GSSC Cyber Systems Engineer level 2/3

Northrop Grumman
Full_time$85k-157k/year (USD)United States

📍 Job Overview

  • Job Title: GSSC Cyber Systems Engineer (Level 2/3)
  • Company: Northrop Grumman
  • Location: Roy, UT, USA
  • Job Type: Full-Time
  • Category: Cybersecurity & Information Assurance
  • Date Posted: June 11, 2025
  • Experience Level: 2-5 years
  • Remote Status: On-site

🚀 Role Summary

  • Key Responsibilities: Perform assessments of weapon system components and networks, establish program control processes, document assessment results, and support certification and accreditation.
  • Key Skills: Cybersecurity, Risk Management Framework, Vulnerability Assessments, Compliance Audits, Documentation, Analytical Skills, Information Assurance, Team Collaboration, Technical Writing, Security Certification, Policy Development, Auditing, Configuration Control, Emerging Technology Research, Software Research, Hardware Introduction.

📝 Enhancement Note: This role focuses on assessing and securing weapon systems, requiring strong technical skills and a deep understanding of cybersecurity principles and processes.

💻 Primary Responsibilities

  • Assessment & Authorization: Perform assessments of weapon system components and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Conduct passive evaluations such as compliance audits and active evaluations such as vulnerability assessments.
  • Program Control Processes: Establish strict program control processes to ensure mitigation of risks and support obtaining certification and accreditation of systems. This includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits.
  • Documentation & Reporting: Document the results of Assessment and Authorization activities and technical or coordination activity. Prepare system Security Plans and update the Plan of Actions and Milestones (POA&M).
  • Risk Management & Compliance: Apply analytical and evaluative methods and techniques to issues or studies concerning the efficiency and effectiveness of Cyber Security implementation. Ensure compliance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, CNSSI 1253, and DoD RMF Knowledge Service guidance.
  • Policy & System Documentation: Develop system and policy documentation required for certification evaluation.
  • Other ISSM Duties: Perform other ISSM duties as necessary, applying scientific, engineering, and information assurance principles to deliver trustworthy systems that satisfy stakeholder requirements within their established risk tolerance.

🎓 Skills & Qualifications

Education: Bachelor's degree with relevant experience or equivalent experience in lieu of a degree.

Experience: 2-5 years of experience in cybersecurity, information assurance, or a related field.

Required Skills:

  • Strong analytical and evaluative skills
  • Excellent verbal and written communication skills
  • Ability to prioritize and execute tasks in a collaborative team environment within schedules and timelines
  • Working knowledge of auditing, vulnerability scanning/remediation, DISA STIGs, configuration/change control, and implementation of Risk Management Framework
  • Current DoD 8570 IAM Level II Certification (e.g., CAP, CISSP)

Preferred Skills:

  • Information Systems Security Officer/Manager experience
  • ICBM Experience
  • Current DoD Top Secret security clearance

📝 Enhancement Note: While a Bachelor's degree is required, relevant experience can be considered in lieu of a degree. Preferred skills indicate a strong focus on experience and certifications in the cybersecurity field.

📊 Web Portfolio & Project Requirements

Portfolio Essentials:

  • Demonstrate experience in assessing and securing weapon systems, with a focus on vulnerability assessments, compliance audits, and risk management.
  • Showcase strong analytical and evaluative skills through case studies or project examples.
  • Highlight technical writing skills through documentation samples, such as system security plans or plans of action and milestones.

Technical Documentation:

  • Provide examples of security documentation, including system security plans, plans of action and milestones, and vulnerability assessment reports.
  • Demonstrate understanding of NIST SP 800-53, CNSSI 1253, and DoD RMF Knowledge Service guidance through relevant project examples.

📝 Enhancement Note: As this role focuses on assessment and authorization, portfolio examples should emphasize risk management, compliance, and security documentation.

💵 Compensation & Benefits

Salary Range: $85,000 - $157,200 USD per year

Benefits:

  • Health Insurance Coverage
  • Life Insurance
  • Disability Insurance
  • Savings Plan
  • Company Paid Holidays
  • Paid Time Off (PTO) for vacation and/or personal business

Working Hours: 40 hours per week, with the possibility of overtime based on business needs.

📝 Enhancement Note: The salary range provided is a general guideline and may vary based on factors such as the candidate's experience, education, and current market conditions. Benefits include health insurance, life and disability insurance, savings plan, company-paid holidays, and paid time off.

🎯 Team & Company Context

🏢 Company Culture

Industry: Northrop Grumman operates in the defense and security industry, focusing on developing and delivering advanced technology solutions for government and commercial customers worldwide.

Company Size: Northrop Grumman is a large, global corporation with over 90,000 employees, providing a diverse and collaborative work environment.

Founded: Northrop Grumman was founded in 1939, with a rich history of technological innovation and groundbreaking achievements in aerospace and defense.

Team Structure:

  • The GSSC Cyber Systems Engineer role is part of the Codes team, focusing on assessing and securing weapon systems.
  • The team works collaboratively, with a focus on cross-functional integration between developers, engineers, and stakeholders.
  • The team structure is hierarchical, with clear reporting relationships and lines of authority.

Development Methodology:

  • Northrop Grumman follows Agile methodologies for software development, with a focus on iterative development, continuous improvement, and customer collaboration.
  • The company emphasizes code review, testing, and quality assurance practices to ensure the delivery of high-quality, secure, and reliable systems.
  • Deployment strategies include CI/CD pipelines and automated deployment processes to streamline software delivery and reduce manual intervention.

Company Website: Northrop Grumman

📝 Enhancement Note: Northrop Grumman's size and global presence provide ample opportunities for career growth and development within the cybersecurity field.

📈 Career & Growth Analysis

Web Technology Career Level: This role is at the intermediate to senior level within the cybersecurity field, focusing on assessment, authorization, and risk management for weapon systems.

Reporting Structure: The GSSC Cyber Systems Engineer reports directly to the ISSM (Information Systems Security Manager) or a similar role within the organization, with a matrixed reporting structure to other functional areas as needed.

Technical Impact: The role has a significant technical impact on the security and compliance of weapon systems, ensuring that they meet the required standards and regulations for operation.

Growth Opportunities:

  • Technical Growth: Pursue advanced certifications (e.g., CISSP, CISM, or other relevant certifications) to enhance technical skills and knowledge in the cybersecurity field.
  • Leadership Development: Seek mentorship opportunities and leadership roles within the team to develop management and communication skills.
  • Architecture Decision-Making: Contribute to strategic decision-making processes related to system architecture, security, and compliance.

📝 Enhancement Note: Northrop Grumman's large and diverse organization offers numerous opportunities for career growth and development within the cybersecurity field.

🌐 Work Environment

Office Type: Northrop Grumman operates in a professional office environment, with a focus on collaboration, innovation, and continuous learning.

Office Location(s): The role is based in Roy, UT, with the possibility of remote work or travel up to 10% of the time.

Workspace Context:

  • Collaborative Environment: The workspace encourages collaboration and knowledge sharing between team members, with a focus on cross-functional integration and communication.
  • Development Tools: Northrop Grumman provides the necessary tools and resources for employees to perform their jobs effectively, including access to relevant software, hardware, and documentation.
  • Team Interaction: The work environment fosters interaction and collaboration between team members, with a focus on open communication and active listening.

Work Schedule: The work schedule is typically Monday through Friday, with the possibility of overtime or flexible hours based on project demands and business needs.

📝 Enhancement Note: Northrop Grumman's work environment emphasizes collaboration, innovation, and continuous learning, providing an ideal setting for professionals seeking to grow and develop their careers in the cybersecurity field.

📄 Application & Technical Interview Process

Interview Process:

  1. Phone Screen: A brief phone or video call to assess communication skills, understand the candidate's background, and discuss the role and company.
  2. Technical Assessment: A hands-on assessment or case study to evaluate the candidate's technical skills and problem-solving abilities in the cybersecurity field.
  3. Behavioral Interview: A structured interview focusing on the candidate's experience, accomplishments, and fit within the team and company culture.
  4. Final Interview: A meeting with senior leadership or the hiring manager to discuss the candidate's qualifications, career aspirations, and fit within the organization.

Portfolio Review Tips:

  • Highlight relevant experience in assessing and securing weapon systems, with a focus on vulnerability assessments, compliance audits, and risk management.
  • Provide examples of technical writing and documentation skills, including system security plans, plans of action and milestones, and vulnerability assessment reports.
  • Emphasize strong analytical and evaluative skills through case studies or project examples.

Technical Challenge Preparation:

  • Brush up on knowledge of NIST SP 800-53, CNSSI 1253, and DoD RMF Knowledge Service guidance, as well as relevant cybersecurity principles and best practices.
  • Prepare for hands-on assessments or case studies by reviewing recent vulnerability assessment techniques, tools, and methodologies.
  • Practice explaining complex technical concepts in a clear and concise manner, with a focus on communication and active listening.

ATS Keywords: (Organized by category)

  • Cybersecurity Frameworks: NIST SP 800-53, CNSSI 1253, DoD RMF Knowledge Service, ISO 27001, ISO 27002, COBIT, CIS Top 20, CISQ, NIST Cybersecurity Framework
  • Risk Management: Risk Assessment, Risk Mitigation, Risk Management Framework, Risk Appetite, Risk Tolerance, Risk Register, Risk Matrix
  • Vulnerability Assessment: Vulnerability Scanning, Penetration Testing, Vulnerability Remediation, Vulnerability Management, Vulnerability Assessment Report
  • Compliance & Auditing: Compliance Audit, Security Audit, Vulnerability Assessment, Security Documentation, System Security Plan, Plan of Actions and Milestones (POA&M), Certification and Accreditation (C&A)
  • Cybersecurity Certifications: CISSP, CISM, CAP, CEH, CEI, CCSP, CSSLP, CCNA Security, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH, GCFA, GCIA, GCIH,

Application Requirements

Candidates must have a Bachelor's degree with relevant experience or equivalent experience in lieu of a degree. A Top Secret clearance and U.S. citizenship are required, along with strong communication skills and the ability to work in a team environment.