At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Northrop Grumman Space Systems – Launch and Missile Defense Systems has an exciting career opportunity for a Principal System Administrator – Compliance/Patching System Administrator (25-133) to join our team of qualified, diverse individuals. This position will be located at Colorado Springs, CO and Schriever Space Force Base, CO. Position Overview: The Command and Control, Battle Management, and Communications (C2BMC) program integrates the Missile Defense System. It is a vital operational system that enables the U.S. president, secretary of defense, and combatant commanders at strategic, regional, and operational levels to systematically plan ballistic missile defense operations, to see the battle develop collectively, and to dynamically manage designated networked sensors and weapons systems to achieve global and regional mission objectives. C2BMC supports a layered missile defense capability that enables an optimized response to threats of all ranges in all phases of flight. C2BMC is the force multiplier that globally and regionally networks integrate, synchronizing autonomous sensor and weapon systems and operations to optimize performance. C2BMC is integral to all system ground and flight tests, which verify and exercise all current and future missile defense system capabilities. Essential Functions: This individual will act as the primary group to for testing and applying patches on all main software/application systems on the system including workstation and servers. This team will be supporting the system by interacting continuously with the cyber team compliance team to remediate any vulnerabilities founding during automated or manual cyber scans. As patching can be an impacting activity, a detailed oriented individual is a must for this position. Review systems asset compliance to coordinate a testing strategy for patching found vulnerabilities Administer patching solutions, such as Tanium, WSUS, and YUM Identify and work with components owners to build subset groups for patching testing, prior to wide deployment of enterprise patching Coordinate with system owners for patching specific products/solutions, such as server applications, user workstations, etc. Perform continuous vulnerability patching schedules based on cyber tool scan scoring, based on authorized schedule authorized by appropriate board Notify user base of upcoming patches and any projected impacts from this patching activity, such as reboots and/or new features being introduced. Basic Qualifications: Please note your updated security clearance and IAT/relevant certifications on your resume, if applicable. An active Top Secret clearance is required to start with an eligibility for SCI and SAP 5 years' experience with a bachelor’s degree in engineering, computer science, mathematics or a related field; 3 years' experience with a master’s degree in engineering, computer science, mathematics or a related field; or 9 years' experience in lieu of a degree Experience with patching in an enterprise level system Experience with writing standard operating procedures (SOP) documentation Ability to build documentation to outline a full testing strategy for regression of functionality after patching workstation/servers Preferred Qualifications: Experience with patching solutions such as WSUS, YUM, and Tanium Testing patches using a systematic process to limit impact to user base.
Learn more about this Employer on their Career Site