Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Threat Analyst image - Rise Careers
Job details

Cyber Threat Analyst

Responsibilities

Job Title: Cyber Threat Analyst

 

Job Summary

This Cyber Threat Analyst supports the Defense Cyber Crime Center (DC3), and participates as a team member analyzing cyber threats based on knowledge of cybersecurity and concepts supporting intelligence analysis requirements for all-source cyber analysis and reporting.

 

This role involves a focus on the Defense Industrial Base (DIB), ensuring that critical defense contractors and their supply chains are protected from cyber threats. You will work within a dynamic team to identify and mitigate cyber risks, analyze forensic data, and provide actionable intelligence to support defensive cybersecurity operations.

 

Key Responsibilities

  • Cyber Threat Analysis: Analyze and interpret cyber threat intelligence with a focus on threats impacting the Defense Industrial Base (DIB). Identify potential risks and vulnerabilities affecting defense contractors and their supply chains.
  • Reporting: Prepare detailed reports and briefings on cyber incidents, threat analysis, and investigative findings with particular emphasis on impacts to the DIB. Communicate findings and recommendations to senior officials and stakeholders.
  • Incident Response: Triage, analysis and support incident response activities related to cybersecurity incidents affecting the DIB, including detection, analysis, and mitigation of breaches or attacks.
  • Collaboration: Work closely with DIB and interagency partners to share information and coordinate response efforts. Facilitate communication and support to defense contractors as needed.
  • Tool Utilization: Use cybersecurity tools and technologies to conduct fusion analysis; performs queries, pivots on indicators, and research malware characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.). May leverage tools such as Analyst1, Kibana, Virus Total, Recorded Future, etc.
  • Continuous Improvement: Contribute to the development and enhancement of cyber investigation methodologies, tools, and processes, with a particular focus on improving security within the DIB.

Qualifications

  • Clearance requirement: Active/current Secret (TS/SCI preferred).
  • Education: Associates degree and 7+ years of experience; OR Bachelor’s degree and 5+ years of experience; OR Master’s Degree and 3+ years of experience. Or 0 years with PhD. However, four (4) years of additional relevant experience or specialized training will be considered in lieu of a Bachelor’s degree. Relevant certifications (e.g., CYSA+, CISSP, CEH, CISM) are preferred.
  • Experience: Experience in cybersecurity analysis, incident response, or digital forensics. Requires a detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods, production resources, and responsibilities. Knowledge of advanced persistent threats (APTs), Tactics Techniques and Procedures (TTPs)
  • Technical Skills: Proficiency in cybersecurity tools and technologies (e.g., Virus Total, Domain Tools, SIEM, IDS/IPS, forensic analysis tools). Knowledge of operating systems, network protocols, cyber threat actors, cyber kill chain, Indicator of Compromises (IOCs) and MITRE ATT&CK framework
  • Analytical Skills: Requires skills and abilities in supervising the handling classified information. Strong analytical and problem-solving skills with the ability to interpret complex data and provide actionable insights.
  • Communication Skills: Excellent written and verbal communication skills, with the ability to convey technical information and threat impacts to non-technical audiences and stakeholders. Requires prior experience briefing information to decision-makers and leaders. Uses Jira to track analysis tasks and communicate status.
  • Team Player: Ability to work effectively in a team environment and collaborate with various stakeholders, including those in the DIB. Provides mentorship to less-senior analysts.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.

EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.

Average salary estimate

$112000 / YEARLY (est.)
min
max
$86000K
$138000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Threat Analyst, Peraton

Join Peraton as a Cyber Threat Analyst in Linthicum and take on an exciting role that directly impacts our national security! In this position, you'll support the Defense Cyber Crime Center (DC3), collaborating with a dynamic team to analyze cyber threats specifically targeting the Defense Industrial Base (DIB). Your primary responsibilities will revolve around identifying and mitigating risks that could endanger critical defense contractors and their supply chains. Utilizing state-of-the-art cybersecurity tools, you’ll prepare detailed reports on incidents and share actionable intelligence with senior officials and stakeholders. Your insights will influence decision-making, making it vital to communicate complex findings clearly to both technical and non-technical audiences. Furthermore, you'll be actively involved in incident response activities, ensuring that cybersecurity incidents are swiftly addressed. This role is perfect for those with a strong analytical background, as you'll need to interpret forensic data and utilize various cybersecurity tools effectively, like Analyst1 and Kibana. It's a fantastic opportunity for professionals with a passion for improving security practices and methodologies within the DIB, offering room for growth and mentorship opportunities within the team. If you have a strong background in cybersecurity analysis and are ready to tackle challenges head-on, Peraton is looking for you. With a competitive salary range and an inclusive work culture, this could be your chance to make a difference while taking your career to new heights!

Frequently Asked Questions (FAQs) for Cyber Threat Analyst Role at Peraton
What are the main responsibilities of a Cyber Threat Analyst at Peraton?

As a Cyber Threat Analyst at Peraton, your main responsibilities will include analyzing cyber threats targeting the Defense Industrial Base (DIB), preparing detailed reports on cyber incidents, and supporting incident response activities. You will also collaborate with DIB partners, utilize advanced cybersecurity tools, and contribute to improving security practices for defense contractors.

Join Rise to see the full answer
What qualifications do I need to become a Cyber Threat Analyst at Peraton?

To be considered for the Cyber Threat Analyst position at Peraton, candidates should have an active Secret clearance, and a relevant educational background (Associates degree with 7+ years of experience, Bachelor’s degree with 5+ years, or a Master’s degree with 3+ years). Additional relevant certifications such as CYSA+, CISSP, or CEH are preferred, and experience in cybersecurity analysis, incident response, or digital forensics is crucial.

Join Rise to see the full answer
What tools do Cyber Threat Analysts use at Peraton?

Cyber Threat Analysts at Peraton utilize a variety of cybersecurity tools to conduct their analysis and reporting. Key tools include Analyst1, Kibana, Virus Total, and forensic analysis technologies. Familiarity with operating systems, network protocols, and malware characteristics is essential for successful threat detection and analysis.

Join Rise to see the full answer
How does the Cyber Threat Analyst role at Peraton contribute to national security?

The Cyber Threat Analyst role at Peraton directly contributes to national security by protecting the Defense Industrial Base (DIB) from cyber threats. By analyzing intelligence, preparing reports, and responding to incidents, you help ensure that critical defense contractors and their supply chains are safeguarded against potential vulnerabilities and attacks.

Join Rise to see the full answer
What is the typical salary range for a Cyber Threat Analyst at Peraton?

The typical salary range for a Cyber Threat Analyst at Peraton is between $86,000 and $138,000, depending on the candidate's experience and qualifications. This competitive range reflects the critical nature of the work and the expertise required to excel in this role.

Join Rise to see the full answer
Common Interview Questions for Cyber Threat Analyst
What methods do you use to analyze cyber threats?

In answering this question, focus on mentioning specific analytical techniques you use, technologies you're familiar with, and your experience in interpreting threat intelligence. Highlight your familiarity with tools like Cyber Kill Chain and MITRE ATT&CK framework and how they guide your assessments.

Join Rise to see the full answer
Can you describe your experience with incident response?

When discussing your experience with incident response, be sure to share specific examples of incidents you have handled. Detail the processes you followed, tools you used, and the outcomes of your response efforts, demonstrating your problem-solving and decision-making skills.

Join Rise to see the full answer
How do you stay updated with the latest cyber threats and trends?

Explain your methods of staying informed about the latest cyber threats, whether through continuous education, attending conferences, or following relevant publications. This shows your dedication to professional growth and awareness of evolving cybersecurity landscapes.

Join Rise to see the full answer
What challenges have you faced in cybersecurity analysis, and how did you overcome them?

Identify a specific challenge you've faced in your previous roles and describe the steps you took to overcome it. Highlight your analytical skills, teamwork, and how you implemented lessons learned for better future outcomes.

Join Rise to see the full answer
How do you prioritize tasks during an incident response?

Discuss your task prioritization process, especially during high-pressure incidents. Focus on using risk assessment techniques, communication with team members, and adherence to established protocols to effectively manage the situation.

Join Rise to see the full answer
Can you provide an example of a time when you communicated technical information to a non-technical audience?

Here, you should reflect on a specific instance where you successfully translated complex technical details of a cyber incident or threat into an easily understandable format. Highlight your communication skills and the positive outcomes of that interaction.

Join Rise to see the full answer
What experience do you have with cybersecurity tools?

Make sure to mention specific cybersecurity tools you have experience with, such as Virus Total or SIEM platforms. Highlight your proficiency in using these tools for threat detection, incident management, and reporting,

Join Rise to see the full answer
How do you collaborate with stakeholders during a cybersecurity incident?

Detail your approach to collaborating with different stakeholders during incidents. Include communication strategies you employ and how you ensure that all parties are informed and involved in decision-making.

Join Rise to see the full answer
What is your understanding of advanced persistent threats (APTs)?

Share your knowledge of APTs, including how they operate, their tactics, and the type of organizations they typically target. Emphasize your analytical methods for detecting and responding to APTs.

Join Rise to see the full answer
Why do you want to work as a Cyber Threat Analyst at Peraton?

Articulate your enthusiasm for the position at Peraton, referring to the company’s mission and values. Highlight how your skills and experiences align with the role's responsibilities, and express your desire to contribute meaningfully to national security.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 7 days ago

Join Peraton as an Engineering Project Manager to lead and deliver critical engineering projects for the Department of Homeland Security.

Photo of the Rise User

Join Peraton as a PC Technician and contribute to supporting critical IT operations for the Special Operations Command.

Photo of the Rise User

Seeking a Desktop Engineer to enhance our IT capabilities through effective endpoint management and cybersecurity integration.

Photo of the Rise User
Sago Remote No location specified
Posted yesterday

Join Sago's InfoSec team as a Cloud Security Engineer to secure cloud infrastructure and lead threat detection efforts.

Photo of the Rise User
Posted 7 days ago

As an Information Systems Security Officer at Agile Defense, you will ensure the implementation of essential security measures for IT systems while collaborating with elite professionals in a spirited culture.

Join UWM as a Team Lead to mentor a talented desktop engineering team responsible for optimizing user computing environments.

Photo of the Rise User

Seeking an Information Security Engineer to join our team and ensure the resilience and security of our operations.

Photo of the Rise User
Posted 12 days ago

As a Senior Systems Engineer, you'll play a crucial role in maintaining and improving our innovative eCommerce and Digital Presence infrastructure.

Cornell Hybrid Ithaca (Main Campus)
Posted 6 days ago

Join Cornell University as an IT Support Technician IV, where you'll play a critical role in supporting faculty, students, and staff with their IT needs.

Photo of the Rise User
Posted 2 days ago

Join the NYC Department of Finance as an Open Text Exstream Developer to support vital IT solutions for the city's finance systems.

Our mission is to protect and promote freedom around the world by Securing our future, Connecting our world, Safeguarding our enterprise, Protecting our borders, Enabling commerce, Enhancing human knowledge, and Protecting our citizens.

444 jobs
MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 15, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Akron just viewed 3D Vehicle Artist (Unannounced Project) at Wargaming
Photo of the Rise User
9 people applied to GRC Director at Tanium
Photo of the Rise User
Someone from OH, Bowling Green just viewed Associate Designer at Newell Brands
Photo of the Rise User
Someone from OH, Twinsburg just viewed Finishing Operator - Nights at Avery Dennison
Photo of the Rise User
10 people applied to IT Support Intern at SoundCloud
D
Someone from OH, Cleveland just viewed Technical Writer at DevSavant Inc.
Photo of the Rise User
50 people applied to Cyber Crime Analyst at TEKsystems
S
Someone from OH, Dayton just viewed Inventory Control Associate at SCLogistics
Photo of the Rise User
52 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
11 people applied to SOC Analyst at Prosegur
Photo of the Rise User
61 people applied to SOC Analyst I at Epsilon
a
Someone from OH, Newark just viewed Billing Follow Up Rep I at aah
Photo of the Rise User
Someone from OH, Columbus just viewed Assistant Merchandising and Inventory Manager at Jushi
Photo of the Rise User
Someone from OH, Akron just viewed Entry Level Communications at Smart Solutions
Photo of the Rise User
Someone from OH, Toledo just viewed Processing Technician at Jushi
Photo of the Rise User
Someone from OH, Greenfield just viewed HR Generalist II at Protolabs
C
Someone from OH, Bowling Green just viewed Field Service Administrator at Cornerstone Building Brands
Photo of the Rise User
Someone from OH, Cleveland just viewed Vice President, Revenue Operations at Docebo
Photo of the Rise User
Someone from OH, Mansfield just viewed Director, Professional Education at Evolus
1
Someone from OH, Cleveland just viewed Copywriter at 1840 & Company
Photo of the Rise User
Someone from OH, Louisville just viewed Communications Manager at Shearer's Foods
Photo of the Rise User
Someone from OH, Cincinnati just viewed Chief of Staff to the CFO at Super.com
Photo of the Rise User
Someone from OH, Columbus just viewed 5-8th Grade Art Teacher - SY 24-25 at ACCEL Schools
H
Someone from OH, Akron just viewed Brand Marketing Manager at Huntington