Northrop Grumman Corp. (AU)
Principal Cyber Sys Engineer – Cyber Patching Group Policy Object (24-432)
Northrop Grumman Corp. (AU), Huntsville, Alabama, United States, 35824
Requisition ID: R10176009
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America | Huntsville, Alabama, United States of America
Clearance Type:
Secret
Telecommute:
No- Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work.
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Group Policy Object (24-432) to join our team of qualified, diverse individuals. This position will be in Colorado Springs, CO, or Huntsville, AL.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations.
This position fulfills a Cyber Engineering technical role in support of the C2BMC program. Responsibilities include developing and testing patches to fix Software, Hardware, and Firmware vulnerabilities, providing redlines to engineers, and feedback to Cyber Leadership. Daily tasks will also require documenting lessons learned and best security engineering practices.
Essential Functions:
Concentrate on vulnerability management, including analysis and remediation of IAVMs, Cyber Tasking Orders (CTOs), Common Vulnerabilities and Exposures (CVEs), Vendor Patches, and STIG configurations.
Specific tasks include installing and configuring Linux from the OS to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and/or vendors to help diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Agile Release Trains (ARTs).
Responsible for developing and implementing Cyber Releases in the National Team labs, C2BMC Test Facility, and Operations.
Tasks include installing and unit testing Cyber Products.
Basic Qualifications:
An active Secret clearance is required to start.
Bachelor’s Degree in a STEM discipline preferred from an accredited university and 5 years of related experience, or a Master’s degree and 3 years of experience, or a PhD and 1 year of experience, or 9 years of related experience in lieu of a degree may be considered.
DoD 8140 certification at IAT Level II or higher is required to start.
User experience configuring and patching Windows systems with Group Policy Objects (GPO).
Hands-on experience with scripting, installing, and testing GPOs on Windows hosts across Active Directory domains.
Technical troubleshooting of COTS software applications, data analytics of system vulnerabilities and mission impacts, and risk mitigation.
Hands-on experience with industry-standard Cybersecurity tools such as SCAP, NESSUS, and ACAS.
Preferred Qualifications:
Executing Agile tasks throughout a System Development Lifecycle.
Demonstrated experience analyzing and implementing NIST SP 800-53 Security Controls of Risk Management Framework (RMF).
What We Can Offer You:
Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company.
Additional Northrop Grumman Information:
Salary Range:
$107,300 - $169,000
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance.
#J-18808-Ljbffr
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America | Huntsville, Alabama, United States of America
Clearance Type:
Secret
Telecommute:
No- Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work.
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Group Policy Object (24-432) to join our team of qualified, diverse individuals. This position will be in Colorado Springs, CO, or Huntsville, AL.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations.
This position fulfills a Cyber Engineering technical role in support of the C2BMC program. Responsibilities include developing and testing patches to fix Software, Hardware, and Firmware vulnerabilities, providing redlines to engineers, and feedback to Cyber Leadership. Daily tasks will also require documenting lessons learned and best security engineering practices.
Essential Functions:
Concentrate on vulnerability management, including analysis and remediation of IAVMs, Cyber Tasking Orders (CTOs), Common Vulnerabilities and Exposures (CVEs), Vendor Patches, and STIG configurations.
Specific tasks include installing and configuring Linux from the OS to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and/or vendors to help diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Agile Release Trains (ARTs).
Responsible for developing and implementing Cyber Releases in the National Team labs, C2BMC Test Facility, and Operations.
Tasks include installing and unit testing Cyber Products.
Basic Qualifications:
An active Secret clearance is required to start.
Bachelor’s Degree in a STEM discipline preferred from an accredited university and 5 years of related experience, or a Master’s degree and 3 years of experience, or a PhD and 1 year of experience, or 9 years of related experience in lieu of a degree may be considered.
DoD 8140 certification at IAT Level II or higher is required to start.
User experience configuring and patching Windows systems with Group Policy Objects (GPO).
Hands-on experience with scripting, installing, and testing GPOs on Windows hosts across Active Directory domains.
Technical troubleshooting of COTS software applications, data analytics of system vulnerabilities and mission impacts, and risk mitigation.
Hands-on experience with industry-standard Cybersecurity tools such as SCAP, NESSUS, and ACAS.
Preferred Qualifications:
Executing Agile tasks throughout a System Development Lifecycle.
Demonstrated experience analyzing and implementing NIST SP 800-53 Security Controls of Risk Management Framework (RMF).
What We Can Offer You:
Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company.
Additional Northrop Grumman Information:
Salary Range:
$107,300 - $169,000
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance.
#J-18808-Ljbffr