Demo

Cyber Defense Operations Manager - Security Clearance Required

Peraton
Peraton Salary
Washington, DC Full Time
POSTED ON 1/19/2025
AVAILABLE BEFORE 4/8/2025

Responsibilities

Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks / systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System / Network Intrusion Detection System (NIPS / NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E : Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information / point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU / A), Service Level Agreements (SLA).

  • Cyber Defense Operations (CDO) Support. Provide sufficient staffing to maintain on-site capability IAW PWS paragraph 5.4 : Place of Work and Work Hours to work directly with GCC Operations personnel in conducting initial triage / cyber incident analysis to include, review correlated events, system / device logs, and SIEM event data to determine and recommend / take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-incident response ticket, making an initial determined category of cyber incident (IAW Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510), and / or notifying DCO / ARCYBER / Higher Headquarters IAW Commander's Critical Information Requirements (CCIR) reporting requirements. All other CDO operations must have an on-call capability to take actions as required to respond to cyber incidents IAW policy and / or Government direction.
  • Incident Analysis and Mitigation. Provide incident analysis and mitigation support by conducting incident analysis and recommending mitigation measures in response to general or specific Advanced Persistent Threats (APT), (attempted exploits / attacks, malware delivery, etc.) on Army networks. In support of incident analysis and mitigation, the Contractor shall :
  • Block / deny access by hostile sites or restrict access by specific ports / protocols and / or applications.
  • Provide recommendations to the supporting operations and maintenance organization to take necessary action where the CSSP-D Division does not administratively control the sensor grid.
  • Provide justification of IDMs and / or operational impact (implied or accepted risk) to a Configuration Control Board (CCB) and / or Authorizing Official (AO), as required, for mitigation action (IDM) approval. If deemed appropriate (or as requested), the internal defensive measure may involve coordination of a Network Damage Assessment (NDA), Network Assistance Visit (NAVs), or other version of the Computer Defense Assistance Program (CDAP) mission.
  • Monitor all sensors and agents managed by the GCC for security event analysis and response and maintain / update the triage database with current threat data and response methods in real-time with follow-up recurring within 72 hours of last response. The Contractor shall respond to a detected event and perform triage, ensure proper handling of the associated trouble ticket (TT), and process events accordance with appropriate TTPs.
  • Provide all initial cyber incident reports to Law Enforcement and Counterintelligence (LE / CI) agencies and :
  • Maintain an up-to-date POC list for LE / CI agencies as routinely provided by the Major Cybercrimes Unit (MCU) and Cyber Counterintelligence agencies.
  • In cases where an active investigation will be opened, LE / CI agencies will provide written request that will include the official case number, specific data logs, and other required information IAW local TTPs.
  • Provide support and expertise include the provision of the required data along with a summary or analysis of the data. Data and answers provided in the analysis shall pertain specifically to requirements in the LE / CI official request or within CSSP-D TTPs.
  • Provide all initial cyber incident investigation reports to LE / CI .
  • Maintain a Master Station Log (MSL) to document high visibility cyber incidents, defined as events identified in an ARCYBER Task Order, a Named Operation, or a Category 1 (CAT1), with status, discuss DCO topics, share internal tasks between shifts, document call outs, and share any additional relevant instructions between shifts and up through GCC Leadership and Operations reporting channels. The MSL must be available for Government inspection at any given time to ensure accurate tracking of the above information.

Qualifications

Basic Qualifications :

  • 10 years of experience, may have management experience
  • Certifications : Information Technology Infrastructure Library Manager's Expert Certificate or higher. DCWF Code 431 Intermediate : CompTIA Security or Systems Security Certified Practitioner (SSCP)
  • Must have and maintian a Secret Clearance
  • Experience managing a team of technical professionals in an IT service desk-oriented environment
  • Experience in the management of the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs / WANs, servers, terminals) as well as server applications and software
  • Peraton Overview

    Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains : land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.

    Target Salary Range

    80,000 - $128,000. This represents the typical salary range for this position based on experience and other factors.

    Salary : $80,000 - $128,000

    If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
    Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

    What is the career path for a Cyber Defense Operations Manager - Security Clearance Required?

    Sign up to receive alerts about other jobs on the Cyber Defense Operations Manager - Security Clearance Required career path by checking the boxes next to the positions that interest you.
    Income Estimation: 
    $135,994 - $168,063
    Income Estimation: 
    $220,784 - $286,649
    Income Estimation: 
    $87,466 - $114,731
    Income Estimation: 
    $114,790 - $146,930
    Income Estimation: 
    $115,647 - $153,495
    Income Estimation: 
    $152,958 - $200,151
    Income Estimation: 
    $186,685 - $265,377
    Income Estimation: 
    $142,618 - $183,267
    Income Estimation: 
    $173,252 - $220,888
    Income Estimation: 
    $115,647 - $153,495
    Income Estimation: 
    $186,685 - $265,377
    Income Estimation: 
    $217,783 - $309,543
    View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

    Job openings at Peraton

    Peraton
    Hired Organization Address Washington, DC Full Time
    Responsibilities Technology is constantly changing and our adversaries are digitally exceeding law enforcement’s ability...
    Peraton
    Hired Organization Address Offutt AFB, NE Full Time
    Responsibilities Peraton is hiring a Senior Systems Administrator at USSTRATCOM - Offutt AFB, Nebraska. What you will do...
    Peraton
    Hired Organization Address Huntsville, AL Full Time
    Responsibilities Position Overview: We are seeking a highly skilled and experienced Senior Technical SIGINT Analyst to p...
    Peraton
    Hired Organization Address Huntsville, AL Full Time
    Responsibilities We are looking for a motivated and technically skilled Technical SIGINT Analyst to support our governme...

    Not the job you're looking for? Here are some other Cyber Defense Operations Manager - Security Clearance Required jobs in the Washington, DC area that may be a better fit.

    Associate Director, Application Security Engineering - Evinova

    50200043 - Cyber Security Manager, Gaithersburg, MD

    AI Assistant is available now!

    Feel free to start your new journey!