Work with Us
If you’re passionate about national security, you belong at Peraton.Careers
Peraton designs, develops, and manages computer network operations that are critical to our nation’s information infrastructure. We create tools and techniques that directly support cyberspace operations to enable SIGINT missions, and build solutions that ultimately protect critical data through secure, high-speed network solutions, cross-domain security tools, and cyber risk evaluation solutions.
Developed in support of the Naval Research Lab and Joint Improvised Explosive Device Organization, xWAN™ uses a cloud-transport layer that is based on true Infini-Band over WAN (IBoWAN) communications with tightly coupled data storage, servers, and services. xWAN™ enables immediate file access to globally distributed information as if it was local, increasing productivity and resulting in less wait time, shortened decision cycles, and increased collaboration.
We employ a comprehensive, systematic process to identify security risks associated with the disruption, theft, corruption, or unauthorized disclosure of data associated with IT infrastructure, processes, and personnel. Our team takes a "top-down" security management approach when we perform architecture assessments of organizational units, locations, and information systems. That includes building filters within our open-source intelligence data base to determine if client data has been compromised.
Led by certified subject matter experts, Peraton’s cyber training uses various educational platforms to provide training on the most pertinent cyber security topics affecting U.S. critical infrastructure. We help our partners and customers comply with DoD Defense Directive 8570.1 and provide training on topics including cyber security and risk management, digital forensics, cyber attacks, exploitation, and offensive and defensive cyber operations.
Our fast and secure cross domain solutions deliver essential and configurable transfer services which enable government IT systems to more effectively collaborate across isolated security domains. Our cross domain solutions are engineered to fit seamlessly into tactical as well as enterprise environments. Data transfers are automatically audited and filtered to protect against cyber attacks.
Our highly-specialized cyber experts cover a wide range of today’s cyber threats in any environment, from the White House to the International Space Station. Certified Ethical Hackers, Licensed Penetration Testers, Vulnerability Analysts, and experts trained in the art of Darknet reconnaissance and threat intelligence use their skills to ensure protection of our customers’ critical networks and information.
Peraton provides enterprise protection-planning services that test existing incident-response plans, compares them to known security best practices, identifies gaps, and increases user awareness relating to security governance, authority and accountability, incident response and forensic procedures, evidence preservation, security countermeasures, and emerging cyber threats.
We develop and sustain solutions for computer forensics, offensive and defensive information technology security, large databases, and secure high-speed networking. We continuously monitor systems, software, and devices, provide private networks for high-availability requirements, assess and test emerging technologies, respond quickly and comprehensively to all incidents, and develop the necessary tools, software, and systems.
Empowering the Air Force Research Laboratory with advanced, innovative cross domain solutions.Learn More
Peraton protects the nation’s most sensitive information and networks.
Websites and forums crawled and indexed daily by open-source, threat intelligence platform, TORNADO.
Years providing innovative secure communications systems to our warfighters.
Languages in which our team can detect cyber threats across open-source platforms.
Data loss prevention product, PuriFile, is used by DoD, the Intelligence Community, and governments around the world.
The world wide web is just the tip of the iceberg when it comes to what is online. Beyond all...
In late 2019, a federal jury convicted a defendant of using the Internet to target and extort...
Award recognizes deep expertise in supporting space and ground systems for warfighting...
Trusted partnership delivers mission agility with next generation secure data sharing...