Cybersecurity Systems Engineer; Level 5 - R10221573-2
Listed on 2026-02-16
-
Engineering
Cybersecurity, Systems Engineer
RELOCATION ASSISTANCE:
Relocation assistance may be available
CLEARANCE TYPE:
Secret
TRAVEL:
Yes, 10% of the Time
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon.
We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is a trusted provider of mission-enabling solutions for global security. Our Engineering and Sciences (E&S) organization pushes the boundaries of innovation, redefines engineering capabilities, and drives advances in various sciences. Our team is chartered with providing the skills and innovative technologies to develop, design, produce and sustain optimized product lines across the sector while providing a decisive advantage to the warfighter.
Come be a part of our mission!
Northrop Grumman Mission Systems Mission Defense Cyber Team has an opening for a Staff Cybersecurity Systems Engineer (CSSE) supporting the Sentinel program based out of Roy Ut. Other operating locations include Annapolis Junction, MD, San Antonio, TX, Redondo Beach, CA, Huntsville, AL, San Diego, CA, and Colorado Springs, CO.
A Cybersecurity Systems Engineer (CSSE) ensures cyber survivability attributes are implemented in system designs as it assesses/evaluates the customers’/stakeholders’ cybersecurity requirements to decompose, derive, and refine the system’s cybersecurity requirements at all levels to drive the built-in cybersecurity protections to the architecture and design. The CSSE also guides/supports the security layout / architecture and influences the security tools selection and development.
The CSSE evaluates/assesses the proposed and realized implementations to identify security risks, attack surface, and verify the cybersecurity protections from the design are realized and integrated. The CSSE guides/supports the development of verification efforts to ensure the cybersecurity protections / capabilities are functional, effective, and complete. A CSSE supports the definition of security governance, and risk management.
- Author and review requirement decomposition, derivation, and flow down
- Implement and review traceability of requirements throughout a spec tree architecture
- Support the architecture and design of baked in cybersecurity requirements and protections
- Document and review traceability of requirements to the design & its models
- Implement and review the application of cybersecurity profile stereotypes to a Model Based System Engineering (MBSE) Architecture
- Provide cybersecurity system engineering implementation guidance and oversight to technical teams/implementers
- Review and Assess stakeholder security objectives, protection needs and concerns, security requirements, and associated verification/validation methods
- Implement, review and assess cybersecurity system requirements verification/validation methods
- Identify and/or assess vulnerabilities and susceptibility to life cycle disruptions, hazards, and threats
- Provide security considerations to inform systems engineering efforts with the objective to reduce errors, flaws, and weakness that may constitute security vulnerability leading to unacceptable asset loss and consequences
- Identify, quantify, and evaluate the costs/benefits of security functions and considerations to inform analysis of alternatives, engineering trade-offs, and risk treatment decisions
- Author, support and maintain cybersecurity program documentation & RMF package documentation:
Cybersecurity Strategies, System Security Plans, Continuous…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).