Vacancy expired!
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Assist in the implementation of the required government policy (i.e., NISPOM, DCID 6-3), make recommendations on process tailoring, participate in and document process activities. Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M. Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.Responsibilities: Applicant needs to be familiar with the Risk Management Framework (RMF) and the process of accrediting a system through it as well as the nuances present in applying RMF. Applicant needs to be familiar with NIST800.53rev4, CNSS-1253, National Security Memorandum 8 (NSM-8), and the Zero Trust Architecture/Networking (ZTA/N) high-level concepts and possible implementations. Applicant should be familiar with both initial accreditation activities as well as continuous monitoring tasks and be willing to adapt to rapidly changing toolsets and controls requirements. Applicant should have familiarity with network monitoring and vulnerability detection tools such as Nessus, Rapid7, Splunk, Xacta as well as strong competency with Microsoft Office suite of products (Excel, PowerPoint, and Word).Level 4 Qualifications:- Bachelor's degree from an accredited university in Computer science, Engineering, or related field and a minimum of nine (9) years of relevant experience
- Must be a U.S. Citizen and hold a current TS/SCI clearance with Poly.
- Background in Technical Writing or Instructional Systems Design would be helpful but not required.
- Privileged/Power-user level of knowledge is strongly suggested in at least one of the following -
- Microsoft Windows
- Enterprise Linux variants
- Cloud computing infrastructure like AWS or Microsoft Azure
- Bachelor's degree from an accredited university in Computer science, Engineering, or related field and a minimum of five (5) years of relevant experience
- Must be a U.S. Citizen and hold a current TS/SCI clearance with Poly.
- Background in Technical Writing or Instructional Systems Design would be helpful but not required.
- Privileged/Power-user level of knowledge is strongly suggested in at least one of the following -
- Microsoft Windows
- Enterprise Linux variants
- Cloud computing infrastructure like AWS or Microsoft Azure
Vacancy expired!