About The Position

At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Northrop Grumman Defense Systems is seeking a Principal or Senior Principal Computer Systems Analyst. This position will be located in Roy, Utah and will support the Sentinel program.

Requirements

  • Must have an active U.S. Government DoD Secret security clearance at time of application, current and within scope, with an ability to obtain and maintain Special Access Program (SAP) approval within a reasonable period of time, as determined by the company to meet its business need
  • Windows Server Administration & Management experience.
  • Windows Domain architecture experience.
  • Windows Active Directory, Windows Domain administration experience.
  • Microsoft MECM, SCCM, WSUS, and/or SMS experience.
  • Current Security + CE (or other DoD 8570 certification), or the ability to obtain certification within 6 months of hire date.
  • Ability to lift equipment weighing up to 40 pounds.
  • Ability to work after hours and weekends as needed.
  • 5 Years of related experience with Bachelors in Science; 3 Years of related experience with Masters; 1 Year of related experience. with PhD. 4 additional years of experience can be considered in lieu of the Bachelors Degree
  • 8 Years of related experience with Bachelors in Science; 6 Years of related experience with Masters; 4 Years of related experience with PhD. 4 additional years of experience can be considered in lieu of the Bachelors Degree
  • 4 additional years of experience can be considered in lieu of the Bachelors Degree

Nice To Haves

  • Bachelor's or master's degree in IS related field.
  • Currently active Top Secret/SCI security clearance or capable of obtaining one.
  • DoD 8570 Certification in a primary OS (Windows, Linux, Cisco).
  • Currently valid Security+ CE, CASP, CISSP, or similar security certification.
  • Experience operating under and managing systems within NISPOM Chapter 8, DCID 6/3-ICD 503, RMF, STIG, JAFAN, or JSIG information system environments.
  • Red hat System Administration certification(s).
  • Experience with NAS storage device administration (Isilon/NetApp or similar)
  • Solid understanding of Enterprise-level storage concepts to include all commonly used RAID-levels.
  • Red hat Satellite Server (version 5 and version 6) configuration and usage experience.
  • Familiar with Ansible automation platform for Level 3, Proficient in Ansible automation platform for Level 4
  • Solid understanding of remediating security vulnerabilities; Experience hardening Red hat systems in accordance with RMF and STIGs.
  • Identity Management (Single Sign-On) experience.
  • VMware and ESXi (6.x or higher) configuration and management experience.
  • Experience with host-based firewall implementations and configuration (Red hat “iptables”).
  • Experience building custom “rpm” software packages for Red hat platforms.
  • Windows (7, 10) administration experience; Windows Server 2008/2012 experience.
  • Group Policies (GPOs) experience; Active Directory management experience.
  • Solid writing skills and use of Wiki pages and SharePoint sites for documentation.

Responsibilities

  • Provide security oversight to NG classified environments that have information system(s).
  • Conduct system assessments and audits to ensure controls are implemented according to internal and external policies, ensuring systems in classified environments supporting the business meet customer requirements.
  • Ensure configuration management, policy, and procedures meet both security compliance and system mission requirements in accordance with the governance structure of the accrediting customer.
  • Responsible for coordinating and supporting company requirements under Information Security Governance (ISG) for classified systems. The members provide guidance for designing security solutions to ensure selected controls provide adequate compliance with governing standards.
  • Coordinate with the customer on categorization, schedules and approvals
  • Drafts documentation for system authorization/re-authorizations, as required by government regulatory agencies.
  • Ensures systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan
  • Communicates with Industrial Security to ensure that all users have the requisite security clearances, authorization, and need-to-know, and are aware of their security responsibilities before granting access
  • Ensures all information system security-related documentation is current and accessible to properly authorized individuals
  • Working with security, follows documented sanitization/declassification procedures to remove/dispose/calibrate classified hardware within program
  • Require each user to sign proper documentation prior to system access
  • Mark and label all system media in accordance with Industrial Security/government requirements
  • Evaluate proposed changes or additions to the information system, and advises the Information Systems Security Manager (ISSM) or Alternate ISSM of their security relevance
  • Participates in internal/external security audits/inspections
  • Maintains copies of audit logs and maintenance logs required by government agencies
  • Validates system technical security controls to ensure operating systems are hardened according to government requirements
  • Report incidents (security, procedures, anomalies) to Industrial Security
  • Support Government audits (as required)
  • Comprehensive risk assessment reports (quarterly)
  • Incident response reports within 48 hours of an event
  • Updated cybersecurity policies and procedures (biannually)
  • Documentation for system authorization and re-authorization (as required)
  • Monthly threat landscape reports
  • Audit and maintenance logs (regularly updated for compliance)

Benefits

  • Medical, Dental & Vision coverage
  • 401k
  • Educational Assistance
  • Life Insurance
  • Employee Assistance Programs & Work/Life Solutions
  • Paid Time Off
  • Health & Wellness Resources
  • Employee Discounts
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service