Work with Us

If you’re passionate about national security, you belong at Peraton.

Contact Us

Cyber/SIGINT

We support offensive and defensive cyber operations and the national and tactical signals enterprise.

Peraton designs, develops, and manages Computer Network Operations that are critical to our nation’s information infrastructure. We create tools and techniques that directly support foreign cyberspace operations to enable SIGINT missions, and build solutions that ultimately protect critical data through secure, high-speed network solutions, cross-domain security tools, and cyber risk evaluation solutions.

Focus Areas

High-Speed Network Solutions

Developed in support of the Naval Research Lab and Joint Improvised Explosive Device Organization, xWAN™ uses a cloud-transport layer that is based on true Infini-Band over WAN (IBoWAN) communications with tightly coupled data storage, servers, and services. xWAN™ enables immediate file access to globally distributed information as if it was local, increasing productivity and resulting in less wait time, shortened decision cycles, and increased collaboration.

Cyber Risk Services

We employ a comprehensive, systematic process to identify security risks associated with the disruption, theft, corruption, or unauthorized disclosure of data associated with IT infrastructure, processes, and personnel. Our team takes a "top-down" security management approach when we perform architecture assessments of organizational units, locations, and information systems. That includes building filters within our open-source intelligence data base to determine if client data has been compromised.

Training

Led by certified subject matter experts, Peraton’s cyber training uses various educational platforms to provide training on the most pertinent cyber security topics affecting U.S. critical infrastructure. We help our partners and customers comply with DoD Defense Directive 8570.1 and provide training on topics including cyber security and risk management, digital forensics, cyber attacks, exploitation, and offensive and defensive cyber operations.

Cross-Domain Solutions

Our fast and secure cross-domain solutions allow government IT systems to transfer data between isolated security domains with essential and configurable transfer services customized to system needs. Data transfers are automatically audited and filtered to protect against cyber attacks and enable more effective collaboration across security domains.

Certified Ethical Hackers

Our highly-specialized cyber experts cover a wide range of today’s cyber threats in any environment, from the White House to the International Space Station. Certified Ethical Hackers, Licensed Penetration Testers, Vulnerability Analysts, and experts trained in the art of Darknet reconnaissance and threat intelligence use their skills to ensure protection of our customers’ critical networks and information.

Network Platform Protection & Exploitation

Peraton provides enterprise protection-planning services that test existing incident-response plans, compares them to known security best practices, identifies gaps, and increases user awareness relating to security governance, authority and accountability, incident response and forensic procedures, evidence preservation, security countermeasures, and emerging cyber threats.

Mission Management

We develop and sustain solutions for computer forensics, offensive and defensive information technology security, large databases, and secure high-speed networking. We continuously monitor systems, software, and devices, provide private networks for high-availability requirements, assess and test emerging technologies, respond quickly and comprehensively to all incidents, and develop the necessary tools, software, and systems.

Spotlight

Advanced Cross-Domain Data Sharing

Supporting the Air Force Research Laboratory’s Information Support Server Environment (ISSE) program with advanced cross-domain solutions.

Learn More

Peraton protects the nation’s most sensitive information and networks.

Facts & Figures

850K+

Websites and forums crawled and indexed daily by open-source, threat intelligence platform, TORNADO.

20+

Years providing innovative secure communications systems to our warfighters.

33+

Languages in which our team can detect cyber threats across open-source platforms.

#1

Data loss prevention product, PuriFile, is used by DoD, the Intelligence Community, and governments around the world.

Advancing Your Mission

See All

Work with Us

If you’re passionate about national security, you belong at Peraton.

Contact Us