The U.S Army Regional Cyber Center – Europe (RCC-E) is a critical hub for defending military networks and detecting threats in the European theater.
Over the last 18 years, the RCC-E has leveraged Peraton’s services and technical expertise to effectively deploy technology and personnel needed to accomplish critical missions overseas.
Read about just a few of the ways that Peraton is delivering critical IT and cybersecurity support to the U.S. Army and our allies right now:
Network and firewall administration
“Our team is dedicated to securing and monitoring the perimeter network for the European theater, as well as all mission partner networks across Europe. We work tirelessly to defend against cyber threats and enable seamless cyberspace operations. Beyond the perimeter, we ensure the security of the internal network by enforcing strict compliance through Authentication, Authorization, and Auditing (AAA).”
– Network Lead
Vulnerability identification and cloud integration
“Identifying vulnerabilities provides a clear view of an adversary’s attack surface, enabling proactive remediation before exploitation. This prevents costly cleanup operations and allows engineers to focus on their core mission: creating and improving our nation’s most critical networks.”
– ACAS Technical Lead
“We enable cloud integration by facilitating the onboarding and migration of endpoints into the Army.mil tenant, ensuring compliance with the Army Unified Directory Service (AUDS) and the Army Unified Network Plan (AUNP). Furthermore, we resolve systemic issues through problem management and work closely with the Global Cyber Center (GCC) for advanced troubleshooting, supporting seamless operations across the Army enterprise network.”
– Systems Management Lead
Incident response and threat analysis
“Team Peraton’s incident response efforts serve as a crucial line of defense, swiftly identifying and neutralizing cyber threats to maintain the operational readiness of U.S. forces throughout the European theater. Furthermore, Team Peraton bolsters the collective security of our NATO allies by sharing threat intelligence and coordinating defensive actions, which deters adversarial aggression and ensures a unified cyber defense posture to the network.”
– Incident Response lead
Signature development and sensor management
“Signature development helps defend the European effort and our allies by continuously adapting to new threats as they are identified in our AOR by taking the known bad about the threats (such as known TTPs and IOCs), developing analytics to easily identify this activity being present on our network, and then creating detection rules that will provide alerting to IRO analysts for real-time triaging. This process allows us to maintain our defensive and always-ready cyber posture in the European theater.”
– Detection Engineering Lead
Penetration testing
“It enables us to proactively identify vulnerabilities and validate our defense-in-depth strategies, ensuring we address any gaps in detection and response capabilities.”
– Pentest SME
“We leverage threat intelligence to identify emerging vulnerabilities that may not yet be patched or detected, allowing us to proactively assess and strengthen our security posture in real time.”
– Pentest SME
“The penetration testing program at Regional Cyber Center–Europe strengthens the defense of U.S. Army systems by emulating adversary behavior to validate existing controls, identifying vulnerabilities before they can be exploited, and evaluating the response capabilities of the Cyber Security Service Provider.”
– Penetration Testing Lead
Read how Peraton continues to support critical networks and warfighters abroad.
Learn more
Related Content
Peraton & RCC-E: Providing Digital Deterrence for Our Nation’s Allies
With the proliferation of large-scale cyberattacks against America and its allies in recent years, securing military networks has become as critical to national security as defending physical borders. Protecting digital infrastructures and threat monitoring not only strengthens operational resilience; it also reinforces deterrence against adversaries looking to disrupt or exploit U.S. and allied capabilities. For
Read more