Principal/Sr Principal Cyber Systems Test Engineer
Role details
Job location
Tech stack
Job description
- Perform assessment of systems and networks within the networking environment and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits using STIG Viewer, SCAP, etc
- Author, update, and review security testing documentation including security assessment plans, test cases, and cyber test methodologies. Conduct annual security controls assessment to support continuous monitoring. Provide input to Security Assessment Reports (SAR) and Risk Assessment Reports (RAR). Work with the program's System Program Office (SPO) contractor and government personnel supporting the RMF Cybersecurity Engineer on updating systems eMASS records
- Update RMF authorization packages in eMASS with implementation details for system/site specific security controls.
- Coordinate, collect, prepare, and maintain RMF body of evidence documentation relevant to operational processes, procedures, and site-specific information.
- Prepare, update, and import (into eMASS) artifacts, supporting Assessment and Authorization activities and Plan of Actions and Milestones (POA&M).
- Perform assessments of RMF artifacts and identify where those artifacts deviate RMF control requirements
- Assist in the implementation of the required government policy (e.g., NISPOM, NIST, DoD, AFI), making recommendations on process tailoring, participating in and documenting process activities
- Establish strict program control processes to ensure mitigation of risks and supports obtaining assessment and authorization of systems. Includes support of process, analysis, coordination, control certification test, compliance documentation, as well as investigations, software research, hardware introduction and release, emerging technology research, inspections, and periodic audits.
- Perform analyses to validate established cybersecurity controls and requirements and to recommend cybersecurity safeguards
- Coordinate across the program to address identified deficiencies during RMF assessment activities
Requirements
- Principal: Bachelor's degree in a STEM discipline with 5 years of cybersecurity engineering and/or testing experience; or 3 years' experience with a Master's degree; or 1 years with PhD; 4 additional years of relevant experience may be considered in lieu of a degree.
- Sr. Principal: Bachelor's degree in a STEM discipline with 8 years of cybersecurity engineering and/or testing experience; or 6 years' experience with a Master's degree; or 4 years with PhD; 4 additional years of relevant experience may be considered in lieu of a degree.
- Active DoD Secret clearance at the time of application with ability to obtain Top Secret
- Current DoD 8570.01M IAT II certification (Security+ CE, CCNA Security, GSEC, SSCP, etc.)
- Security engineering skills with a working knowledge of cybersecurity technology and DoD/Federal cybersecurity policy (i.e., DoDI 8500.01, NIST SP 800-53, NIST SP 800-115 etc.)
- Familiarity in the Risk Management Framework (RMF) Cybersecurity Lifecycle to include: generating testable requirements, identifying resilient architecture design, providing analysis of vulnerability findings, conducting verification testing of compliance assessments, and configuring, running, and scripting audit tools
- Technical documentation and analysis experience; proficient with Microsoft Office tool suite
- Experience performing vulnerability and compliance scans utilizing Assured Compliance Assessment Solution (ACAS) / Nessus / tenable.sc
- Linux Sys Admin Experience
- STIG hardening
- Experience using and/or configuring SIEM & Log Aggregation software
- Experience with deploying and managing Cross-Domain Solutions (CDS)
- Travel to OCONUS (20%), * Active DoD Top Secret clearance
- Penetration testing focused certification e.g., OSCP, OSCE, GPEN, GWAPT, GXPN
- Experience conducting cybersecurity assessments of RHEL environments
- Understanding of networking, subnetting, firewalls, NAT, ACL's, vLANs, etc.
- Familiarity with STIG/SCAP compliance scanning (SCC) and implementation
- Familiarity or experience with Agile development methodologies, i.e., Scrum, Kanban, SAFe
- VMWare/Container Experience
- eMASS experience and familiarization with ATO
- Elastic Stack experience
- IAT III Certification (CISSP)
Benefits & conditions
Primary Level Salary Range: $113,900.00 - $170,900.00
Secondary Level Salary Range: $142,200.00 - $213,200.00
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.