Logo
Northrop Grumman Corp. (AU)

Principal Cyber Systems Engineer – Cyber Patching Technical Lead (24-230)

Northrop Grumman Corp. (AU), Colorado Springs, Colorado, United States, 80509


Requisition ID: R10165058

Category:

Information Technology

Location:

Colorado Springs, Colorado, United States of America

Clearance Type:

Secret

Telecommute:

No - Teleworking not available for this position

Shift:

Days (United States of America)

Travel Required:

Yes, 10% of the Time

Positions Available:

1

Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Engineer – Cyber Patching Technical Lead (24-230) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO.

Position Overview:

The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats in all phases of flight.

Essential Functions:

Installation and configuration of Linux and Windows from the OS up to the application level.

Documentation and verification of all installation and configuration steps for the labs.

Develop test plans/procedures for software integration and unit tests.

Work with software developers and vendors to diagnose and identify the root cause of problems found during system integration.

Submit problem reports for errors found per Agile processes and coordinate daily integration activities with other Cross-Functional Product Teams (CFPTs).

Installing and unit testing Cyber Products (e.g., ESS, ACAS, BigFix, Endgame, KMS, etc.).

Providing redlines to engineers and feedback to Cyber Leadership.

Document lessons learned and the best security engineering practices and industry standards.

Excellent technical document preparation skills and verbal communication are required to present technical information assurance issues to senior government and military officials.

Basic Qualifications:

An active Secret clearance is required to start.

5 years experience with a Bachelor’s degree in a STEM discipline or related field; 3 years experience with a Master’s degree in a STEM discipline or related field, or 9 years experience in lieu of a degree.

Must possess a DoD 8140 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).

Experience in either Windows administrator tasks related to Windows workstation platforms or RHEL administrator tasks related to a Unix/Linux server platform is required.

Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance.

Experience developing, integrating, and troubleshooting WSUS and RHEL Satellite is required.

Experience building WSUS/Satellite instances and a deep understanding of how WSUS/Satellite can improve patch management in an air-gapped network.

Proven experience executing Security Hardening on diverse LINUX and Windows Operating Systems based on approved DISA STIGs and SRGs.

Experience implementing McAfee Application Change Control (MACC) Solidcore Whitelisting and Endpoint Security for Windows (ENS).

Preferred Qualifications:

Familiarity with scripting Windows Group Policy Objects (GPOs).

Experience with Ansible is highly desirable.

Network design and software engineering backgrounds are a plus.

Salary Range:

$107,300 - $160,900

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for all positions with a government clearance.

#J-18808-Ljbffr