Vacancy expired!
Embark on a career putting innovative, reliable, and agile products and ideas into orbit, and beyond. Northrop Grumman has opportunities waiting for you that play a vital role in human space exploration, national defense, and scientific discovery, supporting multiple programs across the universe. With us, you'll discover a culture of curiosity and collaboration that will have you Defining Possible from the day you start. Our space systems connect and protect millions of people on earth every day, now and for the future. Explore your future and launch your career today. At Northrop Grumman we develop cutting-edge technology that preserves freedom and advances human discovery. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We continue to innovate with developments from launching the first commercial flight to space, to discovering the early beginnings of the universe. Our employees are not only part of history, they're making history. The Engineering organization pushes the boundaries of innovation, redefines engineering capabilities, and drives advances in various sciences. Our team is chartered with providing the skills, innovative technologies to develop, design, produce and sustain optimized product lines across the sector while providing a decisive advantage to the warfighter. Come be a part of our mission! Northrop Grumman Space Systems (NGSP) is looking for you to join our team as a Principal Cybersecurity Engineer based out of Schriever Air Force Base, Colorado Springs, CO. What You'll get to Do:
- This position will be responsible for ensuring that policies and processes are created, adhered to, and reported to ensure continuous monitoring requirements are met in accordance with C2BMC and MDA requirements.
- Additionally this role will perform both technical and non-technical assessments of controls requirements and work with functional area personnel to remediate those requirements.
- This position will be pivotal in providing a forward look at the Cybersecurity strategy across multiple task orders for the C2BMC Program.
- Lastly, this position will aid in the development and maintenance of the Assessment and Authorization (A&A) across three different environments.
- An active Top Secret clearance is required.
- 5 Years with Bachelor's degree in a related field; 9 years' experience in lieu of a degree.
- Must possess a DoD 8570 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA)
- Experience in analyzing design constraints, trade-offs, and detailed system and security designs to identify necessary lifecycle support.
- Apply security policies to applications that interface with one another.
- Assess the effectiveness of information protection measures utilized by system(s).
- Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile. Build, test, and modify product prototypes using working or theoretical models. Conduct assessments of the application's security design for the appropriate security controls, which protect the confidentiality and integrity Information. Integrate information assurance (IA) or IA-enabled products.
- Design and develop secure interface specifications between interconnected systems. Design, develop, integrate, and update system security measures (including policies and requirements) that provide confidentiality, integrity, availability, authentication, and non-repudiation.
- Design hardware, operating systems, and software applications to adequately address information assurance (IA) security requirements.
- Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.
- Design to minimum security requirements to ensure requirements are met for all systems and/or applications.
- Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.
- Health Plan
- Savings Plan
- Paid Time Off
- Education Assistance
- Training and Development
- Flexible Work Arrangements
Vacancy expired!