[Close] 

Computer Security Specialist 3

Company Name:
Northrop Grumman
Northrop Grumman Information Systems sector is hosting an Invitation-Only Hiring Event in McLean, VA during the month of March in support of our client's mission to protect market participants and the public from fraud, manipulation, abusive practices and systemic risk related to derivatives -both futures and swaps - and
to foster transparent, open, competitive and financially sound markets.
This Security Specialist 3 position will be located in
washington
, DC. To be considered for employment, applicants must apply online before midnight EST March 21, 2014. Once your application has been reviewed, if selected, you will receive additional information about the event.
Hiring managers will be on-site to conduct interviews for immediate and future positions located in Washington, DC. Applicants possessing sought-after skills for positions targeted may receive conditional offers of employment! Northrop Grumman encourages all professional applicants interested in a career with
Northrop Grumman to apply online for this event.
Roles and Responsibilities:
o Designs, develops, engineers, and implements solutions to MLS (Multilevel Security) requirements.
o Responsible for the implementation and development of the MLS.
o Gathers and organizes technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the MLS arena.
o Performs risk analyses which also includes risk assessment.
o May provide daily supervision and direction to staff.
o May provide long range planning at the agency level to incorporate anticipated advances in security requirements or risks that could impact the organization's functioning, meet expected contingencies such as expansion of agency staff, or reflect changes in enterprise objectives or mission.
Qualifications:
Basic Qualifications:
Basic Qualifications:
To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
o Must have a Bachelor's degree in Electrical Engineering, Information Science, Information Systems,
computer
Science, Physics, Math, or other related discipline.
o Minimum 5 years experience in defining computer security requirements for high level applications, evaluation of approved security product capabilities, and developing solutions to MLS problems.
o Must be able to obtain a Position of Public Trust Designation
o Relocation assistance is not available for this position.
This position description does not represent a current opening but may be used to identify candidates with skills and experience for positions within Northrop Grumman that frequently become available. Candidates who express an interest may be considered for future positions at Northrop Grumman.
Northrop Grumman Corporation is a leading global security company providing innovative systems, products,and solutions in unmanned systems, cybersecurity, C4ISR, and logistics and modernization to government and commercial customers worldwide.
For a listing of all Northrop Grumman open positions, please visit our website at
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for most positions. For our complete EEO/Diversity statement, please visit .

Connect with our Talent
community
:


Company Description:
Northrop Grumman is a leading global security company providing innovative systems, products and solutions in unmanned systems, cyber, C4ISR, and logistics and modernization to government and commercial customers worldwide. Please more information.
2014 Northrop Grumman is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity/Affirmative Action Employer. U.S. Citizenship is required for most positions. For our complete EEO/Diversity statement, please visit .

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.