Cybersecurity Analyst (Intrusion Analyst)

Annapolis Junction, MD, US

Applications have closed

Applied Network Solutions, Inc.

View company page


Who we are:

At Applied Network Solutions (ANS), we bring together some of the most curious minds in networking and cybersecurity. ANS was founded to disrupt the status quo. For over 20 years, our team provides expertise in network, system engineering and both offensive and defensive cybersecurity operations.

What we do:

Our vision is for a future in which talent and customers alike come to ANS because of our reputation for delivering technical excellence, solving our nation’s toughest challenges and our ability to exceed expectations.

Why ANS:

At ANS we value the integrity of your work. We are looking for the right person to plan, analyze, design, develop, test, secure, integrate, implement, operate, and maintain the custom solutions that ANS delivers. Together, let’s ensure today is safe and tomorrow is smarter.

As an Intrusion Analyst on our team, you will: be trusted to analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources


  • Active TS/SCI clearance and Polygraph required
  • Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master’s degree or eight (8) years of relevant experience and a Bachelor’s degree or ten (10) years of relevant experience and an Associate’s degree required
  • One or more of the following certifications required: CISSP, CEH, Sec+, Net+, GIAC GREM, CREA
  • Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university
  • Relevant experience must be in malware analysis
  • Programming experience in C, C#, C++, Java, Perl, or Python is preferred

Responsibilities include, but are not limited to:

  • Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
  • Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained form metadata analysis
  • Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures
  • Develop and implement mitigation strategies
  • Have a network and/or host-based focus



ANS offers excellent compensation along with a generous benefits package to include:

  • Family Medical, Dental (w/ adult orthodontia) and Vision coverage
  • Pet Discount Program
  • PTO (Paid Time Off)
  • Maternity/ Paternity Leave
  • Supplemental Military Leave Pay
  • 11 Paid Holidays
  • 401(k) plan with 6% Company Contribution
  • Generous Professional Development Program
  • 100% Employer paid Short- and Long-Term Disability
  • 100% Employer paid Life Insurance
  • Supplemental Whole Life Insurance
  • Lucrative Referral Bonus Program
  • Annual Allowance for ANS Swag
  • Potential for Paid Overtime
  • Flexible Work Schedules

Applied Network Solutions, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age or protected veteran status and will not be discriminated against on the basis of disability.

*Disclaimer: Salary is an open band for Indeed purposes and may not accurately represent the salary band for this position*

Job stats:  2  0  0
Category: Analyst Jobs

Tags: C CEH CISSP Clearance Computer Science GIAC GREM Java Malware Perl Polygraph Python SIGINT TS/SCI

Perks/benefits: Flex vacation Health care Insurance Medical leave Parental leave Salary bonus

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.