Northrop Grumman Corp. (AU)
Principal Cyber Systems Engineer – Cyber Engineer (Patching Team) (24-199)
Northrop Grumman Corp. (AU), Colorado Springs, Colorado, United States, 80509
Requisition ID: R10162240
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America
Clearance Type:
Secret
Telecommute:
No - Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way.
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Engineer (Patching Team) (24-199) to join our team of qualified, diverse individuals in Colorado Springs, CO.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight.
Essential Functions:
Assist with patch management solution development using WSUS and/or Satell.
Focus on vulnerability management, including analysis and remediation of IAVMs, Cyber Tasking Orders (CTOs), Common Vulnerabilities and Exposures (CVEs), Vendor Patches, and STIG configurations.
Installing and configuring Linux and Windows from the OS up to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and/or vendors to help diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).
Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).
Provide redlines to engineers and feedback to Cyber Leadership.
Document lessons learned, best security engineering practices, and industry standards.
Experience developing, integrating, and troubleshooting WSUS and/or RHEL Satellite is required.
Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.
Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.
Proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.
Basic Qualifications:
An active Secret clearance is required to start.
5 years' experience with a Bachelor’s degree in STEM discipline or a related field; 3 years' experience with a Master’s degree in STEM discipline or a related field; or 9 years' experience in lieu of a degree.
Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).
Experience building WSUS/Satellite instances, integrating them into complex environments, and troubleshooting development efforts.
Experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS) and Endpoint Security (ENSL) local firewall policies and procedures.
Excellent technical document preparation skills and verbal communication are required.
Preferred Qualifications:
Active TS/SCI clearance is highly desired.
Network design and software engineering backgrounds are a plus.
Familiarity with scripting Windows Group Policy Objects (GPOs) is desired.
Experience with Ansible is highly desirable.
What We Can Offer You:
Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company. Your benefits will include the following:
Health Plan
Savings Plan
Paid Time Off
Education Assistance
Training and Development
Flexible Work Arrangements
Salary Range:
$107,300 - $160,900
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
#J-18808-Ljbffr
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America
Clearance Type:
Secret
Telecommute:
No - Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way.
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Engineer (Patching Team) (24-199) to join our team of qualified, diverse individuals in Colorado Springs, CO.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight.
Essential Functions:
Assist with patch management solution development using WSUS and/or Satell.
Focus on vulnerability management, including analysis and remediation of IAVMs, Cyber Tasking Orders (CTOs), Common Vulnerabilities and Exposures (CVEs), Vendor Patches, and STIG configurations.
Installing and configuring Linux and Windows from the OS up to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and/or vendors to help diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).
Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).
Provide redlines to engineers and feedback to Cyber Leadership.
Document lessons learned, best security engineering practices, and industry standards.
Experience developing, integrating, and troubleshooting WSUS and/or RHEL Satellite is required.
Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.
Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.
Proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.
Basic Qualifications:
An active Secret clearance is required to start.
5 years' experience with a Bachelor’s degree in STEM discipline or a related field; 3 years' experience with a Master’s degree in STEM discipline or a related field; or 9 years' experience in lieu of a degree.
Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).
Experience building WSUS/Satellite instances, integrating them into complex environments, and troubleshooting development efforts.
Experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS) and Endpoint Security (ENSL) local firewall policies and procedures.
Excellent technical document preparation skills and verbal communication are required.
Preferred Qualifications:
Active TS/SCI clearance is highly desired.
Network design and software engineering backgrounds are a plus.
Familiarity with scripting Windows Group Policy Objects (GPOs) is desired.
Experience with Ansible is highly desirable.
What We Can Offer You:
Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company. Your benefits will include the following:
Health Plan
Savings Plan
Paid Time Off
Education Assistance
Training and Development
Flexible Work Arrangements
Salary Range:
$107,300 - $160,900
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
#J-18808-Ljbffr