Sr. Principal Cyber Protection Engineer
San Diego, CA, USA | Northrop Grumman
Job Description:79 people have viewed this job
We are looking for multiple Senior Principal Cyber Protection Engineers for our Defense Systems sector.The qualified applicants will become part of the Aerospace Cyber Effects (ACE) Group.These positions can be located in San Diego CA, Los Angeles CA, San Francisco CA, or Virtual / telework with regular travel (approximately 30%) to a local Northrop Grumman facility and customer locations.
As a member of the ACE Group, you will develop, deliver, and mitigate non-kinetic/cyber weapons targeting Weapons Systems.
Your duties will be to:
Research and identify vulnerabilities on avionics and embedded systems
Perform vulnerability analysis of applications, operating systems, or weapons systems.
Evaluate system security configurations
Reverse engineer and perform analysis of complex software and systems to determine functionality, intent, and vulnerabilities of software systems
Develop cyber exploits for avionics and embedded systems
Conduct penetration tests on avionics and embedded systems
Contribute to the design, development, implementation, and integration of Offensive Cyber Operations tools on weapons systems
Contribute to the design, development, implementation, and integration of Defensive Cyber countermeasures on weapons systems
Prepare and present technical reports and briefings
Coordinate and schedule activities with key stakeholders
In this role, you will apply your extensive technical expertise, knowledge in many related disciplines, and creativity to develop solutions to some of the most challenging operational problems the US Government has. You will work independently and will be given considerable latitude in determining the correct path to accomplish the operational objectives of the customer.You will represent the organization as a prime technical contact and interact with senior customer personnel on significant technical matters.
Bachelors degree and a minimum of 9 years work experience -OR- a Masters and a minimum of 7 years of work experience.May substitute an additional 4 years of related work experience in lieu of degree.
Experience conducting penetration testing
Experience conducting vulnerability research
Demonstrated excellent judgement and interpersonal skills
Ability to demonstrate excellent organizational skills
Ability to communicate effectively and clearly present technical approaches and findings
Must possess an active final Secret clearance granted within 4 years of the last investigation and have the ability to
obtain/maintain access to a Special Access Program (SAP). US Citizenship required.
Experience with United States Military Operations or Intelligence Operations
Experience developing or contributing to Cyber Test Plans
Experience conducting penetration testing avionics and embedded systems
Experience identifying and developing exploits for avionics and embedded systems
Experience developing or implementing Radio Frequency waveforms using Software Defined Radios
Experience extracting software or firmware from embedded systems
Experience identifying vulnerabilities in one or more of the following software languages:
Experience working in two or more low level assembly languages
Experience with one or more of Reverse Engineering or debugging tools
Demonstrated ability to identify and develop exploits for systems, e.g. Bug Bounty awards, CVEs, or winning organized Capture-the-Flag competitions
One or more of the following certifications:
Offensive Security Certified Professional (OSCP)
Offensive Security Certified Expert (OSCE)
Offensive Security Certified Exploitation Expert (OSEE)
Already a member? Sign In