Responsibilities
Peraton has an opportunity for a Cyber Operations Specialist whose primary responsibility will be to serve as the lead for managing agency OPORDS & TASKORDs from receipt through completion. This role is central to the operational tempo of the organization requiring you to be the primary liaison between government leadership the Information Technology department and the Cyber Security team. The successful candidate will be responsible for interpreting operational directives and collaborating with technical and security teams to translate them into actionable plans ensuring the security and integrity of network operations. Additionally this role will cross-train to support the Information System Security Engineer (ISSE) efforts developing techniques and procedures focused on emerging threats to network security.
The successful candidate will perform the following:
As the lead for operational orders you will develop detailed execution plans for a range of cyber operations through direct collaboration with planners operators analysts and government leadership. You will analyze review and monitor incoming strategies doctrine and policies to ensure all actions comply with mandated government regulations. A key function will be to draft and provide briefings information papers and official correspondence on the status of all orders. You will assist leadership by identifying and implementing process improvements and developing Standard Operation Procedures (SOPs) to close documentation gaps. This involves reviewing prioritizing and submitting operational requirements for the acquisition of new cyber capabilities and applying specific guidance for integration into NOC and SOC activities.
In support of the technical teams you will take ownership of projects to implement security solutions ensuring requirements are met at the system level by coordinating with system leads and project managers. You will utilize DevSecOps methodologies to integrate security throughout the development lifecycle. As part of your cross-training you will support the ISSO with log reviews using tools like Splunk execute security scans with ACAS provide oversight to the remediation of findings and assist with the analysis and completion of DISA STIGs to ensure compliant solutions.
*This is a three-month (potentially longer) surge support effort.
*This position requires full-time onsite attendance Monday through Friday in the Baltimore metropolitan area.
Qualifications
Required Qualifications:
- Extensive hands-on experience in managing DoD OPORDS & TASKORDs including breaking them down into requirements developing implementation schedules and managing them to completion.
- Experience collaborating with technical teams on security policy identifying security requirements and providing guidance to meet deadlines for legacy systems.
- Ability to analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
- Knowledge of cyber security principles operations security cyber threats and vulnerabilities and national regulations as they relate to cyber security.
- Good analytic and problem-solving skills.
- Active TS with SCI eligibility.
- Active CompTIA Security certification.
- Associates degree and 10 years of experience; OR Bachelors degree and 8 years of experience; OR Masters Degree and 6 years of experience; OR 3 years with PhD. Bachelors or Masters degree should be within one of the following fields of study: Computer Science Cybersecurity Information Systems Information Technology Data Science or Software Engineering. However four (4) years of additional relevant experience or specialized training may be considered in lieu of a Bachelors degree.
Desired Qualifications:
- PMP certification.
- DISA STIGs and STIG Viewer experience.
- Experience working with AWS/Google cloud-hosted information systems or applications.
- Ability to prepare assessments and cyber threat profiles of current events based on the collection and analysis of classified and open-source information.
- Ability to develop and maintain analytical procedures to meet changing requirements and ensure maximum DevSecOps capabilities.
- Ability to support cloud security tasks.
- Experience working with Red Hat or CentOS Linux operating systems.
- Experience creating and using security tools for scanning testing monitoring and reporting.
- Experience in planning and overseeing configuration changes for major applications across multiple networks.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$112000 - $179000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
ResponsibilitiesPeraton has an opportunity for a Cyber Operations Specialist whose primary responsibility will be to serve as the lead for managing agency OPORDS & TASKORDs from receipt through completion. This role is central to the operational tempo of the organization requiring you to be the prim...
Responsibilities
Peraton has an opportunity for a Cyber Operations Specialist whose primary responsibility will be to serve as the lead for managing agency OPORDS & TASKORDs from receipt through completion. This role is central to the operational tempo of the organization requiring you to be the primary liaison between government leadership the Information Technology department and the Cyber Security team. The successful candidate will be responsible for interpreting operational directives and collaborating with technical and security teams to translate them into actionable plans ensuring the security and integrity of network operations. Additionally this role will cross-train to support the Information System Security Engineer (ISSE) efforts developing techniques and procedures focused on emerging threats to network security.
The successful candidate will perform the following:
As the lead for operational orders you will develop detailed execution plans for a range of cyber operations through direct collaboration with planners operators analysts and government leadership. You will analyze review and monitor incoming strategies doctrine and policies to ensure all actions comply with mandated government regulations. A key function will be to draft and provide briefings information papers and official correspondence on the status of all orders. You will assist leadership by identifying and implementing process improvements and developing Standard Operation Procedures (SOPs) to close documentation gaps. This involves reviewing prioritizing and submitting operational requirements for the acquisition of new cyber capabilities and applying specific guidance for integration into NOC and SOC activities.
In support of the technical teams you will take ownership of projects to implement security solutions ensuring requirements are met at the system level by coordinating with system leads and project managers. You will utilize DevSecOps methodologies to integrate security throughout the development lifecycle. As part of your cross-training you will support the ISSO with log reviews using tools like Splunk execute security scans with ACAS provide oversight to the remediation of findings and assist with the analysis and completion of DISA STIGs to ensure compliant solutions.
*This is a three-month (potentially longer) surge support effort.
*This position requires full-time onsite attendance Monday through Friday in the Baltimore metropolitan area.
Qualifications
Required Qualifications:
- Extensive hands-on experience in managing DoD OPORDS & TASKORDs including breaking them down into requirements developing implementation schedules and managing them to completion.
- Experience collaborating with technical teams on security policy identifying security requirements and providing guidance to meet deadlines for legacy systems.
- Ability to analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
- Knowledge of cyber security principles operations security cyber threats and vulnerabilities and national regulations as they relate to cyber security.
- Good analytic and problem-solving skills.
- Active TS with SCI eligibility.
- Active CompTIA Security certification.
- Associates degree and 10 years of experience; OR Bachelors degree and 8 years of experience; OR Masters Degree and 6 years of experience; OR 3 years with PhD. Bachelors or Masters degree should be within one of the following fields of study: Computer Science Cybersecurity Information Systems Information Technology Data Science or Software Engineering. However four (4) years of additional relevant experience or specialized training may be considered in lieu of a Bachelors degree.
Desired Qualifications:
- PMP certification.
- DISA STIGs and STIG Viewer experience.
- Experience working with AWS/Google cloud-hosted information systems or applications.
- Ability to prepare assessments and cyber threat profiles of current events based on the collection and analysis of classified and open-source information.
- Ability to develop and maintain analytical procedures to meet changing requirements and ensure maximum DevSecOps capabilities.
- Ability to support cloud security tasks.
- Experience working with Red Hat or CentOS Linux operating systems.
- Experience creating and using security tools for scanning testing monitoring and reporting.
- Experience in planning and overseeing configuration changes for major applications across multiple networks.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$112000 - $179000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
View more
View less