Logo
Northrop Grumman Corp. (JP)

Principal Cyber Sys Engineer – Cyber Patching Group Policy Object (24-432)

Northrop Grumman Corp. (JP), Huntsville, Alabama, United States, 35824


Requisition ID: R10176009

Category:

Information Technology

Location:

Colorado Springs, Colorado, United States of America | Huntsville, Alabama, United States of America

Clearance Type:

Secret

Telecommute:

No - Teleworking not available for this position

Shift:

Days (United States of America)

Travel Required:

Yes, 10% of the Time

Positions Available:

1

At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage, and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity, and bringing your whole self to work.

Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Group Policy Object (24-432) to join our team of qualified, diverse individuals. This position will be in Colorado Springs, CO, or Huntsville, AL.

Position Overview:

The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations.

This position fulfills a Cyber Engineering technical role in support of the C2BMC program. Develop and test patches to fix Software, Hardware, and Firmware vulnerabilities. Responsibilities include providing redlines to engineers and feedback to Cyber Leadership, documenting lessons learned, best security engineering practices, and industry standards.

Essential Functions:

Concentrate on vulnerability management, including analysis and remediation of

IAVMs , Cyber Tasking Orders ( CTOs ), Common Vulnerabilities and Exposures ( CVEs ),

Vendor Patches , and

STIG configurations .

Specific tasks include installing and configuring Linux from the OS to the application level.

Documentation and verification of all installation and configuration steps for the labs.

Develop test plans/procedures for software integration and unit tests.

Work with software developers and/or vendors to help diagnose and identify the root cause of problems found during system integration.

Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Agile Release Trains ( ARTs ).

Responsible for developing and implementing Cyber Releases in the National Team labs, C2BMC Test Facility, and Operations.

Tasks include Installing and unit testing Cyber Products.

Basic Qualifications:

An active Secret clearance is required to start.

Bachelor’s Degree in a STEM discipline preferred from an accredited university and 5 years of related experience, or a Master’s degree and 3 years of experience, or a PhD and 1 year of experience, or 9 years of related experience in lieu of a degree may be considered.

DoD 8140 certification at

IAT Level II or higher

is required to start.

User experience configuring and patching

Windows systems

with

Group Policy Objects

(GPO).

Hands-on experience with scripting, installing, and testing GPOs on Windows hosts across Active Directory domains.

Application experience writing and deploying

GPOs

with

Advanced Group Policy Management

(AGPM).

In-depth understanding of GPOs for effective access control management, ensuring compliance with organizational policies, and improving overall network security.

Technical troubleshooting of

COTS

software applications, data analytics of system vulnerabilities and mission impacts, and risk mitigation resulting in system authorization.

Hands-on experience with industry-standard Cybersecurity tools such as SCAP, NESSUS, and ACAS.

Preferred Qualifications:

Executing Agile tasks throughout a System Development Lifecycle.

Demonstrated experience analyzing and implementing

NIST SP 800-53

Security Controls of Risk Management Framework (RMF) implementation across multiple phases of the mission system.

What We Can Offer You:

Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company.

Additional Northrop Grumman Information:

Salary Range:

$107,300 - $169,000

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.

#J-18808-Ljbffr