Career Search
Career Search
Textron Systems is all in for our exceptional people. Click here for important information pertinent to job applicants.
All search filters below are optional and can be used to narrow down your job search results.
Search Careers
157 job(s) match your search criteria
Who We Are
Textron Systems is part of Textron, a $14 billion, multi-industry company employing 35,000 talented makers, thinkers, creators and doers worldwide. We make things that fly, hover, zoom and launch. Things that move people. Protect soldiers. Power industries. We serve customers in industries spanning aerospace and defense, specialized vehicles, turf care and fuel systems.
This role is in Textron System’s
About This Role
We believe people should love what they do – in this role, you will be responsible for:
Textron Systems is seeking a Windows and Linux System Administrator that will provide IT systems administration. The System Administrator will be responsible for administering systems that contain classified information. Knowledge of Windows or Linux desktop and server operating systems is required. Responsible for information system patching, Antivirus definition updates and installs, and end-user management. Install and configure software applications requested by end users. Work with Cybersecurity professionals to maintain security compliance requirements. Work as a member of a team. Use troubleshooting techniques to resolve technical problems. This candidate will perform desktop support, resetting passwords, installing, and upgrading applications, and respond to incidents that occur on the information systems. Additionally, responsible for monitoring software license expirations.
Job Summary:
As an Associate IT Development Specialist, you will be a member of a team committed to supporting the evolving technology needs of our engineering teams. You will help develop, maintain, and advance the infrastructure of our design-build-deliver pipeline of enterprise applications, integrations, virtualized environments, and custom-built automation scripts.
Whether your desired career path is technical or leadership, Textron Systems is highly diversified with a strong grow-from-within philosophy that offers exceptional opportunities for career growth.
In this role you will:
• Work with engineers to provide information systems solutions tailored to their needs
• Provide operational support for our development infrastructure
• Develop and maintain software and scripts that enhance our capabilities
• Work with and learn a variety of tools, technologies, and techniques
The Senior Cyber Engineer must be a highly motivated, self-driven team player that can perform in a fast-changing business environment. The candidate should possess a natural enthusiasm for cybersecurity, diverse in-depth technical experience, business acumen, and strong customer service skills. The Senior Cyber Engineer is responsible for designing, implementing, and performing procedures and controls necessary to protect the safety and security of information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destruction. The individual will work within the cybersecurity risk management team to support IT projects and initiatives with members of the Information Technology group and business stakeholders. In this cross-functional role, the Senior Cyber Engineer will work with technical managers, system administrators, application owners, software developers, infrastructure, service delivery, and IT leaders to manage technology risks across the enterprise.
The candidate must have experience collaborating with business areas to understand business and IT requirements so that we can deliver cybersecurity solutions to support Textron Systems domestic and international business initiatives. The candidate will need to be resourceful with the ability to interpret complex information and develop solutions to address cybersecurity concerns in a timely manner.
The candidate can choose to work at the following locations:
Hunt Valley, MD
Willmington, MA
Williamsport, PA
New Orleans/Slidell, LA
Sterling, VA
KEY RESPONSIBILITIES
- Use of cybersecurity tools for risk management monitoring purposes.
- Compile reports and complete complex security analyses to identify suspicious activities and take appropriate action.
- Configure monitoring alerts and perform data analyses to identify anomalies and risk mitigation actions.
- Complete vulnerability management analyses to ensure system, application, and database risks are addressed.
- Search for and analyze security technology to reduce risks.
- Research and suggest measures to improve IT-related procedures, operations, processes, and systems, that impact cybersecurity.
- Ensure compliance with various cybersecurity-related regulatory requirements.
- Perform Cybersecurity incident response and remediation activities, including working with Textron enterprise and other business unit cybersecurity teams, as necessary.
- Develop and maintain documentation related to cybersecurity processes, systems, procedures, and events.
- Work with business partners and Infrastructure teams to seek out automation tools to improve the efficiency of workflow processes.
- Provide recommendations to mitigate risks through the appropriate use of technical, procedural, and administrative controls.
Software Configuration Management Analyst
This role is in Air Systems; one of the domains within Textron Systems, although you will support other domains including Sea, Land, Electronic, and Weapon Systems. At Textron Systems, we provide enduring solutions for a complex world. Our employees make a difference as part of a community that is 35,000 strong, of innovative thinkers, doers, and makers. This community is relied on to support the members of the armed forces who protect our country on the front lines. As a Software Configuration Management Analyst at Textron Systems, you will have the opportunity to manage software configurations and drawing creation/change for products that support and deliver critical capabilities to the warfighter. Successful candidates will be eager to guide and support our Customers and our Engineering teams to follow industry-standard configuration management practices as they investigate, design, and integrate new and advanced technologies into our family of products, and thrive in an agile and fast-paced environment. Responsibilities
Qualifications and Experience
|
|
Provide information systems security support from a managerial and technical standpoint for DoD and Non-DoD classified systems and networks. Standing up and maintaining accreditations for classified systems and networks. Classified Systems & Networks range in complexity and size to include multi-platform computing (Linux, Windows, Solaris, VMWare), virtual environments, and mobile systems. Extensive experience with eMASS, NISPOM Chapter 8, DCSA DAAPM, DISA STIGs. Assemble and maintain security plan accreditation packages per Risk Management Framework (RMF).
ISSO Responsibilities, but are not limited to:
- Provide technical and procedural Information System (IS) Security advice to government and industrial teams.
- Understand, implement, and enforce the security policies and processes that are required by: the NISPOM, DCSA DAAPM, System Security Plans (SSPs), NIST Security Controls.
- Coordinate with PSO or cognizant security official on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
- Oversee any ISSO/ISSE or Security Analysts under their purview to ensure they follow established IS policies and procedures.
- Assume ISSO/ISSE responsibilities in the absence of other ISSO/ISSE; maintain required IA certifications
- Understand, implement, and enforce security policies and processes to maintain the with respect to: Removable Media Creation, Trusted Download, Safeguarding Classified Information, Classified Markings, Wireless Devices, and relevant System Security Plans (SSPs).
- Perform Systems Administration for Linux/Windows operating systems.
- Serve as the lead for Windows/Linux security configurations and interact with Textron Systems and Government Approving Authorities for all inspections of these systems.
- Utilize a variety of accredited security software tools to conduct vulnerability assessments, continuous monitoring scans, and those employed to maintain OS configurations.