Independent Software

Functional Analyst, Level 2 (FORECASTED)

Functional Analysis - Fort Meade, MD - Full Time

What You Will Do

Independent Software is seeking a Functional Analyst to support Cybersecurity compliance and functional testing activities. In this role, you will assess customer and mission requirements, ensure appropriate information security controls are in place, and support system testing and integration planning. You will collaborate with security assessors, engineers, and mission stakeholders to support the development and management of secure systems.

Join a team committed to protecting mission-critical systems and supporting national security. At Independent Software, we value innovation, integrity, and collaboration—providing a supportive environment where your expertise makes a meaningful impact.

Key Responsibilities:
  • Perform functional analysis to identify key Cybersecurity tasks and their interrelationships
  • Analyze mission requirements to determine functional testing needs
  • Collaborate with Delegated Authorizing Officials (DAOs), ISSOs, and System Owners to support the creation and registration of System Security Plans (SSPs)
  • Maintain and update Cybersecurity documentation and security posture
  • Work with Security Control Assessors (SCAs) to define and execute system testing requirements
  • Ensure adherence to applicable Information System Security policies, standards, and procedures
  • Assist in the integration of security planning into system development processes

Required Skills and Qualifications:
  • Familiarity with functional analysis and task decomposition
  • Knowledge of Cybersecurity testing and security documentation processes
  • Understanding of Risk Management Framework (RMF) principles
  • Ability to collaborate across security, engineering, and customer teams
  • Strong analytical and organizational skills
  • Proficiency with identifying functional system requirements based on mission needs
Education and Experience:
  • A Minimum of two (2) years of relevant experience
  • Bachelor’s degree in Computer Science, IT Engineering, or a related technical field
  • In lieu of a degree, four (4) additional years of Functional Analyst experience (total of 6 years) may be substituted
  • At least one (1) year of experience applying Risk Management Framework (RMF) principles
Certifications:  
  • Candidate must meet IAM Level I or II certification requirements
Clearance Requirement:
  • Must possess an active TS/SCI with appropriate Polygraph to be considered for this role

**This position is contingent on contract award**

We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.

 
Apply: Functional Analyst, Level 2 (FORECASTED)
* Required fields
First name*
Last name*
Email address*
Location *
Phone number*
Resume*

Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or paste resume

Paste your resume here or attach resume file

Cover Letter
Who referred you to this position? Enter their first and last name here.
What’s your citizenship / employment eligibility?*
What’s your highest level of education completed?*
College or University
LinkedInLinkedIn profile URL:
Desired salary
Earliest start date?
Do you possess an active and current TS/ SCI clearance?*
Do you possess an active and current Polygraph?*
If yes, what agency conducted the polygraph?*
How many years of relevant experience do you have?*
Are you familiar with the Risk Management Framework (RMF)?*
Do you have at least 1 year of experience applying RMF principles in a cybersecurity or compliance setting?*
Which of the following areas have you worked with? (Select all that apply)*
Do you currently meet DoD 8570 IAM Level I or II certification requirements (e.g., CAP, Security+ CE, GSLC, CASP+ CE)?*
If you answered yes, please list any valid certifications you currently hold.*
Have you collaborated with System Security Control Assessors (SCAs) or security teams to support system testing or authorization?*
Are you familiar with the process of identifying and documenting System Security Plans (SSPs)?*
Human Check*