Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) - R10177519 image - Rise Careers
Job details

Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) - R10177519

Requisition ID: R10177519• Category: Information Technology• Location: Schriever AFB, Colorado, United States of America• Clearance Type: Top Secret• Telecommute: No- Teleworking not available for this position• Shift: Days (United States of America)• Travel Required: Yes, 10% of the Time• Positions Available: 1At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) to join our team of qualified, diverse individuals. This position will be at Schriever Space Force Base, Colorado Springs, CO.Position OverviewThe Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations, to see the battle develop collectively, and to dynamically manage designated networked sensors and weapons systems to achieve global and regional mission objectives. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight. C2BMC is the force multiplier that globally and regionally networks integrate, synchronizing autonomous sensor and weapon systems and operations to optimize performance. C2BMC is integral to all system ground and flight tests, which verify and exercise all current and future missile defense system capabilities.Essential Functions• Process and track DD Form 2875 user account forms and required training for privileged and non-privileged accounts; perform annual account validation; and work with the system administrator to create, modify, and remove accounts.• Assess systems and networks within a virtual environment and identify where those systems deviate from acceptable configurations, enclaves, or local policies.• Passive evaluations, such as compliance audits using STIG Viewer, SCAP, etc., and active evaluations, such as vulnerability assessments utilizing ACAS.• Perform Security Technical Implementation Guide (STIG) assessments and hardening for both Windows, Red Hat Enterprise Linux (RHEL) systems, and networking equipment utilizing ConfigOS.• Develop test plans reflecting how STIG checks are implemented and be able to show the expected outcomes of those checks.• Update the Risk Management Framework (RMF) artifact documentation to ensure non-compliant system hardening is tracked and remediated.• Establish strict program control processes to ensure risk mitigation and support obtaining system assessment and authorization.• Support of process, analysis, coordination, control certification test, compliance documentation, and investigations, software research, hardware introduction and release, emerging technology research, inspections, and periodic audits.• Assist in implementing the required government policy (e.g., NISPOM, NIST, DoD), make recommendations on process tailoring, and participate in and document process activities.• Perform analyses to validate established cybersecurity controls and requirements and to recommend cybersecurity safeguards.• Support program test milestones through pre-test preparations, participating in the tests, analysis of the results, and preparation of required artifacts supporting authorization.• Prepare artifacts such as Test Results (TR), Authorization Boundary Diagrams (ABD), Network Topologies, Flow Diagrams, Hardware and Software listings, Ports, Protocols, and Services Management documentation.• Support Assessment and Authorization activities and maintain the Plan of Action and Milestones (POA&M).• Periodically review each program support and operational system's audits and monitor corrective actions until all actions are closed.• Coordinate across the program to address identified deficiencies during RMF assessment activities.Basic QualificationsPlease note your updated security clearance and IAT/relevant certifications on your resume, if applicable.• An active Top Secret clearance is required to start.• Bachelor’s Degree in a STEM (Science, Technology, Engineering or Mathematics) discipline preferred from an accredited university and 5 years of related experience, or a Master’s degree and 3 years of experience, or a PhD and 1 years of experience, or 9 years of related experience in lieu of a degree may be considered• DoD 8140 certification at IAT Level II / IAM – Level I or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA) is required at the start.• Security engineering skills with a working knowledge of cybersecurity technology and DoD/Federal cybersecurity policy (i.e., DoDI 8500.01, NIST SP 800-53, etc.).• Understanding and utilization of Enterprise Mission Assurance Support Service (eMASS).• Understanding of Risk Management Framework (RMF) Cybersecurity Lifecycle including:• Identifying controls and overlays• Generating testable requirements, identifying resilient architecture design, configuring, running, and scripting audit tools, providing analysis of vulnerability analyses,• Conducting verification testing for compliance assessment.• Knowledge of Software Assurance (SwA) static and dynamic code analysis (e.g. Fortify)Preferred Qualifications• Windows and Red Hat Enterprise Linux (RHEL) system administration skills are highly desired.• Previous background working in a virtual environment.• Previous background working with dockers and containers.• Administer ACAS and ESS (formally HBSS)• Previous experience with ConfigOS.Salary Range: $97,500 - $146,300The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Northrop Grumman Glassdoor Company Review
4.0 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Northrop Grumman DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Northrop Grumman
Northrop Grumman CEO photo
Kathy Warden
Approve of CEO

Average salary estimate

$121900 / YEARLY (est.)
min
max
$97500K
$146300K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) - R10177519, Northrop Grumman

Are you ready to take your cybersecurity expertise to the next level? At Northrop Grumman, we’re on the lookout for a Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373.2) to join our dedicated team at Schriever AFB in Colorado Springs, CO. Here, you’ll be playing a crucial role in safeguarding the Command and Control, Battle Management, and Communications (C2BMC) program, which is integral to our nation's missile defense capabilities. Your day-to-day responsibilities will include assessing systems and networks to ensure compliance, conducting vulnerability assessments, and implementing recommended safeguards. You'll take the lead in establishing stringent program control processes to mitigate risk and support system assessments, while also preparing comprehensive documentation to track important artifacts and milestones. In addition, as part of your role, you'll be implementing government policies related to cybersecurity and ensuring our systems are resilient against emerging threats. We’re seeking someone with a solid background in security engineering, who possesses strong technical skills in both Windows and Red Hat Enterprise Linux systems. If you enjoy tackling complex challenges and making a real impact, this is the place for you. Join us at Northrop Grumman, where you'll not just be part of history but you're also making history with every innovative solution you help to create. Let’s invent the future together!

Frequently Asked Questions (FAQs) for Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) - R10177519 Role at Northrop Grumman
What are the top responsibilities for a Principal Cybersecurity Analyst at Northrop Grumman?

As a Principal Cybersecurity Analyst at Northrop Grumman, your key responsibilities include conducting compliance audits and active evaluations like vulnerability assessments, performing Security Technical Implementation Guide (STIG) assessments, and preparing essential documentation to support system assessments. Your role will also involve working closely with system administrators to manage user accounts and streamline risk management processes.

Join Rise to see the full answer
What qualifications do I need to apply for the Principal Cybersecurity Analyst position at Northrop Grumman?

To apply for the Principal Cybersecurity Analyst position at Northrop Grumman, you must have a Bachelor’s degree in a STEM field along with five years of related experience, or a Master’s degree and three years of experience. You will also need an active Top Secret clearance and must possess a DoD 8140 certification at IAT Level II/IAM – Level I or higher, such as Security+ or CISSP.

Join Rise to see the full answer
What is the working environment like for a Principal Cybersecurity Analyst at Northrop Grumman?

At Northrop Grumman, the working environment for a Principal Cybersecurity Analyst is dynamic and collaborative, centered at the Schriever Space Force Base. You’ll enjoy a culture that thrives on intellectual curiosity and cognitive diversity, where you’ll get the chance to work on technological innovations while being part of a tight-knit team that’s driven by excellence and courage.

Join Rise to see the full answer
How does Northrop Grumman support the career development of a Principal Cybersecurity Analyst?

Northrop Grumman actively supports career development for Principal Cybersecurity Analysts through various means such as training programs, professional certifications, and opportunities for advancement. You'll also benefit from a diverse workforce that encourages innovative thinking and collaboration, helping you to enhance your skills and grow within the organization.

Join Rise to see the full answer
What types of technologies will I be working with as a Principal Cybersecurity Analyst at Northrop Grumman?

As a Principal Cybersecurity Analyst at Northrop Grumman, you’ll work with a variety of technologies including vulnerability assessment tools like ACAS, and familiarize yourself with Security Technical Implementation Guides (STIG) for systems such as Windows and Red Hat Enterprise Linux. You’ll also engage with the latest compliance frameworks and cybersecurity policies to ensure our systems are secure and resilient.

Join Rise to see the full answer
Common Interview Questions for Principal Cybersecurity Analyst – Cybersecurity Engineer (24-373. 2) - R10177519
Can you explain your experience with STIG assessments?

When answering this question, highlight your knowledge of STIG assessments, emphasizing any specific systems you’ve worked with. Talk about how you conducted assessments, the tools you used, and any improvements made as a result of your evaluations.

Join Rise to see the full answer
How do you stay up to date with cybersecurity threats and technologies?

In your response, demonstrate your commitment to continuous learning. Discuss the resources you use, such as industry publications, webinars, or cybersecurity courses. Share any specific examples where knowledge of a new threat helped you proactively protect your organization.

Join Rise to see the full answer
Describe a challenge you faced in a previous cybersecurity role and how you overcame it.

Start with a specific challenge related to cybersecurity compliance or assessments. Detail your thought process and the actions you took to address the issue, and conclude by explaining the positive outcome and what you learned.

Join Rise to see the full answer
What cybersecurity tools are you most proficient in?

Be honest about your proficiency. List tools such as ACAS, STIG Viewer, or any specific vulnerability analysis software you’ve used. Provide context on how these tools aided your previous work and contributed to security improvements.

Join Rise to see the full answer
How would you approach a new vulnerability assessment for an unfamiliar system?

Detail your systematic approach. Discuss how you would gather information about the system, identify vulnerabilities, utilize tools for assessment, and analyze results against compliance requirements. Emphasize your adaptability and problem-solving skills.

Join Rise to see the full answer
What do you understand about the Risk Management Framework (RMF)?

Make sure to convey your understanding of the RMF lifecycle, identifying its major steps such as categorization, selection, implementation, assessment, authorization, and continuous monitoring. Share any direct experiences you've had with RMF processes.

Join Rise to see the full answer
Can you explain your experience with user account management?

Discuss your previous roles where you were responsible for user account management. Talk about the processes you followed for creating, tracking, and validating accounts while ensuring compliance with security policies.

Join Rise to see the full answer
What measures do you believe are crucial when hardening a system?

Highlight your best practices in system hardening, such as applying security patches, implementing access controls, configuring firewall rules, and incorporating STIG guidelines. Provide examples from your experience to illustrate your methodology.

Join Rise to see the full answer
How do you handle documentation for compliance and audits?

Explain your methodical approach to maintaining complete and accurate documentation, including version control, regular updates, and thorough record-keeping. Stress the importance of clear documentation for successful audits and compliance.

Join Rise to see the full answer
What is your experience working in a team environment and how do you contribute?

Describe your collaborative work style and how you contribute positively to a team. Include examples of successful projects or initiatives you were part of, highlighting communication and teamwork skills.

Join Rise to see the full answer

Our vision is to be the most trusted provider of systems and technologies that ensure the security and freedom of our nation and its allies. As the technology leader, we will define the future of defense - from undersea to outer space, and in cybe...

122 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 12, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!