Work with Us
If you’re passionate about national security, you belong at Peraton.Contact Us
Peraton designs, develops, and manages Computer Network Operations that are critical to our nation’s information infrastructure. We create tools and techniques that directly support foreign cyberspace operations to enable SIGINT missions, and build solutions that ultimately protect critical data through secure, high-speed network solutions, cross-domain security tools, and cyber risk evaluation solutions.
Developed in support of the Naval Research Lab and Joint Improvised Explosive Device Organization, xWAN™ uses a cloud-transport layer that is based on true Infini-Band over WAN (IBoWAN) communications with tightly coupled data storage, servers, and services. xWAN™ enables immediate file access to globally distributed information as if it was local, increasing productivity and resulting in less wait time, shortened decision cycles, and increased collaboration.
We employ a comprehensive, systematic process to identify security risks associated with the disruption, theft, corruption, or unauthorized disclosure of data associated with IT infrastructure, processes, and personnel. Our team takes a "top-down" security management approach when we perform architecture assessments of organizational units, locations, and information systems. That includes building filters within our open-source intelligence data base to determine if client data has been compromised.
Led by certified subject matter experts, Peraton’s cyber training uses various educational platforms to provide training on the most pertinent cyber security topics affecting U.S. critical infrastructure. We help our partners and customers comply with DoD Defense Directive 8570.1 and provide training on topics including cyber security and risk management, digital forensics, cyber attacks, exploitation, and offensive and defensive cyber operations.
Our fast and secure cross-domain solutions allow government IT systems to transfer data between isolated security domains with essential and configurable transfer services customized to system needs. Data transfers are automatically audited and filtered to protect against cyber attacks and enable more effective collaboration across security domains.
Our highly-specialized cyber experts cover a wide range of today’s cyber threats in any environment, from the White House to the International Space Station. Certified Ethical Hackers, Licensed Penetration Testers, Vulnerability Analysts, and experts trained in the art of Darknet reconnaissance and threat intelligence use their skills to ensure protection of our customers’ critical networks and information.
Peraton provides enterprise protection-planning services that test existing incident-response plans, compares them to known security best practices, identifies gaps, and increases user awareness relating to security governance, authority and accountability, incident response and forensic procedures, evidence preservation, security countermeasures, and emerging cyber threats.
We develop and sustain solutions for computer forensics, offensive and defensive information technology security, large databases, and secure high-speed networking. We continuously monitor systems, software, and devices, provide private networks for high-availability requirements, assess and test emerging technologies, respond quickly and comprehensively to all incidents, and develop the necessary tools, software, and systems.
Empowering the Air Force Research Laboratory’s Information Support Server Environment (ISSE) program with advanced cross domain solutions.Learn More
Peraton protects the nation’s most sensitive information and networks.
Websites and forums crawled and indexed daily by open-source, threat intelligence platform, TORNADO.
Years providing innovative secure communications systems to our warfighters.
Languages in which our team can detect cyber threats across open-source platforms.
Data loss prevention product, PuriFile, is used by DoD, the Intelligence Community, and governments around the world.
Peraton will provide agile IT engineering support and innovation to advance national security...
In our human quest for other habitable planets, we have found our most viable second home on...
Pushing the boundaries of traditional cybersecurity paradigms takes a brilliant mind infused...
Secure framework for responsive development and rapid deployment of cross domain solutions.