Cyber Information Sys Security 4

Northrop Grumman is seeking a Cyber Information Sys Security team member to join the Information Systems Security (ISS) team in Baltimore, MD. The ISS team consists of Information Systems Security Officers (ISSOs) and Information Systems Security Managers (ISSMs), Information Systems Security Engineers (ISSEs), and Information Systems Security Auditors (ISAs). The selected candidate will perform mainly as the ISSM, however, may perform duties under one or more of the different roles. The ISS organization has overall responsibility for providing security oversight to all Northrop Grumman classified systems under their respective purview.

This position will serve as the principal advisor on all matters, technical and otherwise, involving the security of classified information systems under their purview. This person will perform assessments of systems and networks within the networking environment or enclave and will identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Ensures the implementation of the Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc…), make recommendations on process tailoring, participate in and document process activities. Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Document the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M. Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.

Responsibilities will include, but are not limited to:

  • Develop and maintain a formal IS security program and policies for classified systems under their purview.
  • Manage all Risk Management Framewortk (RMF) activities in accordance with ICD 503/JSIG/DOD.
  • Manage all IA related support functions including installation, configuration, troubleshooting, assistance, and/or training, in response to customer requirements for the NE.
  • Provide oversight and guidance of IA personnel performing system analysis looking for patterns of non-compliance; ensure appropriate administrative or programmatic actions which minimize security risks and insider threats. Manage account processes, network rights, and access to Computing Environment (CE), NE systems and equipment.
  • Manage the remediation/mitigation of security violations to determine if the Network Environment (NE) has been breached, asses the impact, and preserve the evidence.
  • Provide oversight and guidance ensuring systems are properly configured, optimized, and tested ensuring all policy and technical requirements are met.
  • Provide oversight to all ISSOs under their purview to ensure they follow established IS policies and procedures.
  • Manage all IA related processes and procedures in the development of and implementation of access control lists on routers, firewalls, CE, printing devices, and other network devices.
  • Assess the performance of IA security controls within the NE.
  • Develop and implement and effective IS security education, training, and awareness program.
  • Manage, maintain, and execute the IS continuous monitoring plan.
  • Identify IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing.
  • Perform control validation and remediation validation of network servers, routers, and switches to ensure they comply with security policy, procedures, and technical requirements.
  • Evaluate potential IA security risk and take appropriate corrective and recovery action.
  • Ensure that hardware, software, data and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans and requirements.
  • Ensure IA personnel perform system audits to assess security related factors within the NE.
  • Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the NE.
  • Design, manage, and provide continuous monitoring of all defensive systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources or malicious traffic.
  • Provide oversight and guidance of IA personnel implementing applicable patching oversight and validation of all security related updates including IAVAs, IAVBs, TAs, for their NE.
  • Analyze system performance for potential security problems. Assess the performance of IA security controls within the NE.
  • Adhere to IS security laws and regulations to support functional operations for the NE. Implement response actions in reactions to security incidents.
  • Assume the ISSO responsibilities in the absence of an ISSO.
  • Support Security Test and Evaluation (Part of the RMF Process)
  • Provide oversight to all IA personnel monitoring/managing firewalls and intrusion detection systems and end-point security systems.

ESCSO

Basic Qualifications:

  • Bachelor's degree and 9 years of relevant experience or 7 years of relevant experience with a master's degree.
  • DoDM 8570 - IAM Level II Certification (CAP, GSLC, CISM, CISSP, CASP CE).
  • Current Active Top Secret clearance.

Preferred Qualifications:

  • Bachelors or master's degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE).
  • CISSP or an IAM Level III certification (CISSP, CISM, GSLC).
  • MCSE/RHSA and/or System Administration experience.
  • Experience with security hardening, assessment and reporting tools (SCAP, ACAS, HBSS, Nessus, XACTA).

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.


Meet Some of Northrop Grumman's Employees

Jacqueline T.

Electrical Engineer

Jacqueline operates on power electronics for Northrop Grumman’s space application projects. She meets with engineering groups, chats with customers, and works on circuit analysis.

Jonathan M.

Electronics Engineer

Jonathan works with avionics industry subject matter experts to come up with new feature developments before implementing those ideas in the Northrop Grumman laboratory.


Back to top