Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Systems Operation Research Analyst (CORA) Reviewer image - Rise Careers
Job details

Cyber Systems Operation Research Analyst (CORA) Reviewer

Responsibilities

Peraton seeks a Cyber Operations Research Analyst (CORA) Reviewer to conduct DODIN cybersecurity reviews conducted on site at Continental United States (CONUS), Outside Continental United States (OCONUS), and DOD mission partner locations.  Travel is expected.

Location: Chambersburg, PA.

 

 

Tasks include:

  • Support inspections,evaluations, audits, assessments, DCO-IDM missions, and/or self-assessments of the DODIN -- follow the DODIN Inspections and Assessments Schedule.
  • Support on-the-job training and certify new Reviewers via the reviewer certification process. 
  • Perform assessments of systems and networks within a Network Environment (NE) / enclave and identifiy deviations from acceptable configurations, enclave policy, or local policy. 
  • Follow policies and procedures for specific review type, ensuring thattechnical expertise is properly represented.  
  • Conduct vulnerability reviews, review Security Requirements Guides (SRGs), STIGs, DOD Policy, Cyber Tasking Orders (CTO) and Operational Orders to determine the security posture and compliance of the site/NE/enclave
  • Assist in developing the Executive Summary/Briefings/Reports foreach trip/assessmet.
  • Conduct internal and/or external vulnerability scans  
  • Assemble scanning “packages” prior to conducting scans
  • Perform technical Security Readiness Reviews (SRRs)
  • Use  the appropriate technology STIG/SRG and, where applicable, the appropriate automated script or tool for that technology.
  • Provide assessments of the security posture of the organization (traditional):  Personnel security, INFOSEC, Physical security, Industrial security, Counterintelligence, and overall security management. 
  • Develop and maintain cybersecurity vulnerability review, inspection, and audit Standard Operation Procedures (SOPs), Tactics, Techniques and Procedures (TTPs), checklists, and guides
  • Identify the root cause and gap analysis
  • Provide resolution support during the Cybersecurity review
  • Provide recommendations for fixes and mitigation strategies and validate post inspection vulnerability mitigation actions as requested.
  • Identify where systems/networks deviate from acceptable configurations, enclave policy, or local policy.

Qualifications

Required:

  • Minimum of 12 years experience with BS/BA, 10 years with MS/MA, 7 years with Ph.D. Will consider HS with 16 years of experience. 
  • Senior Reviewers must have at least 2 years of direct experience 
  • This position aligns to the KSA's idenified to the Vulnerability Assessment Analyst under the DOD Cyber Workforce Framework (DCWF):
    • Must have experience in collecting, analyzing, and assessing data in order to provide formal feedback.  Specifically, able to analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives (i.e., analysis of mitigations).
    • Should have experience with maintaining a deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
    • Skilled in reviewing logs to identify evidence of past intrusions.

    • Able to identify systemic security issues based on the analysis of vulnerability and configuration data

    • Able to identify/assess proper acrchitecture for different operating environments

    • Understanding of cybersecurity strategy in cloud computing service and deployment models 

  • Must have knowledge of applicable DOD cyber defense policies, regulations, and compliance documents  
  • Needs to have an understanding of different types of reviews/assessments 
  • As a CORA Reviewer, must cross-certify in multiple related technology areas to allow flexibility for assessment needs from various organizations (e.g., network reviewer may also support network vulnerability scan, virtual infrastructure, cloud, and other related areas)
  • Travel is expected to worldwide locations.  Travel will be conducted in accordance with the Task Order guidelines.
  • Current IAT Level II certification or the ability to obtain within 60 days of hire
  • Current IAM Level II certification or the ability to obtain within 60 days of hire
  • TS/SCI security clearance or the abllity to obtain SCI
  • U.S Citizenship required

Preferred:

  • Active TS/SCI clearance
  • Current IAT Level III CSSP-Auditor certification
  • Current IAM Level III certification

Benefits:

 

Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.

EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.

Average salary estimate

$190000 / YEARLY (est.)
min
max
$146000K
$234000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Systems Operation Research Analyst (CORA) Reviewer, Peraton

Peraton is on the lookout for a passionate Cyber Systems Operation Research Analyst (CORA) Reviewer to join our dynamic team in Chambersburg, PA. If you thrive in cybersecurity and possess a keen eye for detail, then this might be the perfect role for you! As a CORA Reviewer, your responsibilities will include conducting crucial DODIN cybersecurity reviews not just within the continental U.S. but also at overseas locations. You'll have the exciting opportunity to support inspections, audits, and assessments, ensuring our network environments are secure. You'll be a pivotal part of on-the-job training, certifying new reviewers through our certification process. If you have experience evaluating systems and networks and can spot deviations from acceptable configurations, you'll fit right in. Not only will you be conducting vulnerability reviews and scanning, but you'll also be providing insightful feedback and crafting executive summaries for each mission. With no two days being the same, expect to collaborate on developing SOPs and TTPs while conducting thorough assessments. Travel is part of the job, taking you to various sites, and you’ll have the ability to make a significant impact on the cybersecurity posture of the organization. If you're ready to take on challenges, share your expertise, and grow with an innovative company like Peraton, we’d love to hear from you!

Frequently Asked Questions (FAQs) for Cyber Systems Operation Research Analyst (CORA) Reviewer Role at Peraton
What are the main responsibilities of a Cyber Systems Operation Research Analyst (CORA) Reviewer at Peraton?

As a Cyber Systems Operation Research Analyst (CORA) Reviewer at Peraton, your primary responsibilities include conducting comprehensive cybersecurity reviews on the DODIN, engaging in inspections, evaluations, and audits, as well as supporting robust assessments of network environments. Additionally, you will be actively involved in training and certifying new reviewers, performing vulnerability assessments, and ensuring compliance with security guidelines. Your role is critical in maintaining the integrity and security of our systems, ensuring that all practices align with applicable cybersecurity policies and protocols.

Join Rise to see the full answer
What qualifications are required for the Cyber Systems Operation Research Analyst (CORA) Reviewer position at Peraton?

To qualify for the Cyber Systems Operation Research Analyst (CORA) Reviewer role at Peraton, candidates typically need a minimum of 12 years of experience with a Bachelor's degree, or lesser experience with advanced degrees. Senior Reviewers must possess direct experience in the field. Knowledge of DOD cybersecurity policies and audit tools is essential, along with relevant certifications such as IAT Level II or IAM Level II. Candidates who understand vulnerability assessment techniques and can analyze cybersecurity strategies in various environments will have a strong advantage.

Join Rise to see the full answer
What kind of travel is expected for the Cyber Systems Operation Research Analyst (CORA) Reviewer role at Peraton?

The Cyber Systems Operation Research Analyst (CORA) Reviewer position at Peraton involves considerable travel, both CONUS and OCONUS. As the role requires visits to DOD mission partner locations, candidates should be prepared for travel opportunities that could take them worldwide. However, all travel will be conducted following established Task Order guidelines, ensuring that it aligns with project needs while providing candidates with a diverse range of experiences.

Join Rise to see the full answer
What benefits does Peraton offer to Cyber Systems Operation Research Analyst (CORA) Reviewers?

Peraton provides a comprehensive benefits package for Cyber Systems Operation Research Analyst (CORA) Reviewers that includes heavily subsidized health insurance for you and your dependents, an attractive PTO structure with 25 days accrued annually, and participation in a lucrative bonus plan. We prioritize the well-being of our employees and ensure they are supported throughout their career with us, especially given the critical nature of the work we do in national security.

Join Rise to see the full answer
What opportunities for career advancement exist for Cyber Systems Operation Research Analyst (CORA) Reviewers at Peraton?

Peraton values professional growth and offers numerous opportunities for career advancement within the Cyber Systems Operation Research Analyst (CORA) Reviewer position. As you perform impactful work across various cybersecurity initiatives, you will be equipped with the skills and experience necessary to transition into more senior roles. Continuing education and access to advanced training resources are also provided to facilitate your career development within our dynamic organization.

Join Rise to see the full answer
Common Interview Questions for Cyber Systems Operation Research Analyst (CORA) Reviewer
How do you conduct a vulnerability assessment as a Cyber Systems Operation Research Analyst (CORA) Reviewer?

To effectively conduct a vulnerability assessment, you should start by reviewing the existing configurations and policies of the systems in question. Familiarize yourself with security requirements guides and compliance documents. Use automated tools to scan for vulnerabilities, analyze security logs for potential threats, and document deviations from best practices. Lastly, provide actionable recommendations based on your findings.

Join Rise to see the full answer
Can you explain your experience with DOD cybersecurity policies?

When answering this question, you should discuss your familiarity with specific DOD cybersecurity regulations, including their development and implementation. Highlight any previous roles where you ensured compliance with these policies and detail any experiences you have had analyzing policy impacts on cybersecurity posture within organizations.

Join Rise to see the full answer
What is your approach to training new reviewers in cybersecurity?

A good approach in training new reviewers would include a mix of hands-on training and theoretical instruction. I would start with mentorship, providing them with resources to understand the necessary policies and procedures. Additionally, I'd involve them in real assessments under supervision to build their confidence, followed by a certification process to ensure they are well-prepared for the field.

Join Rise to see the full answer
Describe a time when you identified a significant security issue.

In your response, outline a specific instance where your investigation led to the discovery of a critical vulnerability. Discuss the steps you took to remediate the issue, the impact it had on the organization, and how the situation emphasized the importance of rigorous assessment in cybersecurity.

Join Rise to see the full answer
What tools do you typically use for vulnerability scanning?

Mention industry-standard tools you are familiar with, such as Nessus, Qualys, or OpenVAS. Explain how you use these tools to detect vulnerabilities, and integrate their findings with manual assessments to provide a comprehensive view of the system's security posture.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats?

To stay informed about current cybersecurity threats, I follow various cybersecurity news sources, forums, and professional organizations. I also attend conferences and webinars, participate in discussion groups, and continuously pursue certifications and training, ensuring that my knowledge and skills are always current and relevant.

Join Rise to see the full answer
What is your process for conducting technical Security Readiness Reviews (SRRs)?

An effective process for conducting Security Readiness Reviews begins with gathering necessary documentation and examining existing security controls. I would conduct thorough interviews with the relevant personnel, analyze system vulnerabilities, and cross-check compliance with DOD directives to prepare my final assessment report, ensuring it accurately reflects the security readiness of the reviewed systems.

Join Rise to see the full answer
Can you discuss your experience with conducting audits?

Discuss any prior experience with security audits, explaining the methodology you employed. Be prepared to outline the various types of audits you have executed, such as internal versus external audits, and how you identified and sought to rectify discrepancies in compliance or security practices.

Join Rise to see the full answer
How do you prioritize tasks during cybersecurity assessments?

Discuss your approach to managing multiple tasks by leveraging risk prioritization strategies. Highlight that you assess factors such as the potential impact of vulnerabilities on the organization, importance of timelines, and available resources, ensuring that high-risk issues receive immediate attention while keeping a structured workflow.

Join Rise to see the full answer
What role does teamwork play in a Cyber Systems Operation Research Analyst (CORA) Reviewer’s job?

Emphasize that teamwork is essential in achieving common cybersecurity goals. You work collaboratively with other cybersecurity professionals to share insights, validate findings, and ensure all assessments reflect consensus understanding of vulnerabilities and mitigations. Building strong partnerships enhances the effectiveness of the cybersecurity reviews.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User

Join Peraton's dynamic team as a Configuration Management Lead Associate to support NASA's critical communications services.

Photo of the Rise User

As a Tier 2 Service Desk Representative at Peraton, you will deliver advanced technical support and enhance service processes within a dynamic IT environment.

Posted 11 days ago

Take the reins in leading database management as HireRight seeks a skilled DBA and Systems Manager in Nashville.

Photo of the Rise User
Aprio Remote No location specified
Posted 2 days ago

Join Aprio as a Manager of Application Development and lead a dynamic team in a top-ranked advisory firm.

Photo of the Rise User

Join Toyota's TRAC team as a Threat Research & Analysis Center Analyst, focusing on cybersecurity threat intelligence and defense strategies.

Photo of the Rise User
The Rank Group Hybrid Ebene, Quatre Bornes, Mauritius
Posted 13 days ago

Rank Interactive seeks a dedicated Site Reliability Engineer to enhance system performance and reliability across their global platforms.

Photo of the Rise User
Posted 4 days ago
Posted 8 days ago

A Systems Administration Design Engineer role at CACI offering the chance to contribute to crucial national defense technology.

Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
Posted 9 days ago

Join The Boeing Company as a Mid-Level Systems DevOps Developer and shape the future of network automation.

Our mission is to protect and promote freedom around the world by Securing our future, Connecting our world, Safeguarding our enterprise, Protecting our borders, Enabling commerce, Enhancing human knowledge, and Protecting our citizens.

575 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 30, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
X
Someone from OH, Cleveland just viewed Lead / Senior Analyst - SAP HCM at Xcellink Pte Ltd
Photo of the Rise User
57 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
Someone from OH, Akron just viewed Accounting Co-Op at VEGA Americas
R
Someone from OH, Cincinnati just viewed Director, Payroll Tax at Ryan
Photo of the Rise User
13 people applied to Intern/Co-op-4 at GE
P
Someone from OH, Columbus just viewed Data Science for Smart Agriculture- Part-Time at PSU
Photo of the Rise User
Someone from OH, Cincinnati just viewed Brand Management & Partnerships Assistant at LAIKA
Photo of the Rise User
Someone from OH, Athens just viewed Senior Multimedia Artist, Design & Creative at RepRisk AG
Photo of the Rise User
62 people applied to Cyber Crime Analyst at TEKsystems
H
Someone from OH, Rocky River just viewed Training Manager at Hotel Bardo Savannah
F
Someone from OH, Columbus just viewed VP of Communications at Freedom Together Foundation
Photo of the Rise User
Someone from OH, Columbus just viewed Chief Organizational Communication Officer at Providence
Photo of the Rise User
Someone from OH, Cuyahoga Falls just viewed SEASONER at Shearer's Foods
Photo of the Rise User
Someone from OH, Columbus just viewed Bilingual Care Manager, Telephonic RN at Humana
Photo of the Rise User
Someone from OH, Columbus just viewed Talent Business Partner at Red Bull
Photo of the Rise User
Someone from OH, Brunswick just viewed Sanitation Team Member at Shearer's Foods
Photo of the Rise User
Someone from OH, Columbus just viewed Talent Acquisition Specialist at Beghou Consulting
C
Someone from OH, Middletown just viewed Operations Analyst at Core Specialty Insurance
A
Someone from OH, Strongsville just viewed Graphic Design Intern at Anvil NorthWest