Logo
Northrop Grumman Corp. (AU)

Cyber Systems Engineer – Cyber Engineer (Patching Team) (24-219) (BLSk)

Northrop Grumman Corp. (AU), Colorado Springs, Colorado, United States, 80509


Requisition ID: R10164372

Category:

Information Technology

Location:

Colorado Springs, Colorado, United States of America

Clearance Type:

Secret

Telecommute:

No - Teleworking not available for this position

Shift:

Days (United States of America)

Travel Required:

Yes, 10% of the Time

Positions Available:

1

At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage, and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity, and bringing your whole self to work.

Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Cyber Systems Engineer – Cyber Engineer (Patching Team) (24-219) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO.

Position Overview:

The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that optimizes response to threats of all ranges.

This position fulfills a technical role in Cyber Engineering, supporting the development of a patch management solution using WSUS and satellite.

Essential Functions:

Develop and test patches to fix Software, Hardware, and Firmware vulnerabilities.

Concentrate on vulnerability management, including analysis and remediation of IAVMs, Cyber Tasking Orders (CTOs), Common Vulnerabilities and Exposures (CVEs), Vendor Patches, and STIG configurations.

Documentation and verification of all installation and configuration steps for the labs.

Develop test plans/procedures for software integration and unit tests.

Work with software developers and vendors as needed to help diagnose and identify the root cause of problems found during system integration.

Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).

This position's responsibilities include providing redlines to engineers and feedback to Cyber Leadership.

Documenting lessons learned, best security engineering practices, and industry standards will also be required in daily tasks.

Familiarity with scripting Windows Group Policy Objects (GPOs).

Excellent technical document preparation skills and verbal communication are required to present technical information assurance issues and reports to senior government and military officials.

Basic Qualifications:

An active Secret clearance is required to start.

2 years with a Bachelor’s degree in a related field; 6 years experience in lieu of a degree.

Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).

Must have the ability to handle specific tasks, which may include but are not limited to installing and configuring Linux and Windows from the OS up to the application level.

Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).

Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.

Must have a working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.

Current experience developing, integrating, and troubleshooting WSUS and RHEL satellites is required.

Will possess experience building WSUS/Satellite instances, integrating them into complex environments, troubleshooting development efforts, and a deep understanding of how WSUS/Satellite can improve patch management in an air-gapped network.

Must have proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.

Requires experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS) and Endpoint Security (ENSL) local firewall policies and procedures within a Mission eccentric environment.

Preferred Qualifications:

Experience with Ansible is highly desirable.

Network design and software engineering backgrounds are a plus.

What We Can Offer You:

Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company.

Salary Range:

$87,200 - $130,800

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.

#J-18808-Ljbffr