Cyber Sys Engineer - Level 3 (26-171 & 172)

Northrop Grumman Northrop Grumman · Aerospace · Colorado Springs, CO +1 · Cyber

Northrop Grumman is seeking a Cyber Systems Engineer with a Secret clearance and IAT Level II or higher certification to manage the full lifecycle of Information Assurance Vulnerability Management (IAVM) tickets, execute Cyber Tasking Orders (CTO), address Common Vulnerabilities and Exposures (CVE), integrate vendor-issued patches, and apply and verify DISA STIG configurations. The role involves integrating and verifying cybersecurity solutions, coordinating test events, reviewing test plans, briefing on analysis, and supporting vulnerability management within the C2BMC program. Requires experience with Agile/Scrum, cyber audit tools, vulnerability assessments, and SDLC testing processes.

What you'd actually do

  1. Responsibilities include managing the full lifecycle of Information Assurance Vulnerability Management (IAVM) tickets, executing Cyber Tasking Orders (CTO), addressing Common Vulnerabilities and Exposures (CVE), integrating vendor-issued patches, and applying and verifying DISA STIG configurations
  2. The candidate will work directly with the Cyber Engineering team to integrate and verify cybersecurity solutions on the C2BMC platform at COS HWY-83, ensuring all security controls are properly implemented and thoroughly tested.
  3. They will serve as the primary liaison with the Cyber Test Facility (CTF) at MIDOC, coordinating test events, reviewing test plans submitted by cyber teams, and briefing program leadership on their analysis of those plans.
  4. Additionally, the role involves supporting cyber teams by facilitating the prompt delivery of capabilities and solutions, with a strong focus on vulnerability management.
  5. Will review test plans and test cases provided by development teams, verify their proper implementation, execute the tests, and give clear, actionable feedback to ensure cybersecurity compliance

Skills

Required

  • Bachelor’s Degree in Computer Science, Computer Engineering, Cybersecurity Engineering, Electrical Engineering, Information Technology, Mathematics, Physics, or a related field from an accredited university, along with 5 years of experience; or a Master’s degree in a related field with 3 years of relevant work experience; or 9 years of relevant work experience
  • Current, active DoD 8140 certification at IAT Level II or higher (such as Security+ CE, CCNA-Security, CySA+, CND, etc.)
  • Current, active in-scope DoD-issued Secret security clearance
  • Strong working knowledge of cyber capabilities—including patch management, multi-factor authentication, host-based security, intrusion detection, security event management, active/passive system scanning, and defense-in-depth
  • Strong working knowledge of core cyber capabilities—including patch management, Group Policy Object (GPO) management, and proven remediation techniques for cybersecurity vulnerabilities and threats—as well as security engineering expertise in Information Assurance (IA) technologies, NIST standards, DoDI8500.2, and Risk Management Framework (RMF) security controls
  • Hands-on experience throughout the Agile development lifecycle, specifically using the Scrum framework—identifying requirements, defining user stories, and participating in sprint planning, daily stand-ups, and sprint reviews
  • Experience in configuring cyber audit tools, conducting cyber vulnerability assessments, and managing configuration activities
  • A solid understanding of Software Development Life Cycle (SDLC) models and testing processes, along with proficiency in cyber-tool software applications

What the JD emphasized

  • Secret security clearance
  • DoD 8140 certification at IAT Level II or higher
  • IAVM
  • CTO
  • CVE
  • DISA STIG
  • NIST standards
  • RMF