Independent Software

Cryptologic Computer Scientist, Level 3

Cybersecurity - Fort Meade, MD - Full Time

What You Will Do:

As a Cryptologic Computer Scientist / Cyber Threat Analyst, Level 3 at Independent Software, Inc., you will operate at the intersection of computer science, cyber threat analysis, and large-scale data analytics to support mission-critical national security operations.

This is a hybrid role requiring strong Python development, large data processing experience (Spark or similar), and deep understanding of network architectures and protocol analysis. You will work with complex datasets to identify threats, uncover hidden patterns, and support cyber mission operations including detection, attribution, and exploitation.

You will function as a technical problem solver and investigator, applying a discovery-focused mindset to explore data, develop analytic approaches, and generate actionable intelligence. This role is ideal for someone who enjoys digging into complex data, asking the right questions, and building solutions that directly impact mission outcomes.


Key Responsibilities:

  • Design, develop, and deploy analytical solutions to complex cyber and cryptologic challenges using Python and modern data processing frameworks
  • Analyze large-scale structured and unstructured datasets to identify anomalies, patterns, and indicators of compromise
  • Perform network and protocol analysis to understand system behavior, detect threats, and support cyber operation
  • Conduct cyber threat analysis including forensics, attack attribution, and adversary behavior identification
  • Apply computer science fundamentals (algorithms, data structures, modeling) to solve real-world cyber problems
  • Leverage big data technologies (e.g., Spark) to process and analyze high-volume datasets
  • Perform knowledge discovery across passive and active data sources to support mission requirements
  • Develop tools, scripts, and prototypes to automate analysis and improve mission efficiency
  • Collaborate with analysts, engineers, and mission partners to translate findings into actionable intelligence
  • Document methodologies, findings, and analytical approaches for both technical and non-technical stakeholders
Required Skills and Qualifications:
 
  • Experience working in a hybrid computer science and cyber threat analysis role supporting cyber or cryptologic missions
  • Strong proficiency in Python
  • Experience with large-scale data processing frameworks such as Spark or similar
  • Strong understanding of network architectures, protocols, and traffic analysis
  • Experience analyzing large datasets and extracting actionable insights
  • Experience with cyber threat analysis, digital forensics, or attack attribution
  • Ability to apply computer science principles (algorithms, data structures, modeling) to mission problems
  • Comfortable working with complex, high-volume data in fast-paced environments
  • Strong analytical and problem-solving skills with a discovery-focused, inquisitive mindset
  • Familiarity with customer-specific or mission-specific analytical tools is a plus
Education and Experience:
 
  • Doctoral Degree plus 4 years of relevant experience
  • Master’s Degree plus 6 years of relevant experience
  • Bachelor’s Degree plus 8 years of relevant experience
  • Associate Degree plus 10 years of relevant experience
Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field and include at least one programming course and a minimum of four upper-level mathematics courses (Calculus and above).

Relevant experience must be in one or more of the following areas:
  • Theoretical or applied computer science
  • Simulation or model development
  • Designing, developing, using, or evaluating mathematical models, methods, or techniques
  • Computational science, algorithm analysis, and algorithm design
  • Reverse engineering
  • Designing, developing, or integrating computer and information systems, including hardware and/or software
Clearance Requirement:
 
  • Must possess an active TS SCI with appropriate Polygraph to be considered for this role
Why Choose Independent Software:

At Independent Software, our people are the mission. We’ve built a company around collaboration, integrity, and innovation and we make sure our team has the tools and support to grow, succeed, and thrive.

When you join us, you will:
  • Support critical national security missions that matter
  • Be part of a close-knit, employee-first culture where your voice is heard
  • Expand your skills through ongoing training, mentorship, and career development
  • Enjoy competitive compensation, generous benefits, and work-life balance


Ready to take the next step in your career? Join us and be part of something bigger.

Apply today.

We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.

 

Apply: Cryptologic Computer Scientist, Level 3
* Required fields
First name*
Last name*
Email address*
Location *
Phone number*
Resume*

Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or paste resume

Paste your resume here or attach resume file

Cover Letter
Who referred you to this position? Enter their first and last name here.
What’s your citizenship / employment eligibility?*
What’s your highest level of education completed?*
College or University
LinkedInLinkedIn profile URL:
Desired salary
Earliest start date?
Do you possess an active and current TS/ SCI clearance?*
Do you possess an active and current Polygraph?*
If yes, what agency conducted the polygraph? Note: The Department of Defense (DoD) itself does not conduct polygraphs. Please list the specific agency within the IC that issued your polygraph.*
How many years of relevant experience do you have?*
Was your degree in one of the following fields?*
Did your degree include at least one programming course and four upper-level math courses (Calculus level or higher)?*
Which of the following technical areas do you have direct experience with? (Select all that apply)*
What programming languages are you proficient in? (Select all that apply)*
Which of the following types of work have you done in a professional or academic setting? (Select all that apply)*
Do you have experience working in high-performance computing (HPC) environments?*
Do you have experience in analyzing cryptographic vulnerabilities or designing secure solutions?*
Human Check*