Northrop Grumman Corp. (AU)
Principal Cyber Systems Engineer – Cyber Patching Technical Lead (24-230)
Northrop Grumman Corp. (AU), Colorado Springs, Colorado, United States, 80509
Requisition ID: R10165058
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America
Clearance Type:
Secret
Telecommute:
No - Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Technical Lead (24-230) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats in all phases of flight.
Essential Functions:
Installation and configuration of Linux and Windows from the OS up to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and vendors to diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).
Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).
Providing redlines to engineers and feedback to Cyber Leadership.
Document lessons learned and the best security engineering practices and industry standards.
Excellent technical document preparation skills and verbal communication are required to present technical information assurance issues to senior government and military officials.
Basic Qualifications:
An active Secret clearance is required to start.
5 years experience with a Bachelor’s degree in a STEM discipline or related field; 3 years experience with a Master’s degree in a STEM discipline or related field, or 9 years experience in lieu of a degree.
Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).
Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.
Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.
Experience developing, integrating, and troubleshooting WSUS and RHEL Satellite is required.
Experience building WSUS/Satellite instances and a deep understanding of how WSUS/Satellite can improve patch management in an air-gapped network.
Proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.
Experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS).
Preferred Qualifications:
Familiarity with scripting Windows Group Policy Objects (GPOs).
Experience with Ansible is highly desirable.
Network design and software engineering backgrounds are a plus.
Salary Range:
$107,300 - $160,900
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance.
#J-18808-Ljbffr
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America
Clearance Type:
Secret
Telecommute:
No - Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Technical Lead (24-230) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO.
Position Overview:
The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats in all phases of flight.
Essential Functions:
Installation and configuration of Linux and Windows from the OS up to the application level.
Documentation and verification of all installation and configuration steps for the labs.
Develop test plans/procedures for software integration and unit tests.
Work with software developers and vendors to diagnose and identify the root cause of problems found during system integration.
Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).
Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).
Providing redlines to engineers and feedback to Cyber Leadership.
Document lessons learned and the best security engineering practices and industry standards.
Excellent technical document preparation skills and verbal communication are required to present technical information assurance issues to senior government and military officials.
Basic Qualifications:
An active Secret clearance is required to start.
5 years experience with a Bachelor’s degree in a STEM discipline or related field; 3 years experience with a Master’s degree in a STEM discipline or related field, or 9 years experience in lieu of a degree.
Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).
Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.
Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.
Experience developing, integrating, and troubleshooting WSUS and RHEL Satellite is required.
Experience building WSUS/Satellite instances and a deep understanding of how WSUS/Satellite can improve patch management in an air-gapped network.
Proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.
Experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS).
Preferred Qualifications:
Familiarity with scripting Windows Group Policy Objects (GPOs).
Experience with Ansible is highly desirable.
Network design and software engineering backgrounds are a plus.
Salary Range:
$107,300 - $160,900
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance.
#J-18808-Ljbffr