We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Incident Response Analyst

Peraton
United States, Arizona, Fort Huachuca
Jan 06, 2025

Incident Response Analyst
Job Locations

US-AZ-Fort Huachuca


Requisition ID
2025-153440

Position Category
Customer Service

Clearance
Secret



Responsibilities

Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).
* Threat and Data Analysis. Perform the following threat and data analysis functions:
* Analyze, correlate, and trend anomalous cyber events and incidents: analyze and correlate anomalous events identified in, SIEM systems, Big Data Analytics, and supporting devices/applications. The GCC SIEM ingests feeds from over 21 different connectors to include items such as NIPS sensors, NIDS sensors, and Primary Internet Exchange (PIX) Firewall, proxy, router, policy Orchestrator (ePO) servers, and server system logs, Active Directory, Domain Name Service (DNS), etc., generating over 800 events per second (eps) or over 50 million events per day.
* Conduct open-source research to identify commercial exploits or vulnerabilities (i.e. Zero - Day) requiring CSSP actions. The Contractor shall identify current Army detection capabilities (Host Base Security System (HBSS), IDS/IPS, etc.) for new or potential threat activity.
* Report and facilitate the correction of issues with correlation tools and data feeds.
* Participate in the ARCYBER signature working groups and upload to the portal allowing for signature development and standardization across all RCC's.
* Create, recommend, or refine TTP's as appropriate or requested.
* Conduct cyber threat analysis and hunting utilizing proactive and iterative approaches to search all supported networks to detect and isolate advanced threats that may evade existing security solutions.
* Examine threat intelligence from DoD and public sources to identify threats that are relevant within the AOR.
* Provide recommendations and operational impact assessments of identified domains to increase the likelihood of identifying advanced intruders and malicious software in supported networks.
* Conduct Cyber Analysis missions that include items such as examining information systems, network devices, and endpoints for indicators of compromise and network activity via a plethora of network artifacts including network flow, packet analysis, network device logs, etc.
* Consolidate the research and results of the Cyber Analysis missions and produce a Threat Analysis report or Operational Impact Assessment. Cyber Analysis results shall also be incorporated into PPT missions and shared with GCC leadership, subscribers, and stakeholders.
* Perform technical analysis of computer network intrusion events and malicious activity in support of CSSP efforts.
* Analyze trends and statistics of cyber activity to provide proactive indications and warnings of malicious cyber activity that are affecting or may affect Army networks in the future.
* Perform filter queries of network flow data and analyze results for anomalies and malicious indicators.
* Analyze the origins, pathways, and methodologies of malicious cyber activities to attribute, model and predict future intrusions.
* Analyze computer network intrusion events and malicious activity to support intrusion detection and cyberattack warning.
* Provide recommendation for defensive measures and mitigation techniques to deny further exploitation by the adversary; synchronize and integrate intelligence activities to detect, analyze and recommend mitigation of cyber threats and vulnerabilities.
* Provide recommendations for appropriate response and actions to the activity to identify vulnerabilities, correct faults, and defeat or defend against threat activity.
* Perform threat analysis of emails held for review to determine if content poses a risk to the DoDIN-A. Complete release actions, escalation for Government review, or report as a cyber incident in accordance with the incident response plan (historically 50,000 emails reviewed per year).



Qualifications

Basic Qualifications:

    Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD
  • Possess and maintain a Secret security clearance
  • Certifications: DCWF Code 511 Intermediate: CompTIA Cloud+ or CompTIA PenTest+ or CompTIA Security+ or GIAC Certified Enterprise Defender (GCED) or GIAC Foundational Cybersecurity Technologies (GFACT) or GIAC Information Security Fundamentals (GISF)
  • Proven experience in maintaining accurate records of customer interactions.
  • Strong management and scheduling skills.
  • Experience with O365.
  • Problem-solving ability and demonstrates flexible with the ability to multi-task.
  • Possess attention to detail and follow-through.
  • Ability to be flexible, organize priorities in a fast-paced work environment, while maintaining a high level of focus and accuracy.
  • High level of professionalism and ability to maintain confidentiality.
  • Capable of following detailed training documentation.
  • Expertise in fostering teamwork and collaboration.
  • Ability to provide timely feedback and responses.
  • Willingness to work weekend and support rotating shifts


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.



Target Salary Range

$66,000 - $106,000. This represents the typical salary range for this position based on experience and other factors.
Applied = 0

(web-776696b8bf-ksmj8)