Northrop Grumman is seeking a technically‑savvy Vulnerability Management Engineer to design, implement, and operate our vulnerability and exposure management capabilities. The role will focus on reducing real exploit risk by building automation, integrating security signals into engineering workflows, and shifting compliance to audit ready state. This role is 100% virtual/work from home. This could change depending upon business conditions.
What You Will Do
Contribute to the design, implementation, and operation of Northrop Grumman’s vulnerability and exposure management capabilities, with a focus on reducing real exploit risk and maintaining compliance.
Build and enhance automation and workflows that ingest, normalize, and prioritize vulnerability signals across multiple sources.
Develop and improve engineer‑facing dashboards and integrations that help teams understand and act on vulnerability risk.
Work with product and engineering teams to assess vulnerability findings, explain exploitability and impact, and support practical remediation or mitigation approaches.
Help embed vulnerability signals into existing engineering workflows (CI/CD, PRs, backlogs) to improve visibility and adoption.
Support validation of remediation efforts to ensure exposure is meaningfully reduced.
Assist in translating compliance and control requirements into scalable technical implementations.
Support CMMC and other assessments by validating technical evidence and remediation outcomes.
Execute technical projects that improve vulnerability visibility, prioritization, and risk reduction.
Contribute to improving processes, tooling, and automation within the vulnerability management program.
Basic Qualifications:
Must have, at minimum, a Bachelors Degree with 8 years of relevant Cybersecurity experience OR a Masters Degree with 6 years of relevant Cybersecurity experience.
Must have solid technical experience in vulnerability management and application security, with hands‑on exposure to assessing and prioritizing vulnerability findings.
Must have demonstrated ability to build or automate technical workflows using scripting with programming languages. Python preferred.
Must have experience working with application, cloud, or container security in AWS and/or Azure environments.
Must have working knowledge of security controls and compliance frameworks (e.g., NIST, CIS, FedRAMP), with the ability to apply requirements in practical engineering contexts.
Ability to reason about exploitability, exposure, and impact beyond severity scores.
Experience collaborating with engineering teams to support remediation efforts.
Clear communication skills and ability to explain technical risks to varied audiences.
Ability to operate effectively in fast‑paced environments with evolving priorities.
Foundational understanding of how vulnerability management fits within broader security and engineering functions.
Experience with commercial security tooling and ability to interpret tool outputs critically.
Preferred Qualifications:
Experience building custom scripts, automations, or lightweight data pipelines to improve vulnerability visibility or prioritization.
Exposure to highly regulated environments (e.g., DoD, FedRAMP Moderate/High) and participation in technical audit preparation.
Experience integrating vulnerability tooling into CI/CD pipelines or engineering workflows.
Familiarity with cloud security platforms or security data tooling.
Experience using AI‑assisted development tools to accelerate security automation or analysis.

Corsmed

Sysdig

General Motors

BlueCross BlueShield of Tennessee

General Motors Europe

Northrop Grumman

Northrop Grumman

Northrop Grumman