Loading...
Loading...
Civilian Career Paths & Job Guide
Everything you need to translate your 35Q experience into a civilian career — salary data, companies hiring, resume examples, and certifications by career path.
Army 35Qs sit at the intersection of signals intelligence collection and cyberspace operations. The MOS exists because modern adversaries do not separate radio frequency and IP traffic the way the older 35-series job tree did, so the Army built one role to handle target development, network analysis, cyber threat reporting, and integrated SIGINT/cyber collection inside the same workflow. If you are reading this, you already know that "cyberspace intelligence collector/analyst" is shorthand for a deep stack of TTPs, tooling, and reporting workflows you cannot fully describe on a resume.
The pipeline is long and selective. You started with 10 weeks of Basic Combat Training, then moved to the U.S. Army Intelligence Center of Excellence at Goodfellow AFB in San Angelo, Texas for roughly 30+ weeks of initial training, followed by additional cyber-focused instruction depending on follow-on assignment. Expect to come out the other end with TS/SCI eligibility, an active polygraph in many cases, hands-on experience with cryptologic SIGINT systems, and exposure to cyberspace operations alongside NSA elements, Cyber Mission Force teams, and joint cryptologic activities.
Day to day, 35Qs do the unglamorous parts of cyber intelligence: target development on adversary networks, traffic analysis, malware and TTP reporting, fusion of SIGINT with all-source intel, and supporting offensive and defensive cyber operations. That work translates directly into the cleared private sector and into federal civilian positions at 35N SIGINT analyst and 17C Cyber Operations Specialist destinations, but the 35Q angle skews more toward NSA, US Cyber Command, and DoD cyber contractors than the broader analyst tracks. The challenge is reframing 35Q-specific tooling and tradecraft into civilian language that does not leak classified specifics. The military-to-civilian career crosswalk is a fast way to scope salary ranges and federal series before you sit down to write anything.
For deeper context on how the broader 35-series translates, the military intelligence 35-series civilian careers guide covers the cross-MOS overlap with NSA, DIA, and the cleared contractor space.
BMR has built more than 55,000 resumes across every MOS, and 35Qs sit at one of the most undersupplied corners of the cleared cyber market. The combination of credentialed SIGINT collection, cyberspace intelligence training, and active TS/SCI is exactly the package NSA, US Cyber Command, and DoD cyber contractors compete for. The challenge is reframing 35Q-specific tooling and tradecraft into civilian language without leaking what cannot be discussed. — Brad Tachi, Navy Diver veteran & BMR founder
Civilian demand for cleared cyber intelligence backgrounds is structural, not cyclical. The cleared talent pool stays small because clearances take 12-18 months to adjudicate from a cold start, and employers who already have cleared contracts cannot wait that long. A separating 35Q with active TS/SCI and a polygraph walks into that market with leverage most civilian candidates never have.
BLS OEWS May 2024 reports a median wage of $124,910 for Information Security Analysts (15-1212.00), with the top 10% above $182,000. Demand is projected to grow 33% through 2033 (BLS Employment Projections), one of the fastest growth rates BLS tracks. 35Qs land in this category at threat intelligence analyst, SOC analyst, and detection engineering roles. Companies running cleared SOCs (NSA contracts, DoD cyber contracts, intelligence community support) actively recruit for SIGINT-trained analysts because the analytical workflow is the same as commercial threat hunting, just with different sensors.
Threat intel as a discipline is the closest civilian analog to cyberspace SIGINT collection. Mandiant (now part of Google Cloud), CrowdStrike, Recorded Future, and the threat intel arms of large MSSPs all hire 35Qs into roles that map their SIGINT target development experience to adversary tracking and attribution. BLS rolls these into the Information Security Analyst category, but compensation skews higher when clearance and IC experience are required (commonly $140K-$180K base for cleared CTI roles).
Penetration Testers fall under the same BLS occupation (15-1212.00) but represent a different pivot. Some 35Qs cross over into red team work, especially those who came out of the cyberspace operations side of the house. Cleared red team contracts at Booz Allen, Leidos, and Mandiant frequently require TS/SCI plus offensive cyber experience.
BLS reports a median of $129,840 for Computer Network Architects (15-1241.00). 35Qs with strong network analysis backgrounds shift into network design and architecture, particularly for cleared environments where SCIF-grade network design is a specialized discipline.
BLS does not break out "intelligence analyst" separately, so the data sits under Miscellaneous Social Scientists (19-3099) or Management Analysts (13-1111) depending on the role. For all-source intel analyst roles in the IC and contractor space, the salary band is $90K-$140K depending on clearance and specialty. 35Qs who want the cyber sensor work to recede in favor of broader analytical roles often pivot into all-source intel — see the 35F Intelligence Analyst transition page for adjacent paths.
Your closest counterparts in other services include Navy CTNs, Air Force 1B4X1 Cyber Warfare Operations, and Marine 0651 Cyber Network Operators. They compete for the same civilian roles, so understanding what they bring to the market helps you position yourself.
Geography matters more than most veterans expect. The cleared cyber market concentrates around Fort Meade/Annapolis Junction, Northern Virginia, San Antonio, Hawaii, Augusta GA (Fort Eisenhower), and Colorado Springs. Remote-eligible cleared work exists but is limited because the work is performed inside SCIFs. If you are open to relocating to a corridor with cleared facilities, the salary numbers above are realistic. If you are tied to a non-cleared geography, expect to take a pay cut to enter a commercial cyber role and then rebuild compensation through certifications. The military-to-civilian salary guide walks through how clearance and location modify base compensation in 2026.
When you are ready to put the resume together, the military resume builder handles the SIGINT-to-civilian translation. For high-intent next steps, build your resume now.
| Civilian Job Title | Industry | BLS Median Salary | Outlook | Match |
|---|---|---|---|---|
Cyber Threat Intelligence Analyst O*NET: 15-1212.00 | Cleared Cybersecurity | $140,000 | 33% (Much faster than average) | strong |
Information Security Analyst O*NET: 15-1212.00 | Cybersecurity | $124,910 | 33% (Much faster than average) | strong |
SOC Analyst (Cleared) O*NET: 15-1212.00 | Cleared Cybersecurity | $110,000 | 33% (Much faster than average) | strong |
Penetration Tester / Red Team Operator O*NET: 15-1212.00 | Cybersecurity | $132,000 | 33% (Much faster than average) | moderate |
Computer Network Architect O*NET: 15-1241.00 | IT Infrastructure | $129,840 | 13% (Faster than average) | moderate |
Intelligence Analyst (All-Source) O*NET: 13-1199.00 | Defense / Intelligence | $115,000 | Steady (BLS does not publish this category separately) | strong |
Detection Engineer O*NET: 15-1299.00 | Cybersecurity | $135,000 | 33% (Much faster than average) | strong |
Cybersecurity Engineer O*NET: 15-1212.00 | Cybersecurity | $133,000 | 33% (Much faster than average) | moderate |
Federal civilian work is where many 35Qs land first because the security clearance carries forward without re-adjudication, the work is genuinely similar to active duty, and Veterans' Preference plus the 30% or more disabled hiring authority make the GS pipeline faster than commercial pivots for some applicants. The federal cyber and intelligence ecosystem is built around the same mission you supported in uniform, just under a different chain.
The 0132 series is the primary federal home for SIGINT and cyber-intel-trained veterans. NSA, DIA, Army G-2, INSCOM, and the broader IC hire 0132s at GS-9 through GS-13 entry points. With 35Q AIT plus operational experience, GS-9 is realistic out of the gate, GS-11 if you served as a senior collector or analyst with documented production. The 0132 qualification standard accepts specialized experience at the next-lower grade, so a 35Q E-5 with 4+ years of analytical work generally qualifies for GS-9.
The 2210 series is the IT management family that covers cybersecurity work outside of a pure intelligence role. Most cyber-focused 2210 positions sit in INFOSEC, Network Services, or Systems Analysis parentheticals (e.g., 2210/INFOSEC). Grade levels run GS-7 through GS-15. CompTIA Security+ or higher is normally required for cyber-coded 2210 positions under DoD 8140 — see the DoD 8140 certification guide for what each work role actually requires.
The 1550 series exists for positions that require formal computer science training (typically a bachelor's in CS or equivalent coursework). 35Qs with a CS degree from in-service education or post-service GI Bill use can qualify here. NSA, NIWC, and DARPA-adjacent labs hire 1550s for research-grade work that goes deeper than 2210 IT operational roles.
The 0855 series fits 35Qs whose follow-on assignments included signals collection systems engineering, RF/SIGINT platform development, or cryptologic hardware work. NSA Engineering Directorate and INSCOM technical positions sit here. Requires an engineering degree or qualifying coursework (10 hours of calculus + foundational engineering classes per OPM standards).
For 35Qs who developed strong analytical methodology — quantitative reporting, modeling adversary behavior, statistical analysis of collected traffic — the 1515 series is a high-paying fit. NSA's research arm and Army Research Lab hire 1515s into modeling and analysis roles with grade ladders that hit GS-15 quickly.
The 0301 series catches the program management and operations roles that don't fit neatly into 0132 or 2210 — cyber program managers, intelligence program officers, mission management positions. Grade levels GS-9 through GS-15, with veterans' preference applying.
For 35Qs interested in industrial security, SCIF management, or security operations rather than collection, the 0080 series at DCSA, DoD components, and federal contractors is a clean fit. SCIF management experience documented from operational tours qualifies for GS-9 to GS-12.
5-point preference applies to honorable discharge with qualifying service. 10-point preference applies to disabled veterans (any rating) and Purple Heart recipients. The 30% or More Disabled Veteran hiring authority allows agencies to hire you non-competitively up to GS-11. Schedule A and the VRA appointment authority are additional pathways most 35Qs don't know exist. USAJobs filters for veterans-only postings let you skip the broad public competition entirely.
Federal resume formatting is its own skill. The federal resume builder handles GS-coded specialized experience formatting and KSA mapping. When you are ready to start the federal application, you can get started here.
| GS Series | Federal Job Title | Typical Grades | Match | Explore |
|---|---|---|---|---|
| GS-2210 | Information Technology Management | GS-9, GS-11, GS-12, GS-13 | View Details → | |
| GS-0132 | Intelligence | GS-11, GS-12, GS-13 | View Details → | |
| GS-1515 | Operations Research | GS-11, GS-12, GS-13, GS-14 | View Details → | |
| GS-1550 | Computer Science | GS-9, GS-11, GS-12, GS-13 | View Details → | |
| GS-0855 | Electronics Engineering | GS-9, GS-11, GS-12 | View Details → | |
| GS-0301 | Miscellaneous Administration and Program | GS-11, GS-12, GS-13 | View Details → | |
| GS-0080 | Security Administration | GS-9, GS-11, GS-12 | View Details → |
Not everyone wants to stay in a related field. These career paths leverage your transferable skills — leadership, risk management, logistics, project planning — in completely different industries.
SIGINT analysis develops the same statistical and pattern-recognition muscles commercial data analysts use daily. Less classification overhead, broader employer base.
35Qs who built collection scripts and analytics tooling in service have a head start on security-focused dev work.
Cloud-hosted IC environments mean many 35Qs already have working knowledge of AWS GovCloud, Azure Government, and similar architectures.
Briefing senior commanders on adversary cyber threats translates to briefing CISOs and CIOs on enterprise risk.
Senior 35Qs (E-7+) routinely managed multi-team operations, mission planning, and personnel readiness — direct overlap with civilian security management.
Some separating 35Qs leverage their network and industry knowledge to recruit other cleared cyber professionals. Reasonable salary plus commission.
Strong analytical methodology and familiarity with quantitative frameworks make 35Qs a clean fit for operations research roles, especially in defense analytics.
If you are staying in the cleared cyber and SIGINT world, your terminology translates directly. NSA hiring managers know what cryptologic SIGINT collection means. Booz Allen recruiters working DoD cyber contracts know what target development is. This section is for 35Qs targeting commercial cybersecurity, threat intelligence, or analytical roles outside the IC, where SIGINT and cyber-collection vocabulary does not register.
Before (military): "Performed cryptologic SIGINT collection and target development on priority adversary networks, producing 200+ intelligence reports supporting NSA and US Cyber Command operations."
After (commercial cyber threat intel): "Conducted advanced network traffic analysis and adversary profiling against priority threat actors, producing 200+ structured intelligence reports informing operational decisions for senior stakeholders. Methodology aligned with MITRE ATT&CK and Diamond Model frameworks."
Before (military): "Led 6-person SIGINT collection team conducting 24/7 cyberspace operations support across 3 mission sets, producing 40+ time-sensitive reports per month."
After (SOC / detection engineering): "Led 6-analyst team running 24/7 detection and response operations across 3 simultaneous mission lines. Produced 40+ time-sensitive incident reports per month, with average alert-to-report time under 90 minutes."
Before (military): "Fused SIGINT with all-source intelligence to develop adversary TTPs, briefing daily intelligence summary to O-6 commander and supporting joint operations planning."
After (commercial threat intel): "Synthesized multi-source intelligence to map adversary tactics, techniques, and procedures. Briefed daily threat assessment to senior leadership, informing strategic security decisions and incident response planning."
For broader military-to-civilian translation patterns, the 50 military terms civilian equivalents glossary covers terminology beyond the SIGINT/cyber lane. The military resume builder uses these translation patterns automatically when you select a target civilian role. Ready to start? Build your resume now.
Which certifications you need depends on where you're headed. Find your target career path below.
If your plan is NSA, US Cyber Command civilian, or cleared contractor cyber work, your runway is short and the demand is real. Focus on three things: (1) keep your clearance and polygraph current through the transition, (2) document specialized experience in language that maps to GS qualification standards or contract labor categories, (3) work the personal network you built during your service tours.
Some 35Qs leave the IC entirely after their commitment ends. Burnout from shift work, distance from family, or a desire to operate without classification handling drives the move. Commercial cybersecurity, data analytics, and software engineering are the realistic adjacent paths.
Translate your 35Q Cryptologic Cyberspace Intelligence Collector/Analyst experience into a resume that gets interviews.
Build Your Resume →