Posted today
Secret
Early Career (2+ yrs experience)
$100,000 - $120,000
IT - Security
Huntsville, AL (On-Site/Office)
• Company: Northrop Grumman
• Location: Huntsville, AL
• Duration: long term, ongoing contract – we are a direct sub to the C2BMC program
• Clearance: Secret, will hold TS if you already have it
• Program – C2BMC
"Essential Functions:
• Infrastructure-as-Code (IaC) Support - Assist in writing and updating Ansible playbooks, Packer images, and Python scripts for Windows and Linux hosts. Ensure all code is committed to Git and adheres to basic C2BMC security guidelines
• Automation Pipeline Assistance - Help build CI/CD jobs that provision, harden, and configure C2BMC systems. Add basic automated tests, vulnerability scans, and compliance checks under the guidance of senior engineers
• STIG Baseline Automation - Contribute reusable Ansible roles and simple Python utilities that apply DoD STIGs. Track compliance drift and raise tickets for remediation
• Configuration Management - Maintain inventory files, variable definitions, and secret references (Vault/Azure Key Vault). Verify that deployments remain idempotent
• Tool Evaluation & Documentation - Participate in evaluating new tools, containers, or services. Draft user guides and knowledge transfer notes for the team
• Python-Centric Development - Write clean, well-commented Python scripts for API integration, data parsing, and automation glue logic. Participate in code reviews to improve software quality
• Must have taken Information Technology or software development courses, and/or formal education/certification courses within the Information Technology, DevSecOps, or Software Development disciplines
• Must possess strong communication abilities, along with excellent writing and presentation skills
• Must be able to work independently/solo on large projects at times, and at other times be in a collaborative team environment with other DevSecOps engineers and other program development and deployment teams
Basic Qualifications:
Please list your current security clearance and IAT or relevant certifications on your resume, if applicable.
• A Bachelor’s Degree in Computer Science, Software Engineering, Computer Programming, Information Technology, Mathematics, Physics, or a related field from an accredited university, along with 2 years of experience; or a Master’s degree in a related field with 0 years of relevant work experience; or 6 years of relevant work experience may be considered as an alternative to a degree
• Applicants must have a current, active DoD 8140 certification at IAT Level II or higher (such as Security+ CE, CCNA-Security, CySA+, CND, etc.) at the time of application, which is required to start. The candidate is responsible for maintaining their DoD 8140 certification throughout the entire contract period
• Applicants must have a current, active in-scope DoD-issued Secret security clearance at the time of application, which is required to start
Automation:
1. Ansible – develop/playbooks, basic role creation, inventory management
2. Python – scripting for automation, API calls, data processing
3. Bash/PowerShell – simple scripts
Containers - Build and run Docker/Podman containers; basic familiarity with Kubernetes or OpenShift concepts
CI/CD - Create and maintain simple pipelines in GitLab CI/CD (or Jenkins/Azure DevOps/GitHub Actions) that include linting, unit tests, and security scans
Version Control - Git – commit, push, branch, pull-request workflows; adhere to team branching strategy
IaC Tools - Packer – create OS images; introductory Terraform concepts for resource provisioning
Monitoring - Add basic Prometheus/Grafana or ELK metrics/alerts to automation jobs
Secret Management - Store and retrieve secrets using HashiCorp Vault, Azure Key Vault, or AWS Secrets Manager via scripts
Compliance - Run OpenSCAP or InSpec scans; report results and assist with remediation
Problem Solving - Diagnose simple pipeline or deployment failures; participate in on-call rotation under supervision
Collaboration - Document work in Confluence/Wiki; provide knowledge transfer to peers"
• Location: Huntsville, AL
• Duration: long term, ongoing contract – we are a direct sub to the C2BMC program
• Clearance: Secret, will hold TS if you already have it
• Program – C2BMC
"Essential Functions:
• Infrastructure-as-Code (IaC) Support - Assist in writing and updating Ansible playbooks, Packer images, and Python scripts for Windows and Linux hosts. Ensure all code is committed to Git and adheres to basic C2BMC security guidelines
• Automation Pipeline Assistance - Help build CI/CD jobs that provision, harden, and configure C2BMC systems. Add basic automated tests, vulnerability scans, and compliance checks under the guidance of senior engineers
• STIG Baseline Automation - Contribute reusable Ansible roles and simple Python utilities that apply DoD STIGs. Track compliance drift and raise tickets for remediation
• Configuration Management - Maintain inventory files, variable definitions, and secret references (Vault/Azure Key Vault). Verify that deployments remain idempotent
• Tool Evaluation & Documentation - Participate in evaluating new tools, containers, or services. Draft user guides and knowledge transfer notes for the team
• Python-Centric Development - Write clean, well-commented Python scripts for API integration, data parsing, and automation glue logic. Participate in code reviews to improve software quality
• Must have taken Information Technology or software development courses, and/or formal education/certification courses within the Information Technology, DevSecOps, or Software Development disciplines
• Must possess strong communication abilities, along with excellent writing and presentation skills
• Must be able to work independently/solo on large projects at times, and at other times be in a collaborative team environment with other DevSecOps engineers and other program development and deployment teams
Basic Qualifications:
Please list your current security clearance and IAT or relevant certifications on your resume, if applicable.
• A Bachelor’s Degree in Computer Science, Software Engineering, Computer Programming, Information Technology, Mathematics, Physics, or a related field from an accredited university, along with 2 years of experience; or a Master’s degree in a related field with 0 years of relevant work experience; or 6 years of relevant work experience may be considered as an alternative to a degree
• Applicants must have a current, active DoD 8140 certification at IAT Level II or higher (such as Security+ CE, CCNA-Security, CySA+, CND, etc.) at the time of application, which is required to start. The candidate is responsible for maintaining their DoD 8140 certification throughout the entire contract period
• Applicants must have a current, active in-scope DoD-issued Secret security clearance at the time of application, which is required to start
Automation:
1. Ansible – develop/playbooks, basic role creation, inventory management
2. Python – scripting for automation, API calls, data processing
3. Bash/PowerShell – simple scripts
Containers - Build and run Docker/Podman containers; basic familiarity with Kubernetes or OpenShift concepts
CI/CD - Create and maintain simple pipelines in GitLab CI/CD (or Jenkins/Azure DevOps/GitHub Actions) that include linting, unit tests, and security scans
Version Control - Git – commit, push, branch, pull-request workflows; adhere to team branching strategy
IaC Tools - Packer – create OS images; introductory Terraform concepts for resource provisioning
Monitoring - Add basic Prometheus/Grafana or ELK metrics/alerts to automation jobs
Secret Management - Store and retrieve secrets using HashiCorp Vault, Azure Key Vault, or AWS Secrets Manager via scripts
Compliance - Run OpenSCAP or InSpec scans; report results and assist with remediation
Problem Solving - Diagnose simple pipeline or deployment failures; participate in on-call rotation under supervision
Collaboration - Document work in Confluence/Wiki; provide knowledge transfer to peers"
group id: 10112344
Defining Company Culture