DARC Information Systems Security Officer (ISSO)

B101 AUS - WA - Exmouth, Australia

Northrop Grumman

Northrop Grumman solves the toughest problems in space, aeronautics, defense and cyberspace to meet the ever evolving needs of our customers worldwide. Our 95,000 employees define possible every day using science, technology and engineering to...

View all jobs at Northrop Grumman

Apply now Apply later

AUSTRALIAN CITIZENSHIP REQUIRED FOR THIS POSITION: Yes

RELOCATION ASSISTANCE: No relocation assistance available

CLEARANCE TYPE: AU- Secret (NV1)

TRAVEL: Yes, 10% of the Time

Description

We are Northrop Grumman Australia. Our 800 strong team is leveraging unparalleled global resources to deliver sovereign Defence capability aligned to the Government’s priorities across Aeronautics, Mission Critical Systems, Space and Guided Weapons. As we build our business and our capabilities, we are also developing a reputation as a great place to work. Help us define what is possible for our nation and for your career.

DARC is a global network of three next-generation ground sensors, based in the United States, the United Kingdom, and Australia. Together, they will deliver a unique 24/7 all-weather capability, tracking objects in geosynchronous orbit - a testament to Northrop Grumman’s commitment to enhancing security and safety in deep space on a global scale.

Your Role

The Information Systems Security Officer (ISSO) is responsible for the day-to-day onsite execution of the Systems Security Engineering activities required for the ongoing maintenance and uplift of the cybersecurity posture within the project. This spans systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include:

  • Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk.

  • Conduct asset management including maintaining accurate inventories of all hardware and software configuration items.

  • Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts.
  • Perform vulnerability management, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes.

  • Present cybersecurity solutions to non-technical individuals.

  • Conduct configuration compliance scanning of systems to ensure the devices remain compliant with the nominated standard and don’t deviate from the configuration baseline.

  • Monitor Security Incident and Event Monitoring tools to identify potentially cybersecurity events of interest, including suspicious activity and indicators of compromise.

  • Ensure all cybersecurity incidents are reported expeditiously and handled appropriately in accordance with the Incident Response Plan.

  • Provide support to Authorisation assessments to ensure the system maintains its Authorisation to Operate.

  • Conduct user privilege audits to review personnel privilege levels ensuring the principle of least privilege is consistently applied.

Coordinate and cooperate with project stakeholders to ensure cybersecurity activities are appropriately prioritised and implemented within the scheduled activities.

About You

You will be a strong team player, with the ability to work autonomously or as part of a larger group, and a demonstrated ability to always liaise professionally with both internal and external stakeholders.

Current experience in information security is essential, ideally in a Defence environment  

Qualifications or training in Systems Security Engineering or cybersecurity related field (CISSP or similar) are essential, as is experience with Red Hat Enterprise Linux.

.

What we Offer

Whatever your role, life stage or background, you can shape your career here in your way with highly challenging work, great colleagues and career development, plus a range of flexible benefits and working patterns.

  • Professional Development – further education, leadership development, professional industry memberships and unlimited access to a range of online training
  • Purchased annual leave
  • Salary packaging including novated car leases
  • Generous paid parental leave
  • Volunteer and enhanced Reservist Leave
  • Health & Wellbeing program
  • Employee Assistance Program

We’re building a unique, values-driven and inclusive business. We have exciting plans for the future and everyone has a part to play. What’s Your Possible?

As a Defence security clearance is required for this role, you must be an Australian Citizen. International Traffic in Arms Regulations (ITAR) are applicable, as such your nationality may be a factor in determining your suitability for this role. You will also need to satisfy police checks and employment screening verification.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0

Tags: Aeronautics Audits CISSP Clearance Compliance Governance Incident response Linux Monitoring Red Hat Risk management Security Clearance Vulnerabilities Vulnerability management Vulnerability scans

Perks/benefits: Career development Flex hours Health care Parental leave Team events

Region: Asia/Pacific
Country: Australia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.