Principal or Sr. Principal Cyber Protection Engineers (Cleared)

Requisition ID: 20021838

  • Category IconCategory: Information Technology
  • Location IconLocation: Salt Lake City
  • Citizenship IconUS Citizenship Required for this Position: Yes
  • Clearance IconClearance Type: Secret
  • Telecommute IconTelecommute: Yes –May Consider Occasional/Part Time Teleworking for this position
  • Shift IconShift: 1st Shift
  • Travel IconTravel Required: Yes, 25 % of the Time
  • Positions IconPositions Available: 2

Discover careers that change the world and further advancements in defense, technology, and engineering today at Northrop Grumman. Use your experience to grow your career and support our global customers with the technology, systems, and solutions they need to enable their missions on the front lines and secure our world every day. With Northrop Grumman, you’ll discover a culture built on diversity, respect, and above all teamwork. Together with our group of experts across the technical spectrum, you’ll discover opportunities to make a difference in our world and start solving some of the world’s most critical problems in the most innovative ways.
We are looking for multiple Principal OR Sr. Principal Cyber Protection Engineers for our Defense Systems sector. The qualified applicants will become part of the Aerospace Cyber Effects (ACE) Group. These positions can be located in Salt Lake City, UT or Ogden, UT.  
As a member of the ACE Group, you will develop, deliver, and mitigate non-kinetic/cyber weapons targeting Weapons Systems.

Your duties will be to:
  • Research and identify vulnerabilities on avionics and embedded systems
  • Perform vulnerability analysis of applications, operating systems, or weapons systems.
  • Evaluate system security configurations
  • Reverse engineer and perform analysis of complex software and systems to determine functionality, intent, and vulnerabilities of software systems
  • Develop cyber exploits for avionics and embedded systems
  • Conduct penetration tests on avionics and embedded systems
  • Contribute to the design, development, implementation, and integration of Offensive Cyber Operations tools on weapons systems
  • Contribute to the design, development, implementation, and integration of Defensive Cyber countermeasures on weapons systems
  • Contribute to the preparation of technical reports and briefings
In this role, you will apply your extensive technical expertise, knowledge in many related disciplines, and creativity to develop solutions to some of the most challenging operational problems the US Government has. You will work independently and will be given considerable latitude in determining the correct path to accomplish the operational objectives of the customer. You will represent the organization and support the team lead on technical matters. 


"This position is contingent upon contract award AND  may be filled at a higher grade based on qualifications listed below.”

“This requisition may be filled at either a Principal Cyber Protection Engineer OR Sr. Principal Cyber Protection Engineer level."
Basic Qualifications Principal Cyber Protection Engineer:  
  • Bachelors degree and a minimum of 5 years applicable work experience.  May substitute an additional 4 years of related work experience in lieu of degree.
  • Experience conducting penetration testing or vulnerability research
  • Demonstrated excellent judgement and interpersonal skills
  • Ability to demonstrate excellent organizational skills
  • Demonstrated ability to communicate effectively and clearly present technical approaches and findings
  • Must possess an active final Secret clearance granted within 4 years of the last investigation and have the ability to obtain/maintain access to a Special Access Program (SAP).  US Citizenship required.
      Preferred Qualifications: 
  • Experience with United States Military Operations or Intelligence Operations
  • Experience developing or contributing to Cyber Test Plans
  • Experience conducting penetration testing avionics and embedded systems
  • Experience identifying and developing exploits for avionics and embedded systems
  • Experience developing or implementing Radio Frequency waveforms using Software Defined Radios
  • Experience extracting software or firmware from embedded systems
  • Experience identifying vulnerabilities in source code
  • Experience working in one or more low level assembly language
  • Experience with one or more of Reverse Engineering or debugging tools
  • Demonstrated ability to identify and develop exploits for systems, e.g. Bug Bounty awards, CVEs, or winning organized Capture-the-Flag competitions
  • One or more of the following certifications:
Offensive Security Certified Professional (OSCP)
Offensive Security Certified Expert (OSCE)
Offensive Security Certified Exploitation Expert (OSEE) 
Basic Qualifications Sr. Principal Cyber Protection Engineer:  
  • Bachelors degree and a minimum of 9 years applicable work experience.  May substitute an additional 4 years of related work experience in lieu of degree.
  • Experience conducting penetration testing or vulnerability research
  • Demonstrated excellent judgement and interpersonal skills
  • Ability to demonstrate excellent organizational skills
  • Demonstrated ability to communicate effectively and clearly present technical approaches and findings
  • Must possess an active final Secret clearance granted within 4 years of the last investigation and have the ability to obtain/maintain access to a Special Access Program (SAP).  US Citizenship required.
      Preferred Qualifications: 
  • Experience with United States Military Operations or Intelligence Operations
  • Experience developing or contributing to Cyber Test Plans
  • Experience conducting penetration testing avionics and embedded systems
  • Experience identifying and developing exploits for avionics and embedded systems
  • Experience developing or implementing Radio Frequency waveforms using Software Defined Radios
  • Experience extracting software or firmware from embedded systems
  • Experience identifying vulnerabilities in source code
  • Experience working in one or more low level assembly language
  • Experience with one or more of Reverse Engineering or debugging tools
  • Demonstrated ability to identify and develop exploits for systems, e.g. Bug Bounty awards, CVEs, or winning organized Capture-the-Flag competitions
  • One or more of the following certifications:
Offensive Security Certified Professional (OSCP)
Offensive Security Certified Expert (OSCE)
Offensive Security Certified Exploitation Expert (OSEE)  Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions. 

Apply Now
Apply Now

What's great about
Northrop Grumman

  1. Be part of a culture that thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work.
  2. Use your skills to build and deliver innovative tech solutions that protect the world and shape a better future.
  3. Enjoy benefits like work-life balance, education assistance and paid time off.


Did you know?

We offer an array of benefits to give you the support you need, including matching 401K, tuition assistance, health insurance and wellness options, coaching, mentoring and more.