%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cb style=%22mso-bidi-font-weight:normal;%22%3E%3Ci style=%22mso-bidi-font-style:normal;%22%3E%3Cspan style=%22mso-bidi-font-size:11.0pt;%22%3E%3Cstrong%3E%3Cu%3EWho We Are%3Co:p%3E%3C/o:p%3E%3C/u%3E%3C/strong%3E%3C/span%3E%3C/i%3E%3C/b%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%3Co:p%3E %3C/o:p%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3EWe are Textron Systems, best known for innovative defense technologies and services. We make things that fly, hover, zoom and launch. Things that move people. Protect soldiers. Power industries. We serve customers in industries spanning aerospace and defense, specialized vehicles, turf care and fuel systems. We are a part of Textron Inc, one of the world’s leading multi-industry companies, recognized for its powerful brands such as Bell, Cessna, Beechcraft, E-Z-GO and many more.%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;%22%3E %3C/span%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%3Co:p%3E %3C/o:p%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3EWe%27ve been in the industry for more than 50 years and embraced the unique capabilities that come with being a mid-sized player. We bring the agility of a small business to meet our customers%27 most urgent requirements and empower our team members to push past possible. We can scale quickly to solve the big problems, working across functions, sites, and business lines to make it happen. We’re comprised of 7 domains specializing in Air, Sea, Land, Weapons Systems, Electronic Systems, Propulsion, and Testing and Training Simulations.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%3Co:p%3E %3C/o:p%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3EThis role is in Textron System’s%3Cspan style=%22mso-bidi-font-family:%26quot;Times New Roman%26quot;;mso-bidi-theme-font:minor-bidi;%22%3E%3Cstrong%3E Air Land and Sea %3C/strong%3E%3C/span%3Ebusiness area. Visit %3C/span%3E%3Ca href=%22https://www.textronsystems.com/%22%3E%3Cspan style=%22color:#00B0F0;font-family:%26quot;Aptos%26quot;,sans-serif;%22%3ETextronSystems.com%3C/span%3E%3C/a%3E%3Cspan style=%22color:#00B0F0;font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E %3C/span%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%26amp; %3C/span%3E%3Ca href=%22https://www.howeandhowe.com/%22%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3EHoweandHowe.com%3C/span%3E%3C/a%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E to read more about who we are and the products we make!%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22background-color:white;line-height:normal;margin-bottom:9.0pt;vertical-align:middle;%22%3E%3Cspan style=%22color:black;font-family:%26quot;Aptos%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Ci style=%22mso-bidi-font-style:normal;%22%3E%3Cspan style=%22mso-bidi-font-size:11.0pt;mso-color-alt:windowtext;%22%3E%3Cstrong%3E%3Cu%3EAbout This Role%3C/u%3E%3C/strong%3E%3C/span%3E%3C/i%3E%3C/span%3E%3Cbr%3E%3Cspan style=%22background-color:white;color:black;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EIn this role, you will be responsible for:%3C/span%3E%3C/span%3E%3Cspan style=%22color:black;font-family:%26quot;Arial%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EProviding cybersecurity engineering support on both next generation technologies and proven platforms that support and protect our deployed warfighter across Air, Electronic, Land, Sea, and Weapon Systems products%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EContributing to the efforts of the Cyber Security and Infrastructure Support (CSIS) team to support the assessment and authorization of products in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate (ATO)%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;color:#333333;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EParticipating in cyber security development of new products across all phases of the design lifecycle from concept development to lab integration and evaluation concepts%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EUtilizing vulnerability scan, port scan, and compliance checker tools (e.g., ACAS, Nessus, NMAP, and SCC), and%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EConducting in-depth analysis of the results against Security Technical Implementation Guides (STIGs) and Security Requirement Guides (SRGs)%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EDeveloping remediation and mitigation plans, and creating packages for the implementation of those plans%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EWilling and able to occasional travel to other locations in support of cybersecurity activities (less than 10%)%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22background-color:white;color:black;line-height:normal;margin-bottom:0in;mso-list:l0 level1 lfo1;tab-stops:list .5in;vertical-align:middle;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cspan style=%22mso-ascii-font-family:Calibri;mso-bidi-font-family:Calibri;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-hansi-font-family:Calibri;%22%3EWorking both individually and cohesively on a team with exciting technologies and products in a dynamic engineering environment%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Open Sans%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Aptos%26quot;,sans-serif;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/li%3E%3C/ul%3E
Qualifications
- Currently pursuing or have completed a bachelor’s or master’s degree in Computer Science/Cybersecurity/Information Assurance/Computer Engineering/Information Systems or a related STEM field
- Must be able to obtain/maintain a U.S. government Secret security clearance
- Experience with Operating System configurations (Window and/or Linux), networking, and/or scripting programming languages is preferred
- Ability to obtain a DoDD 8140.01 / DoD 8570.01-M IAT II or higher certification (e.g., Security+, SSCP, CySA+, CCNA Security, or GSEC) in the first six months following employment
- Experience with cybersecurity tools such as Nessus and NMAP is a plus
- Passion for cybersecurity, developing new skills, and problem solving
How We Care
At Textron Systems, our talented people make us successful. We promote an inclusive environment where we value individuality, differences, and unique perspectives.
Our Company is committed to offering employees opportunities to grow and develop. Our benefits and compensation packages are designed to help our talented employees excel and achieve their goals, so they can make a difference every day in and outside of the workplace. Below are just a few examples!
- Flexible Work Schedules
- Education Assistance
- Career Development & Training Opportunities
- Wellness Program (including Fitness Reimbursement)
- Medical, Dental, Vision & 401(K) with Company Funding
- Paid Parental Leave
Are you a Military Veteran?
Textron's products and services are trusted everyday by those who protect our country. We are dedicated to hiring these Veterans and aim to translate their skills to make an impact on our Company.