StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Senior Cyber Security Engineer with Security Clearance

Bell Textron, Inc - Huntsville, AL

Apply Now

Job Description

Description We are pioneers. We were the first to break the sound barrier and design the first functional jetpack. We were aboard NASA''s first lunar mission and brought advanced tiltrotor systems to market. Today, we are defining the future of on-demand mobility. At Bell, we are proud to be an iconic company with superb talent, rapidly creating novel and coveted vertical lift experiences. Senior Cyber Security Engineer: Join the Bell Product Cyber Security (PCS) team and ensure our products are designed, built and maintainable for cyber resiliency and survivability. You will be a part of the PCS team, deployed to Bell product programs, to execute duties that support the products that Bell creates and procures. Make an impact by cross-functional integration of cyber systems and processes throughout the product lifecycle, while staying aligned with customer and regulatory requirements. Duties may include but are not limited to deriving and allocating aircraft architecture design requirements, architectural analysis and design implementation, plus risk assessment and threat modeling. Compliance driven programs require DoDI 8510.01/8500.01 Risk Management Framework (RMF) certification for military platforms, and will include threat management, mitigation, and the implementation of all applicable controls. Serve as SME for various engineering functions and review/validate/remediate the impact all design changes to existing and in-development platforms. A day in the life: Engage in the flight controls or avionics architecture development and influence design from the beginning with cyber security in mind. Conduct analytics of design options, identify risks and mitigation steps. Take ownership of the vulnerability analysis on our state-of-the-art System Integration Labs and aircraft. But more than anything, it''s about being open-minded and inquisitive about what''s possible to bring the most innovative ideas to life. We rise to the challenge, push past obstacles to create new solutions to the hardest problems, and open doors to new experiences few dream possible. Can''t be done? Count us in. From our founding as an aerospace innovator to our current position as a technology company that is redefining flight, we come to work every day to do things differently. Qualifications * Bachelor''s degree is required. * Prefer Electronic Engineer (EE), Electronic Engineering in Technology (EET), Computer Science and/or Cyber Security degree. * Minimum of two years of related experience. Prefer experience in the following: * Product cybersecurity or safety in Aerospace (commercial or military), automotive or embedded systems * Demonstrated ability to work in a collaborative technical environment and negotiate design and cyber security technical trade-offs with Integrated Product Teams (IPTs) and throughout the organization. * Develop and communicate product cyber security requirements and perform residual risk assessments in accordance with Bell''s product cyber security policies and methods. * Model Based System Engineering * Knowledge of military and civilian cyber security aircraft standards, including RTCA DO-326A and DO-356A. * Strong logical, analytical, and communication skills. Desired Skills: * Possess DoD 8570 IAM Level I certification (i.e. Security CE, CAP). * Working knowledge of aircraft systems (avionics, flight controls, mission systems) * Experience with Risk Managed Framework (RMF) and/or Joint Special Access Program (SAP) Implementation Guide (JSIG) requirements. * Experience and/or familiarity with attack trees, tabletops, threat modeling, architectural design analysis, implementing cryptographic solutions, digital signing, software authenticity, root of trust systems, plus threat and vulnerability analysis. * Demonstrated ability to create plans, procedures, and briefing material(s) for program presentations to USG. * Familiarity around Critical Program Information Assessments (CPIA) for identifying Critical Program Information (CPI), Critical Functional Analysis (CFA), and Anti-Tamper. * CJ Don''t miss the chance to join a diverse, inclusive environment where you feel a sense of belonging. As a member of our global workforce, you will collaborate with dedicated, enthusiastic teams where unique experiences, backgrounds and ideas combined with a strong passion for our products take us above and beyond flight EEO Statement Textron is committed to providing Equal Opportunity in Employment, to all applicants and employees regardless of, race, color, religion, gender, age, national origin, military status, veteran status, handicap, physical or mental disability, sexual orientation, gender identity, genetic information or any other characteristic protected by law. This position requires use of information which is subject to the International Traffic in Arms Regulations (ITAR) and/or the Export Administration Regulations (EAR)., Non-U.S. persons selected must meet eligibility requirements for access to export-restricted information. , The ITAR/EAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. ''Green Card Holder''), Political Asylee, or Refugee. Pay Transparency Policy Statement The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise, have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor''s legal duty to furnish information.

Created: 2025-10-04

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.