Northrop Grumman Space Systems, Multi-Domain Operations, and Missile Defense Integration Business Unit (BU) has an exciting career opportunity for a Cyber Software Engineer – Level 2 to join our team of qualified, diverse individuals. This position will be located in Huntsville, AL.
Position Overview:
The Cyber Software Engineer – Level 2 will provide support for the Ground-Based Mid-Course Defense (GMD) Weapon System (GWS). The selected candidate will develop and maintain software security monitoring systems and infrastructure for the program to enhance the cyber posture of the software. The candidate will concentrate on software management including configuring, deploying, and troubleshooting hardware and software on the GWS Infrastructure team (GNI).
Essential Functions:
Installation and configuration of Software, Network and Cyber Systems Development
Documentation and verification of all installation and configuration steps for labs in both a virtual and physical domain
Deployment and Management of hardware and server equipment
Develop test plans/procedures for software integration and testing.
Work with software developers and/or vendors as needed to help diagnose and identify the root cause of problems found during system integration.
Documenting lessons learned, best security engineering practices, and industry standards will be required in daily tasks as well.
The selected candidate should thrive in a fast-paced work environment with high expectations, significantly diverse assignments, and collaborative/team settings across all levels.
Basic Qualifications:
Bachelor’s Degree in a STEM (Science, Technology, Engineering or Mathematics) discipline preferred from an accredited university and 2 years of related work experience, or a Master's Degree and 0-2 years of related work experience.
Must possess a DoD 8570 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA)
Experience configuring and administering server applications
Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance
Experience with scripting, installing, and testing patches on system hosts
Configuring and Managing network hardware, deploying software stacks, and troubleshooting and resolving bugs and errors
Experience applying Cybersecurity configurations such as Firmware updates/upgrades and STIGs to a baselined system
Must be able to support an in-person / closed-area work environment.
Ability and willingness to travel up to 10% of the time to support business needs.
Applicants must have a current active in-scope U.S. Government issued Secret security clearance at the time of application and is required to start.
Preferred Qualifications:
Experience with Python and/or PowerShell scripting
Experience with Networking related to implementing and configuring Cisco equipment
Experience with Palo Alto firewall configurations
Experience with Ansible playbooks and process automation on Cyber systems
Experience working with Kubernetes
Experience working with GitHub
Technical trouble shooting of software applications and integrating COTS products, data analytics of system vulnerabilities and mission impacts, and risk mitigation resulting in system accreditation
Familiarity with scripting Windows Group Policy Objects (GPOs)
Working knowledge of Risk Management Framework (RMF) implementation across multiple phases of a Medium to large program
Demonstrated experience analyzing and implementing NIST SP 800-53 Security Controls on wide range of Information Systems including Enterprise Datacenters, Mobile units and Virtualized environments.