Logo
Northrop Grumman

Principal Cyber Systems Adm Compliance/Patching System Adm

Northrop Grumman, Colorado Springs, Colorado, United States, 80509

Save Job

Requisition ID: R10180445 Category:

Information Technology

Location:

Colorado Springs, Colorado, United States of America | Schriever AFB, Colorado, United States of America

Clearance Type:

Top Secret

Telecommute:

No- Teleworking not available for this position

Shift:

Days (United States of America)

Travel Required:

Yes, 10% of the Time

Positions Available:

1

At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering spirit has enabled us to be at the forefront of many technological advancements in our nation's history. We look for people who have bold new ideas, courage, and a pioneering spirit to join forces to invent the future. Northrop Grumman Space Systems Launch and Missile Defense Systems has an exciting career opportunity for a Principal Cyber Systems Administrator Compliance/Patching System Administrator (24-499) to join our team of qualified, diverse individuals. This position will be located in Colorado Springs, CO. Position Overview: The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders to systematically plan ballistic missile defense operations. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight. This individual will act as a point of contact for testing and applying patches on all main software/application systems, including workstations and servers. This team will support the system by interacting continuously with the cyber compliance team to remediate any vulnerabilities found during automated or manual cyber scans. Essential Functions: Experience with writing standard operating procedures (SOP) documentation

Ability to build documentation to outline a full testing strategy for regression of functionality after patching workstations/servers

Basic Qualifications: An active Top Secret clearance is required to start with the ability to obtain SCI and SAP clearance

Bachelors degree in a related field with 5 years of experience or 9 years of experience instead of a degree. A Masters degree in a related field with 3 years of experience

5 6 years of experience with patching in an enterprise-level system

Monitor systems asset compliance via Tenable Security Center to coordinate a testing strategy for patching found vulnerabilities

Administer patching solutions, such as: Tanium

WSUS

YUM

Identify and work with component owners to build subset groups for patching testing before wide deployment of enterprise patching

Coordinate with system owners to patch specific products/solutions, such as

server applications

,

user workstations

, etc.

Perform continuous vulnerability patching schedules based on cyber tool scan scoring and authorized schedules by the appropriate board

Notify the user base of upcoming patches and any projected impacts from this patching activity, such as reboots and new features being introduced

Preferred Qualifications: Active SCI and SAP clearance is highly desired

Testing patches using a systematic process to limit the impact on the user base is highly desired

What We Can Offer You: Northrop Grumman provides a comprehensive benefits package and a work environment that encourages your growth and supports the mutual success of our people and our company. Salary Range:

$91,200 - $136,800 Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer. #J-18808-Ljbffr