Cyber Security Analyst; ACAS Data Analysis
Virginia Beach, Virginia, 23450, USA
Listed on 2026-01-09
-
IT/Tech
Cybersecurity
Search by Keyword (use Keyword for Remote Positions)
Select how often (in days) to receive an alert:
Cyber Security Analyst (ACAS Data Analysis) - 26280Requisition Number:26280
Required Travel: 0 - 10%
Employment Type:
Full Time/Salaried/Exempt
Anticipated Salary Range:$-$
Security Clearance:
Secret
Level of
Experience:
Senior
This opportunity resides with Global Security (GS). Mission Technologies’ Global Security (GS) group comprises live, virtual, constructive (LVC) solutions; fleet sustainment; nuclear and environmental; and Australia business.
As a trusted partner to our military customers, HII designs, develops and operates the largest LVC enterprise that prepares warfighters for cross-domain battle. With advanced technologies to enable mission readiness, HII understands that preparation requires full coordination—not readiness in piece-parts.
For more than 40 years, the U.S. Navy has entrusted HII to maintain and modernize the vast majority of its fleet. With a holistic approach to life-cycle maritime defense systems—from small watercraft to submarines, surface combatants and aircraft carriers—HII ensures a high state of readiness.
HII supports the Department of Energy’s national security mission through the management and operation of its sites, as well as the safe cleanup of legacy waste across the country. HII meets clients’ toughest nuclear and environmental challenges.
Meet HII’s Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense – the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5
ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that’s right for you. Apply today. We look forward to meeting you.
HII Mission Technologies is seeking a highly skilled Cyber Security Analyst IV to provide technical cybersecurity support to the Navy Enterprise Tactical Training Network (NETTN) with a focus on ACAS data analysis.
ImpactThis role has a direct impact on safeguarding Navy training systems by identifying vulnerabilities, strengthening defenses, and ensuring compliance with DoD cybersecurity standards. You will serve as a subject matter expert, advising government stakeholders and supporting mission readiness through proactive risk management.
- 100% onsite
- Flexibility required to work non‑standard hours and weeks exceeding 40 hours to meet mission and contractual requirements.
- Duties may be adjusted to meet evolving business and customer needs.
- Analyze ACAS data and conduct security testing/evaluation of servers, workstations, databases, and network devices; develop customized scanning configurations and Power Shell scripts to automate data collection, analysis, and reporting.
- Map identified findings (manual, automated, CVE‑based) to NIST SP 800‑53 controls, DoD policies, and technical standards; interpret and apply directives such as CTOs, FRAG/TASK/OPORDs, IAVMs, PKI guidance, and STIG requirements.
- Evaluate security toolsets to identify gaps and recommend improvements; serve as SME on vulnerabilities, exploitation methods, mitigation strategies, and operational impacts.
- Review A&A documentation for RMF compliance, perform risk analyses, and recommend mitigating controls; draft, update, and maintain cybersecurity policies, procedures, and technical guidance.
- Provide written and oral analysis of security architecture and vulnerability assessments; support creation, management, and tracking of POA&Ms, ensuring accurate reporting and compliance.
- Advise government stakeholders on cybersecurity and RMF; track and report compliance status in VRAM and other vulnerability platforms; conduct independent verification of configurations, STIG findings, and POA&M entries.
- Demonstrate ability to work independently with minimal oversight as well as…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).