Cyber Threat Analyst - GTA

<p>Minimum requirements:</p><ul><li>Bachelor’s degree and a minimum of 9 years of relevant experience; 7 years with a Masters; 4 years with a PhD. <ul><li>An additional 4 years of experience will be considered in lieu of degree/education. </li></ul></li><li>Possess and maintain, or be able to obtain before start date, one of the following professional certifications:<ul><li><p>CASP+ CE; CCNA Cyber Ops; CCNA-Security; CCNP Security; CEH; CFR; CISA; CISSP (or Associate); Cloud+; CySA+; GCED; GCIA; GCIH; GICSP; SCYBER; VCA DCV; PPDA; Agile IC;SNOW App Dev </p></li></ul></li><li>Demonstrated strong writing and briefing skills; experience delivering reports to senior leadership.</li><li>Expertise in adversarial cyber actors, historical cyber activity, and the current cyber landscape.</li><li>Experience conducting research on classified systems and utilizing open-source cyber resources.</li><li>Knowledge of how USG personnel are targeted domestically and overseas by cyber threats.</li><li>Technical proficiency in cybersecurity principles, including malware analysis, network defense, and incident response.</li><li>Demonstrated familiarity with intelligence tradecraft, cyber threat intelligence methodologies, and cyber threat frameworks (MITRE ATT&CK, Cyber Kill Chain, etc.).</li><li>Ability to work in a fast-paced, mission-critical environment while managing multiple priorities.</li><li>U.S. citizenship required. </li><li>Active Top Secret security clearance with the ability to obtain a final Top Secret/SCI clearance.</li></ul><p>Desired Qualifications:</p><p> </p><ul><li>Experience with cyber threat intelligence platforms, intrusion detection systems, and SIEM tools.</li><li>Knowledge of foreign cyber threat actors and their strategic objectives.</li><li>Previous experience in a government, military, or intelligence community (IC) role.</li></ul> <p>Peraton is <!--StartFragment -->Cyber Threat Analyst – Global Threat Analysis (GTA) for its' Federal Strategic Cyber program.</p><p> </p><p>Location: Arlington, VA (Full-time, On-site, 5-days per week)</p><p> </p><p>In this role, you will:  </p><ul><li>Need to have regional cyber threat expertise, a deep understanding of historical cyber activity, and a strong grasp of the current global cyber threat landscape. </li><li>Combine technical expertise with analytical writing and briefing skills to assess, contextualize, and communicate cyber threats.</li><li>Conduct research on classified systems and leverage open-source cyber resources to deliver intelligence-driven insights.</li><li>Must also be able to demonstrate a strong understanding of how U.S. Government (USG) personnel are targeted domestically and overseas by cyber adversaries.</li></ul><p>Key Responsibilities:</p><ul><li>Analyze cyber threats from state and non-state actors, identifying trends, tactics, techniques, and procedures (TTPs).</li><li>Conduct in-depth research on classified systems and leverage open-source intelligence (OSINT) to assess emerging threats.</li><li>Provide cybersecurity briefings and consultations to diverse audiences—including technical experts, non-technical stakeholders, and senior leadership—to support informed decision-making.</li><li>Monitor and evaluate adversarial cyber activity and its implications for USG personnel and critical infrastructure.</li><li>Collaborate with internal and external partners to enhance situational awareness and strengthen cybersecurity posture.</li><li>Utilize technical expertise to assess malware, exploit trends, and cyber intrusion techniques.</li><li>Maintain up-to-date knowledge of global cyber threats and actors, particularly those with strategic impact on U.S. interests.</li></ul><p>Ideal Candidate Profile:</p><ul><li>Regional cyber threat expertise with knowledge of historical and current adversarial activity.</li><li>Strong analytical writing and briefing skills, with the ability to communicate complex threats clearly.</li><li>Technical proficiency in malware analysis, intrusion techniques, and exploit trends.</li><li>Experience conducting research on classified systems and integrating OSINT resources.</li><li>Deep understanding of adversarial targeting of USG personnel and critical infrastructure.</li></ul>

Back to blog

Other Jobs To Apply