Principal/sr Principal Cyber Systems Engineer

Northrop Grumman Northrop Grumman · Aerospace · Colorado Springs, CO +1 · Cyber

Cyber Systems Engineer role at Northrop Grumman focused on assessing systems and networks against security configurations and policies, authoring security testing documentation, updating RMF authorization packages, and performing vulnerability and compliance scans. Requires a STEM degree, cybersecurity engineering experience, an active DoD Secret clearance, and IAT II certification.

What you'd actually do

  1. Perform assessment of systems and networks within the networking environment and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits using STIG Viewer, SCAP, etc
  2. Author, update, and review security testing documentation including security assessment plans, test cases, and cyber test methodologies. Conduct annual security controls assessment to support continuous monitoring. Provide input to Security Assessment Reports (SAR) and Risk Assessment Reports (RAR). Work with the program’s System Program Office (SPO) contractor and government personnel supporting the RMF Cybersecurity Engineer on updating systems eMASS records
  3. Update RMF authorization packages in eMASS with implementation details for system/site specific security controls.
  4. Coordinate, collect, prepare, and maintain RMF body of evidence documentation relevant to operational processes, procedures, and site-specific information.
  5. Prepare, update, and import (into eMASS) artifacts, supporting Assessment and Authorization activities and Plan of Actions and Milestones (POA&M).

Skills

Required

  • Bachelor’s degree in a STEM discipline
  • 5 years of cybersecurity engineering and/or testing experience (Principal) or 8 years (Sr. Principal)
  • Active DoD Secret clearance
  • DoD 8570.01M IAT II certification
  • Security engineering skills
  • Working knowledge of cybersecurity technology and DoD/Federal cybersecurity policy
  • Familiarity in the Risk Management Framework (RMF) Cybersecurity Lifecycle
  • Technical documentation and analysis experience
  • Proficient with Microsoft Office tool suite
  • Experience performing vulnerability and compliance scans utilizing Assured Compliance Assessment Solution (ACAS) / Nessus / tenable.sc
  • Linux Sys Admin Experience
  • STIG hardening
  • Experience using and/or configuring SIEM & Log Aggregation software
  • Experience with deploying and managing Cross-Domain Solutions (CDS)

Nice to have

  • Active DoD Top Secret clearance
  • Penetration testing focused certification
  • Experience conducting cybersecurity assessments of RHEL environments
  • Understanding of networking, subnetting, firewalls, NAT, ACL's, vLANs, etc.
  • Familiarity with STIG/SCAP compliance scanning (SCC) and implementation
  • Familiarity or experience with Agile development methodologies
  • VMWare/Container Experience
  • eMASS experience and familiarization with ATO
  • Elastic Stack experience
  • IAT III Certification (CISSP)

What the JD emphasized

  • Active DoD Secret clearance
  • Security engineering skills with a working knowledge of cybersecurity technology and DoD/Federal cybersecurity policy
  • Familiarity in the Risk Management Framework (RMF) Cybersecurity Lifecycle