Cyber / Principal Cyber Systems Administrator

Northrop Grumman Orlando , FL 32801

Posted 3 months ago

Working in Northrop Grumman Mission Systems means making a direct contribution to mission projects that keep our homeland safe, expanding the boundaries of possibility, and reshaping the world we live in. If you're looking for challenging work experiences with a bigger purpose and desire to learn in a collaborative environment, we invite you to look for the next step in your career at Northrop Grumman.

Northrop Grumman Mission Systems is seeking qualified Cyber Systems Administrators for an established Situational Awareness and Mission Readiness (SAMR) program that provides secure DoD communications around the world. The position may require travel to Mobility Air Force (MAF) sites both CONUS and OCONUS. The position is located in Orlando, FL.

Day to day operations will require the administrator to resolve systems hardware and software problems in a timely and accurate fashion.


  • Implementing and managing system administration and design (e.g. integrating virtual servers and active directory)

  • Troubleshooting malfunctions, diagnosing failures, determining root cause, developing fix actions, and executing defense-in-depth methodologies

  • Ensuring system security requirements are established and maintained from test and evaluation through operations

  • Recommending courses of action during risk assessment, incident response, disaster recovery, and business continuity planning

  • Maintaining and working with other teams to maintain/upgrade labs and various other MAF networks

The ideal candidate should be comfortable interacting with other cyber functional areas, internal company management and executives. They should also have a broad knowledge of IT systems, the impacts of system hardening on those systems, and experience diagnosing and resolving issues caused by system hardening.

This position may be filled at a higher grade based on the qualifications below.


This requisition may be filled at either the Cyber Systems Administrator or the Principal Cyber Systems Administrator level

Education/Experience for the Cyber Systems Administrator: 3 Years with Bachelors; 1 Year with Masters / 4 additional years of experience may be substituted for degree requirement

Education/Experience for the Principal Cyber Systems Administrator: 6 Years with Bachelors; 4 Year with Masters / 4 additional years of experience may be substituted for degree requirement

Basic Qualifications for Both Levels:

  • Meet DoD 8570 certification requirements (e.g., Security certification, CISSP) OR ability to obtain one within 6 months

  • US Citizenship is required and must have current DoD Secret security clearance.

  • Strong troubleshooting skills.

  • Develop and update internal documentation for projects and system administrative functions (e.g. procedures, process methodology, and workflow)

  • Install, update/patch, and maintain software, operating systems, BIOS, firmware and other components.

  • Demonstrated experience with Windows Deployment Services, Active Directory and Group Policy Management.

  • Demonstrated experience configuring, installing, and supporting infrastructure critical devices such as file servers, domain controllers, active directories, databases, program gateway servers, firewalls, proxy, etc.

  • Demonstrates experience with administering and maintaining operating systems (e.g. Windows, ESXi, RedHat)

  • Demonstrates experience with patch management solutions (e.g. KACE, Windows Server Update Services, System Center Configuration Manager)

  • Manage baseline configurations to support multiple computing device configurations and support recovery.

  • Provide support to internal ISSO/ISSM RMF support.

  • Knowledge of application transport and network infrastructure protocols.

  • Research, justify, and plan hardware and software modernization and refurbishments.

  • Up to 25% of Travel

Preferred Qualifications for Both Levels:

  • Scripting experience

  • Demonstrated knowledge of virtualization at network and server level (e.g. Microsoft Hyper-V, VMWare ESXi/VSphere)

  • Demonstrated experience with McAfee ePolicy Orchestrator

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit U.S. Citizenship is required for most positions.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
AntiTamper Cyber Systems Security/Embedded Systems Design Engineer Orlando FL

Lockheed Martin Corporation

Posted Today

VIEW JOBS 10/18/2019 12:00:00 AM 2020-01-16T00:00 Description:Lockheed Martin is seeking an experienced Anti-Tamper (AT) System Security Engineer to join our team in Orlando, FL to design, implement, deploy, and maintain state of the art security architectures and countermeasures to protect and enable innovative new Lockheed Martin products. Key responsibilities for this role include: Assess program critical technologies to ascertain required level of protection and protection approach. Perform System functionality definition including system states and modes, and anti-tamper and/or cyber security design features. AT Subsystem design, to include requirements development, trade studies, implementation and maturation of AT features Develop model-based Systems Engineering diagrams and timing assessments to characterize system behavior for applicable use cases. Define Anti-Tamper capabilities related to such areas as secure software boot, crypto key handling, active sensing and system responses. Generate/maintain Program Protection Implementation Plans and other relevant artifacts. Communicate / coordinate with program leadership personnel, external customers and independent government review team personnel. Define procedures for Development and Production environments and create handling / operations plans specific to Program Protection implementation. Participate in internal and external working groups, technical interchange meetings and program milestone reviews. Support AT proposal activities as necessary, to include development of Basis of Estimate (BOE) or Rough Order of Magnitude (ROM) cost estimates. Provide status and analysis for Integrated Master Schedules (IMS) for Anti-Tamper (AT) programs and/or IRAD efforts in enough detail to monitor progress and identify performance issues in a timely manner. Communicate schedule impacts and propose corrective actions to applicable stakeholders. Develop recovery plans to ensure program milestones are completed in accordance with the contract requirements and LM MFC financial plans. Participate in component and technology assessments. Selected candidate must currently hold an active Secret clearance with a background investigation within the last 5 years. Basic Qualifications: Bachelor of Science, or higher, in one of the following areas: Computer Science, Software Engineering, Electrical Engineering or Computer Engineering. Experience with Open System Architecture design and partitioning. Demonstrate the ability to enhance rule sets to detect or block sources of malicious traffic; and establish a protective net of layered defenses to prevent, detect, and eradicate threats. Prior real-time embedded system design experience. Familiarity with the DoD system development lifecycle. Experience delivering written and oral presentations to program personnel and customers. Must currently hold an active Secret clearance with a background investigation within the last 5 years. Desired Skills: Familiarity with, and design experience throughout the DoD systems lifecycle Familiarity with missile and/or aircraft fire control system interfaces, design, and operation. Systems Engineering experience with Open System Architecture design and partitioning. Prior embedded system design experience. Previous experience in the fields of Cybersecurity and/or Anti-Tamper, including system design and/or vulnerability assessment Good understanding of security protocol design and analysis, firmware and embedded OS design principles Understanding of NSA-approved cryptographic standards and methods. Knowledge of cryptographic solutions, to include secure boot implementations, cryptographic key management, and/or secure processing. Experience with program protection proposal efforts, to include development of Rough Order of Magnitude (ROM) estimates and/or Basis of Estimate (BOE) Knowledge of DOORS and requirements development / flow down Experience with Model Based Systems Engineering (MBSE) tools (e.g., Rational Rhapsody, Enterprise Architect), DODAF views, development of MBSE diagrams Knowledge of AT- and Cyber-related governance, e.g., RMF, LO/CLO Lockheed Martin Corporation Orlando FL

Cyber / Principal Cyber Systems Administrator

Northrop Grumman