Cyberspace Defensive Analyst
Fort Meade, Anne Arundel County, Maryland, USA
Listed on 2026-02-27
-
IT/Tech
Cybersecurity
Search by Keyword (use Keyword for Remote Positions)
Select how often (in days) to receive an alert:
Location: Fort Meade, MD, Maryland, United States
Requisition Number:26389
Required Travel: 0 - 10%
Employment Type:
Full Time/Salaried/Exempt
Anticipated Salary Range:$73,193.00-$85,319.00
Security Clearance:
TS/SCI with Poly
Level of
Experience:
Entry Level
This opportunity resides with Warfare Systems (WS), a business group within HII’s Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5
ISR systems.
HII works within our nation’s intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII’s Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense – the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5
ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that’s right for you. Apply today. We look forward to meeting you.
Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today’s rapidly changing, multi-domain global security threats, and anticipate emerging threats.
Our cyber professionals are on the cutting edge of cyberspace operations, delivering cyberspace options and effects for our nation in an ever-changing threat environment. Our experts provide a full range of expertise and capabilities across the spectrum of cyberspace operations. We are an integral part of an important mission -- we go to work every day with the knowledge and pride that our accomplishments make a difference.
Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst in support of an exciting new effort supporting one of our clients that is responsible for unifying the direction of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.
This is a pipeline requisition intended to gather interest from candidates with this skill set for future opportunities. While there may not be an active opening at this time, we encourage you to apply so we can reach out when a matching role becomes available.
Minimum QualificationsBachelor’s Degree in Information Systems Management, Computer Science, or related discipline.
This role may involve a non-traditional work schedule. Candidates must demonstrate flexibility and be prepared to work off-shift hours, including evenings, weekends, and holidays, to support 24/7 operations.
Must possess an active TS/SCI/Polygraph for consideration
Preferred Requirements3 years of experience to include but not limited to:
- Coordinating network defense operations with DOD Component Commands/Services/Agencies/Field Activities or Intelligence Agencies or Law Enforcement, or U.S. Government organizations.
- Performing research and analysis of cybersecurity capabilities to satisfy data protection requirements.
- Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities including web content filters, and email security.
- Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports.
- Engaging with FCC or DIB on network protection.
The listed salary range for this role is intended as a good faith estimate based on the role's…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).