Cyber Security Analyst- Cobra
Job Description
Position Overview
This opportunity resides with Warfare Systems (WS), a business group within HII’s Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within our nation’s intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Huntington Ingalls Industries (HII) Mission Technologies Warfare Systems partners with the DoD and defense innovation ecosystem to rapidly acquire and field critical and emerging technologies, particularly integrated communications, networking, and Systems-of-Systems (SoS) technologies, to enhance national security and warfighter capabilities. Through a multiagency contracting approach, the Collaborative Operations for Battlespace Resilient Architecture (COBRA) initiative focuses on advancing these technologies to achieve multi-domain battlespace integration and resilient command and control. This includes a broad range of services such as systems engineering, cybersecurity, operational integration, and data analytics, all aimed at modernizing communications and ensuring seamless information exchange for the DoD and its allies.
Key Responsibilities
- Supports full spectrum, multi-domain, Cyberspace Operations (CO) capability development including Offensive and Defensive Cyber Operations (OCO/DCO), Defense Industrial Base (DIB), and Department of Defense Industrial Network (DODIN).
- Monitors and analyzes security systems, log data, network traffic, and alerts generated by various security technologies in real-time, incorporating Zero Trust principles to validate access and identify security incidents.
- Escalates and explains validated security incidents to customers, ensuring alignment with Risk Management Framework (RMF) and Cyber Security Framework (CSF) standards.
- Writes detailed security incident reports that document threats, characteristics, and remediation activities.
- Researches emerging threats to ensure detection capabilities can identify and respond effectively, even within Cloud environments.
- Reviews security incidents and deliverables for compliance with established guidelines and RMF and CSF processes.
- May be involved in incident response and forensic analysis.
- Documents findings and provides feedback to enhance the performance of other analysts.
- Ensures adherence to service quality standards and articulates security issues to customers both verbally and in writing.
- Refers complex issues to experienced staff when necessary.
- Expands knowledge of vulnerabilities, attacks, and countermeasures with a focus on adapting strategies for Zero Trust architectures and Cloud ecosystems.
- Identifies opportunities for process improvement and tracks customer issues and requests to ensure timely resolution, collaborating with Cybersecurity Engineers and Cybersecurity Specialists.
Required Qualifications
- 5 years of relevant experience with a Bachelor’s in a related field; 3 years with a Master’s in a related field; or High School Diploma (or equivalent) with 9 years of relevant experience.
- Must possess an active TS/SCI clearance.
- Demonstrated ability to communicate complex concepts clearly and effectively.
- Capacity to manage competing priorities in a fast-paced environment.
- Proven track record of contributing to successful team outcomes.
Preferred Qualifications
- Knowledge of DoD acquisition and contracting processes.
- Working familiarity with federal compliance standards (e.g., DFARS, ITAR).
- PMP, CISSP, or other relevant certifications preferred.