Northrop Grumman
Principal Cyber Systems Adm Compliance/Patching System Adm
Northrop Grumman, Colorado Springs, Colorado, United States, 80509
Requisition ID: R10180445
Category:
Information Technology
Location:
Colorado Springs, Colorado, United States of America | Schriever AFB, Colorado, United States of America
Clearance Type:
Top Secret
Telecommute:
No- Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage, and a pioneering spirit to join forces to invent the future. Northrop Grumman Space Systems Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Administrator Compliance/Patching System Administrator (24-499) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO. Position Overview: The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight. This individual will act as a point of contact for testing and applying patches on all main software/application systems, including workstations and servers. This team will support the system by interacting continuously with the cyber compliance team to remediate any vulnerabilities found during automated or manual cyber scans. Essential Functions: Experience with writing standard operating procedures (SOP) documentation
Ability to build documentation to outline a full testing strategy for regression of functionality after patching workstations/servers
Basic Qualifications: An active Top Secret clearance is required to start with the ability to obtain SCI and SAP clearance
Bachelors degree in a related field with 5 years of experience or 9 years of experience instead of a degree. A Masters degree in a related field with 3 years of experience
5 6 years of experience with patching in an enterprise-level system
Monitor systems asset compliance via Tenable Security Center to coordinate a testing strategy for patching found vulnerabilities
Administer patching solutions, such as: Tanium
WSUS
YUM
Identify and work with component owners to build subset groups for patching testing before wide deployment of enterprise patching
Coordinate with system owners to patch specific products/solutions, such as
server applications
,
user workstations
, etc.
Perform continuous vulnerability patching schedules based on cyber tool scan scoring and authorized schedules by the appropriate board
Notify the user base of upcoming patches and any projected impacts from this patching activity, such as reboots and new features being introduced
Preferred Qualifications: Active SCI and SAP clearance is highly desired
Testing patches using a systematic process to limit the impact on the user base is highly desired
What We Can Offer You: Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company. Salary Range:
$91,200 - $136,800 Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. #J-18808-Ljbffr
Information Technology
Location:
Colorado Springs, Colorado, United States of America | Schriever AFB, Colorado, United States of America
Clearance Type:
Top Secret
Telecommute:
No- Teleworking not available for this position
Shift:
Days (United States of America)
Travel Required:
Yes, 10% of the Time
Positions Available:
1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage, and a pioneering spirit to join forces to invent the future. Northrop Grumman Space Systems Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Administrator Compliance/Patching System Administrator (24-499) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO. Position Overview: The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight. This individual will act as a point of contact for testing and applying patches on all main software/application systems, including workstations and servers. This team will support the system by interacting continuously with the cyber compliance team to remediate any vulnerabilities found during automated or manual cyber scans. Essential Functions: Experience with writing standard operating procedures (SOP) documentation
Ability to build documentation to outline a full testing strategy for regression of functionality after patching workstations/servers
Basic Qualifications: An active Top Secret clearance is required to start with the ability to obtain SCI and SAP clearance
Bachelors degree in a related field with 5 years of experience or 9 years of experience instead of a degree. A Masters degree in a related field with 3 years of experience
5 6 years of experience with patching in an enterprise-level system
Monitor systems asset compliance via Tenable Security Center to coordinate a testing strategy for patching found vulnerabilities
Administer patching solutions, such as: Tanium
WSUS
YUM
Identify and work with component owners to build subset groups for patching testing before wide deployment of enterprise patching
Coordinate with system owners to patch specific products/solutions, such as
server applications
,
user workstations
, etc.
Perform continuous vulnerability patching schedules based on cyber tool scan scoring and authorized schedules by the appropriate board
Notify the user base of upcoming patches and any projected impacts from this patching activity, such as reboots and new features being introduced
Preferred Qualifications: Active SCI and SAP clearance is highly desired
Testing patches using a systematic process to limit the impact on the user base is highly desired
What We Can Offer You: Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company. Salary Range:
$91,200 - $136,800 Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. #J-18808-Ljbffr