Northrop Grumman Jobs

Job Information

Northrop Grumman Principal Cyber Protection Engineer in Redondo Beach, California

Are you interested in expanding your career through experience and exposure, all while supporting a mission that seeks to ensure the security of our nation and its allies? If so, then Northrop Grumman is the place for you. As a leading global security company, we provide innovative systems, products and solutions to our customers worldwide. We are comprised of diverse professionals that bring different perspectives and ideas, understanding that the more experiences we bring to our work the more innovative we can be. As we continue to build our workforce we look for people that exemplify our core values, leadership characteristics, and approach to innovation.

Northrop Grumman is looking for a Principal Cyber Protection Engineer to join our Aerospace Cyber Effects (ACE) Group in a Redondo Beach, California ( the level 4 position will be in a remote setting ) . The Cyber Protection Engineer will use and apply technical standards, principles, theories, concepts and techniques to perform moderately complex tasks.

Work will be performed under general supervision and reviewed for soundness of judgment, overall adequacy and accuracy.

Job Duties:

  • Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques on avionics and embedded systems

  • Performs vulnerability analysis and exploitation of applications, operating systems or networks

  • Identifies intrusion or incident path and method

  • Isolates, blocks or removes threat access. Evaluates system security configurations

  • Evaluates findings and performs root cause analysis. Performs analysis of complex software and systems to determine both functionality and intent of software systems

  • Contributes to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations

  • May prepare and present technical reports and briefings

  • Perform documentation, vetting and weaponization of identified vulnerabilities for operational use

  • Interacts regularly with the immediate supervisor, project leaders and teammates

This requisition may be filled as either a level 3 or level 4.

Basic Qualifications for Level 3:

  • A Bachelor's degree with a minimumof 5 years related experience ORa Master's degree with a minimumof 3 years related experience OR a PhD/ An additional 4 years of experience may be substituted in lieu of degree requirement

  • 2 years of experience conducting penetration testing and vulnerability assessments of avionics and embedded systems

  • 1 year of experience identifying vulnerabilities and or working with one or more of the following software languages:

  • ADA

  • C

  • C++ Python

  • PowerPC

  • I386/x86

  • x86_64

  • ARM

  • AVR

  • 1 year of experience with one or more of the Reverse Engineering or debugging tools:

  • IDA Pro

  • Radare2

  • GDB

  • WinDBG

  • Demonstrated ability to identify and develop exploits for systems, e.g. Bug Bounty awards, CVEs, or winning organized Capture-the-Flag competitions

  • Mustbe ableto travel regularly (approximately 30%) to Northrop Grumman locations and customer sites

  • An Active Top Secret security clearancewith the ability to be accessed to a Special Access Program (SAP)

Basic Qualifications for Level 4:

  • A Bachelor's degree with a minimumof 9 years related experience ORa Master's degree with a minimumof 7 years related experience OR a PhD with a minimumof 4 years related experience/ An additional 4 years of experience may be substituted in lieu of degree requirement

  • 4 years of experience conducting penetration testing and vulnerability assessments of avionics and embedded systems

  • 4 years of experience identifying vulnerabilities and or working with one or more of the following software languages:

  • ADA

  • C

  • C++ Python

  • PowerPC

  • I386/x86

  • x86_64

  • ARM

  • AVR

  • 2 years of experience with one or more of the Reverse Engineering or debugging tools:

  • IDA Pro

  • Radare2

  • GDB

  • WinDBG

  • Demonstrated ability to identify and develop exploits for systems, e.g. Bug Bounty awards, CVEs, or winning organized Capture-the-Flag competitions

  • Must be able to work virtually in a remote setting and have the ability to travel regularly (approximately 30%) to Northrop Grumman locations and customer sites

  • An Active Top Secret security clearancewith the ability to be accessed to a Special Access Program (SAP)

Preferred Qualifications:

  • Any of the following certifications

  • Offensive Security Certified Professional (OSCP)

  • Offensive Security Certified Expert (OSCE)

  • Offensive Security Certified Exploitation Expert (OSEE)

  • Experience with control systems protocols for aircraft, spacecraft, or other vehicles, e.g. MIL-STD-1553, CAN, Spacewire, or ARINC

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO . U.S. Citizenship is required for most positions.

Job Category : Information Technology

19011097

DirectEmployers