[Close] 

Cyber Systems Engineer 5

Northrop Grumman Mission Systems is seeking a Cyber Systems Engineer 5 for classified operations, with responsibilities including: designing, installing, configuring, securing, and testing real time data transport and processing solutions in support of classified Department of Defense programs. Engineer will perform as a Product Manager as defined by ITIL, convert customer requirements into test plans, evaluate candidate solutions in a lab environment, and perform Site Lead duties.
This position will be located in Ft Meade, MD.
This position will support large computing systems and state of the art solutions to a wide range of technical problems for classified programs and projects supporting the DoD.
Responsibilities include:
Building and managing Red Hat Linux and Microsoft Windows computing infrastructure,
Setting up and utilizing lab/VM environments,
Hardening security of large Linux clustered systems,
Designing and troubleshooting data collection for real-time operations,
Recommending appropriate actions to improve performance, monitoring and tuning systems to achieve optimum multiuser performance and load balancing,
Building and maintaining systems in accordance with DoD policies and procedures,
Designing disaster recovery strategies and fail over operations for remote sites,
Maintaining baseline systems in accordance with DoD Certification and Accreditation (C&A) requirements,
Evaluating and hardening systems to strengthen security posture
Converting customer requirements into test plans and evaluating candidate solutions in a lab environment
Providing expert advice to customers and other stakeholders on engineering designs and operational concerns.
Performing site lead duties, including reporting for sub-contractor time submittal, ensure day to day operations are maintained, and provide status updates to on-going projects.
Performing Product Management duties, and demonstrate leadership for a products full life cycle.
Basic Qualifications:
Bachelor's degree in Computer Science (or similar degree) plus fourteen (14) years or more of related experience / 12 Years with Masters; 9 Years with PhD.
Must possess an active Do D SECRET Clearance
Expertise implementing and maintaining Red Hat Linux and Microsoft Windows systems and related software
Expertise with data transport, conversion, and ingest solutions, such as Rsyslog, Intermediate, Flume, Storm, Kafka, and Splunk Forwarder
Experience with a wide variety of cyber security tools such as Arcsight SIEM, Nessus, Splunk, Retina, Sourcefire, HBSS, Noesis, Wireshark, and full-packet capture solutions.
Security or CISSP certification required.
Strong communication skills, interpersonal skills, and ability to work closely with remote teams.
Strong ability to lead team members, provide customer direct customer support, and team building skills.
Preferred Qualifications:
Prefer knowledge and experience with DoD STIGs, VMS, and DoD FSO operational standards
Prefer knowledge of data analytics, big data and data mining techniques in DoD environment
Prefer knowledge in Graph Analytics, data enrichment, and data correlation.
Prefer knowledge of Cyber analyst tools and workflows
Prefer Red Hat Linux Certification or Microsoft Windows Server Certification
Prefer knowledge with Linux clustering and Open MPI
Prefer knowledge of Hadoop, Kafka, Accumulo, and Hive
Active DoD TS/SCI Clearance
Expertise with networking concepts and experience with setting up Juniper network equipment, F5 load balancers, and MPLS VPN tunnels
Expertise engineering and testing solutions in a VM/lab environment
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.

. Apply now!

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.