoft MDE XDR or Sentinel.
- Experience in packet captures and analyzing a network packet.
- Experience with intrusion detection systems such as Snort Suricata and Zeek.
- Experience with Microsoft Windows event IDs.
- Experience with Linux audit log analysis.
- Familiarity with Git and VScode.
- Strong understanding of adversary tactics techniques and procedures (TTPs) and the MITRE ATT&CK framework.
- Experience with one or more scripting languages such as PowerShell Bash Python.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$80000 - $128000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
View more
View less