Cryptologic Computer Scientist, Level 2

Fort Meade, MD
Full Time
Cybersecurity
Mid Level

What You Will Do:

As a Cryptologic Computer Scientist / Cyber Threat Analyst, Level 2 at Independent Software, Inc., you will operate as a hybrid computer scientist and cyber threat analyst, applying advanced technical and analytical skills to support mission-critical cyber operations.

This role requires strong proficiency in Python, large-scale data processing (e.g., Spark), and deep expertise in network architectures and protocol analysis. You will work with complex, high-volume datasets to identify threats, uncover hidden patterns, and generate actionable intelligence that enhances mission effectiveness.

You will support a range of cyber and cryptologic missions, including threat analysis, forensics, attack attribution, and cyber threat discovery, while leveraging a curiosity-driven, discovery-focused mindset to explore data and develop innovative analytical approaches.

This position is ideal for a candidate who thrives in data-intensive environments, enjoys solving complex problems, and can independently investigate and derive insights from large datasets.

Key Responsibilities:

• Design, develop, and deploy solutions to complex cyber and cryptologic challenges using a scientific and analytical approach
• Perform cyber threat analysis including forensics, attack attribution, and adversary behavior identification
• Analyze large-scale structured and unstructured datasets to identify anomalies, patterns, and indicators of compromise
• Perform network and protocol analysis to understand system behavior and support detection and mitigation of cyber threats
• Apply computer science principles (algorithms, data structures, modeling) to solve real-world cybersecurity problems
• Leverage Python and big data technologies (e.g., Spark) to process and analyze high-volume datasets
• Conduct knowledge discovery across passive and active data sources to support mission requirements
• Develop analytical tools, scripts, and prototypes to automate workflows and improve mission efficiency
• Collaborate with analysts, engineers, and mission partners to translate findings into actionable intelligence
• Utilize and adapt customer-specific analytical tools to support mission objectives
• Document methodologies, findings, and analytical approaches for both technical and non-technical audiences


Required Skills and Qualifications:

• Experience working as a hybrid computer scientist and cyber threat analyst supporting cyber or cryptologic missions
• Strong proficiency in Python (required)
• Experience with large-scale data processing frameworks such as Spark or similar
• Strong background in network architectures, protocols, and traffic analysis (required)
• Experience analyzing large datasets and extracting actionable insights
• Experience performing cyber threat analysis, digital forensics, or attack attribution
• Ability to apply computer science fundamentals (algorithms, data structures, modeling) to mission problems
• Familiarity with customer or mission-specific analytical tools
• Strong analytical and problem-solving skills with a curiosity-driven, discovery-focused mindset
• Ability to work independently and collaboratively in a fast-paced, mission-driven environment


Education and Experience:

Minimum Qualifications (One of the following):
• Master’s degree with 3 plus years of relevant experience
• Bachelor’s degree with 5 plus years of relevant experience
• Associate degree with 7 plus years of relevant experience

Acceptable Degree Fields:
• Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related technical field
Must include:
• At least one programming course
• At least four upper-level mathematics courses (Calculus and above)

Relevant experience must include one or more of the following:
• Theoretical or applied computer science
• Simulation or model development
• Designing, developing, or evaluating mathematical models and algorithms
• Computational science and algorithm design
• Reverse engineering
• Designing, developing, or integrating computer and information systems (hardware and/or software)

Clearance Requirement:
 
  • Must possess an active TS SCI with appropriate Polygraph to be considered for this role
Why Choose Independent Software:

At Independent Software, our people are the mission. We’ve built a company around collaboration, integrity, and innovation and we make sure our team has the tools and support to grow, succeed, and thrive.
When you join us, you will:
  • Support critical national security missions that matter
  • Be part of a close-knit, employee-first culture where your voice is heard
  • Expand your skills through ongoing training, mentorship, and career development
  • Enjoy competitive compensation, generous benefits, and work-life balance


Ready to take the next step in your career? Join us and be part of something bigger.

Apply today.

We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.


 

Share

Apply for this position

Required*
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

Human Check*