6 hours

Cyber Defensive Operator II

Fort Meade, MD 20755
Business Group Highlights


The Defense group supports the Department of Defense (DoD) mission to keep our homeland and its citizens safe. We provide solutions to improve the Nation's defense by providing software, systems engineering, IT, training and logistics and fleet management solutions.


Specific Tasks:

Generate requests for endpoint data outside of standardized queries to fulfill current operations objectives
Gather and analyze endpoint data from across JFHQ-DODINs span of control (Areas of Operation and Sectors) through DOD Component (Combatant Command, Service, Agency, and Field Activity) endpoint management systems in order to inform a Joint Operations Area (JOA) common operating picture (COP)
Execute planned, formulated queries using an endpoint management system (e.g. Tanium, McAfee HBSS) to perform asset discovery and enumeration on Non-classified Internet Protocol Router Network (NIPRNet) and Secret Internet Protocol Router Network (SIPRNet) workstations, servers, and windows-only tablets
Review, analyze, and verify current endpoint security configuration and effectiveness in response to emerging threats
Analyze and combine endpoint data with combat information and intelligence reporting to show trends over time and develop countermeasures for defensive cyberspace operations internal defensive measures
Maintain an endpoint management portal containing current and archived endpoint management-related orders, memos, guidance and standard queries
Develop and assist in overseeing the implementation of short-term and long-range projects related to endpoint security capabilities
Serve as a Future Operations planner to develop, analyze, evaluate, advise, and present ACEM options to senior JFHQ-DODIN J3 leadership on DODIN Operations and DCO-IDM planning efforts.
Participate in or lead the ACEM future operations planning efforts for global theater-specific DODIN Operations and DCO-IDM. Review, comment, or develop DODIN Operations and DCO plans and policies for the JFHQ-DODIN.
Participate as a member of the ACEM Operational Planning Team (OPT) and outcomes to include the following: Initiation; Mission Analysis; Course of Action (COA) Development; COA Analysis & Cyber-gaming; COA Comparison; COA Approval; Plan/Order Development.
Provides input for the development of ACEM TTPs, CONOPs, COAs, and other related documents related to DCO, DCO-IDM and the securing, operating, and defending of the DODIN.
Provides input to briefings, transitioning concepts to execution, and assisting in the coordination of joint planning in support of training, exercises, and contingency plans and operations.
Must comply with DOD 8570.01M IAM Level III expertise

General Tasks:

Provides feedback to design engineers and evaluates end-to-end systems and systems-oriented products through their entire life cycle. Working as expert, conducts research and evaluates technical performance of software products and overall segments and systems. Ensures products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verification methods. Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks. Assesses performance using evaluation criteria and technical performance measures. Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis. Participates in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements. Reviews test plans/procedures and ensures they verify/validate the requirements. Develops and maintains analytical procedures to meet changing requirements. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and operations officials.


Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.

Analysts should have experience with Information Assurance DOD 8570 IAM Level III Certification (CISM, CISSP, GSLC, or CCISO) to support detection, monitoring, correlation, and prevention of cyber threat activity targeting DODIN.

Analysts must possess experience with creating analysis and conducting assessments from a cyber-threat perspective
Demonstrate experience analyzing large amounts of data and ability to prepare, write and present reports at the executive and/or congressional levels.
Display excellent communication skills (verbal and written)
Be proficient in Microsoft Office Professional Suite of applications

TS/SCI Clearance Required.

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.

Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.

Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

As a government contractor, Perspecta abides by the following provision
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)


  • Information Technology
Posted: 2019-10-17 Expires: 2019-11-15

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cyber Defensive Operator II

Fort Meade, MD 20755

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast