Cyber Operations Planner
Fort Meade, Maryland
Job Id:
162012
Job Category:
Job Location:
Fort Meade, Maryland
Security Clearance:
TS/SCI
Business Unit:
Zachary Piper
Division:
Zachary Piper Solutions
Position Owner:
Cameron Bagwell
*Active TS/SCI clearance needed for consideration, as well as willingness to sit for a CI Polygraph*
Zachary Piper Solutions is currently seeking a Cyber Operations Planner to support a Department of Defense Cyberspace Command (DCDC) program based in Fort Meade, MD. This position is a full‑time, onsite role. This position is critical in enabling defensive cyberspace operations across DoD networks, ensuring that planning, coordination, and operational design align with enterprise mission requirements. As a Cyber Operations Planner, you will play a pivotal role in DODIN Operations and Defensive Cyberspace Operations–Internal Defensive Measures (DCO‑IDM), directly influencing high‑impact defensive cyberspace missions.
Key Responsibilities:
- Conduct and support Future Operations (FUOPS) planning and execution for defensive cyberspace operations in support of DCDC mission areas.
- Understand product linkages and dependencies within the Joint Strategic Planning System (JSPS).
- Apply operational art and design principles for the development of defensive cyberspace planning efforts.
- Integrate Joint Intelligence Preparation of the Operational Environment (JIPOE) inputs for cyberspace planning.
- Lead and support deliberate planning using the Joint Planning Process (JPP).
- Support Crisis Action Planning (CAP) under JPP.
- Lead diverse stakeholder teams across the defensive cyberspace community to deliver plans aligned with Commander’s priorities and mission intent.
- Coordinate with staff directorates to develop Staff Estimates and implement planning efforts.
- Lead or support Operational Planning Teams (OPTs) and Working Groups to meet Commander’s objectives and End State.
- Participate in and support B2C2WG events.
- Develop and deliver briefings to Senior Executive Service (SES) and General/Flag Officer (GO/FO) leadership.
- Author and staff CONOPS, as well as Level 1–4 plans including Commander’s Estimates, BPLANS, CONPLANS, and OPLANS.
- Research, develop, and write issue papers and white papers on defensive cyberspace topics.
- Develop and synchronize mission type orders (MTOs) supporting defensive cyberspace campaigns and operations.
- Develop assessment indicators and methodologies to measure defensive cyberspace operations effectiveness.
- Ensure synchronization across subordinate echelons in execution of deliberate planning.
- Coordinate and de-conflict inputs with service cyber components, combatant commands, agencies, field activities, and subordinate headquarters.
- Support contingency campaign planning for anticipated operations.
Requirements:
- Bachelor’s degree in a related discipline with 8–10 years of combined education and experience (experience may substitute for degree).
- Active DoD TS/SCI clearance, eligible for CI Polygraph.
- Joint Professional Military Education Level I (JPME I).
- Demonstrated experience integrating diverse stakeholder inputs into detailed operational plans.
- Working knowledge of:
- JP 3‑12 Cyberspace Operations
- JP 3‑0 Operations
- JP 5‑0 Joint Planning
- Demonstrated experience briefing SES and GO/FO leadership.
Preferred Qualifications:
- Experience with DISA and DoD Networks.
- Completion of military cyber planning courses (ACOPC, JCOPC, JACWC, etc.).
- Non‑DoD cyber certifications such as Net+, SEC+, CISM, CISSP, etc.
- Understanding of Directive Authority for Cyberspace Operations (DACO).
Compensation Includes:
- Salary Range: $150,000 - $175,000 (depending on experience)
- Full Benefits: Medical, Dental, Vision, 401(k), PTO, and Sick Leave as required by law
This job posting opens on 3/13/2026 and will remain open for at least 30 days from the posting date
#LI-CB1
#LI-ONSITE
Keywords: packet capture, cyber analyst, soc analyst, cyber engineer, top secret, TS/SCI, IDS, DoD networks, windows, Security+, active directory, CompTIA, troubleshooting, monitoring, end user support, red hat, linux, shell, scripting, CLI, VMware, ansible, top secret, intelligence community, intel, TS/SCI, information technology, infrastructure, systems engineer, administrator, windows, active directory, client, LDAP, CI Poly, counterintelligence, Fidelis, Security+ CE, CCNA-Security, GSEC, SSCP, CySA+, GICSP, CND, Windows, UNIX, Linux, Host-based Security System, Endpoint Security Suite (ESS), Splunk, Cribl, network security tools, intrusion detection systems, IDS, snort, suricata, corelight, intrustion prevention systems, IPS, Cybersecurity, Incident Response, Splunk, SPL, Packet Capture, Wireshark, Network Forensics, Threat Hunting, Intrusion Detection, Log Analysis, SIEM, Malware Analysis, Network Traffic Analysis, Forensic Analysis, Threat Intelligence, SOC, Vulnerability Assessment, IDS/IPS, PCAP Analysis, Network Security, Anomaly Detection, EDR, Cyber Threats, Threat Mitigation, Digital Forensics, APT, Insider Threat, Security Policies, Compliance, Security Architecture, NSM, Security Risk Assessment, TIP, Security Analytics