Career Search
Textron Systems is all in for our exceptional people. Click here for important information pertinent to job applicants.
All search filters below are optional and can be used to narrow down your job search results.
Search Careers
6 job(s) match your search criteria
Who We Are
We are Textron Systems, best known for innovative defense technologies and services. We are a part of Textron Inc, one of the world’s leading multi-industry companies, recognized for its powerful brands such as Bell, Cessna, Beechcraft, E-Z-GO,?Arctic Cat?and many more.?Our company leverages its global network of aircraft, defense, industrial and finance businesses to provide customers with innovative products and services.??
?
But our business is all about people – the customers who rely on us and the exceptional team that brings our mission to life.?
?
We've been in the industry for more than 50 years and embraced the unique capabilities that come with being a mid-sized player. We bring the agility of a small business to meet our customers' most urgent requirements and empower our team members to push past possible. We can scale quickly to solve the big problems, working across functions, sites, and business lines to make it happen. We’re comprised of 7 domains specializing in Air, Sea, Land, Weapons Systems, Electronic Systems, Propulsion, and Testing and Training Simulations.??
?
Start your career in a big way by joining Textron Systems. We are here to provide necessary and life-changing services and products to our customers. We are right where the real work happens. By joining our team, you will gain exciting and versatile experiences from day one to fuel your growth. Talent development is a big part of who we are. Don't just start your career - go big.?
?
Visit TextronSystems.com to read more about who we are and the products we make!?
About This Role
In this role, you will be responsible for:
- Interns will gain exposure to an array of core technical proficiencies to process classified information systems and an overview of security management
- Exposure to information systems, secure databases, government directives and guidance, classified materials, security control functions, and project initiatives
- Equipment clearing and sanitization
- System Establishment, System Audits and Database maintenance
- Security Briefings and Presentations
- Personnel security administration as well as visitor control and badging
- Classified Document Control and destruction of classified material
Who We Are
Textron Systems is part of Textron, a $14 billion, multi-industry company employing 35,000 talented makers, thinkers, creators and doers worldwide. We make things that fly, hover, zoom and launch. Things that move people. Protect soldiers. Power industries. We serve customers in industries spanning aerospace and defense, specialized vehicles, turf care and fuel systems.
This role is in Textron System’s
About This Role
We are seeking a dedicated and detail-oriented Engineering Applications Analyst to join our team. The successful candidate will be responsible for managing access and accounts for various engineering applications, troubleshooting installation and license issues, and interfacing with vendors to resolve problems. Additionally, this role involves managing a helpdesk using Jira, triaging tickets, communicating with users to define their issues, and prioritizing tasks effectively.
Key Responsibilities:
· Manage access and accounts for engineering applications.
· Troubleshoot installation issues and provide solutions.
· Address and resolve license-related issues.
· Interface with vendors to solve complex problems and ensure smooth operation of engineering applications.
Helpdesk Management:
· Triage incoming tickets into appropriate categories and communicate tasking with co-workers
· Communicate with users to fully understand and define their issues.
· Prioritize tasks based on urgency and impact.
· Manage time effectively to ensure timely resolution of issues.
Job Summary:
Provide information systems security support from a managerial and technical standpoint for DoD and Non-DoD classified systems and networks. Standing up and maintaining accreditations for classified systems and networks. Classified Systems & Networks range in complexity and size to include multi-platform computing (Linux, Windows, Solaris, VMWare), virtual environments, and mobile systems. Extensive experience with eMASS, NISPOM Chapter 8, DCSA DAAPM, DISA STIGs. Assemble and maintain security plan accreditation packages per Risk Management Framework (RMF).
ISSO Responsibilities, but are not limited to:
· Provide technical and procedural Information System (IS) Security advice to government and industrial teams.
· Understand, implement, and enforce the security policies and processes that are required by: the NISPOM, DCSA DAAPM, System Security Plans (SSPs), NIST Security Controls.
· Coordinate with PSO or cognizant security official on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
· Oversee any ISSO/ISSE or Security Analysts under their purview to ensure they follow established IS policies and procedures.
· Assume ISSO/ISSE responsibilities in the absence of other ISSO/ISSE; maintain required IA certifications
· Understand, implement, and enforce security policies and processes to maintain the with respect to: Removable Media Creation, Trusted Download, Safeguarding Classified Information, Classified Markings, Wireless Devices, and relevant System Security Plans (SSPs).
· Perform Systems Administration for Linux/Windows operating systems.
· Serve as the lead for Windows/Linux security configurations and interact with Textron Systems and Government Approving Authorities for all inspections of these systems.
· Utilize a variety of accredited security software tools to conduct vulnerability assessments, continuous monitoring scans, and those employed to maintain OS configurations.
· Coordinate IS security inspections, tests, and reviews
· Ensure CM policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the ap
· Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures
· Working experience with High Assurance Internet Protocol Encryptors/TACLANE
· Analyze security audits for non-standard events and media write control logs. Assist in investigations involving anomalies
· Validate systems & networks are patched in accordance with IAVM guidelines for patching and executing Continuous Monitoring activities
· Maintain a working knowledge of Textron Systems security policies and procedures and the requirements of the National Industrial Security Program Operating Manual (NISPOM). Be knowledgeable of and enforce policies in the area of information systems security, including Textron Systems and Government policies related to IT security.
· Maintain and modify accreditation packages. Prior experience with eMASS, XACTA.
· Assist with administrative processes related to User Accounts, Data Transfer Agents (DTA), Media Write Control, and Trusted Downloads (TD).
Note: This job summary and listing of duties is for the purpose of describing the position and its essential functions at time of hire and may change over time.
propriate AO prior to the addition, change or modification
Job Summary:
Provide information systems security support from a managerial and technical standpoint for DoD and Non-DoD classified systems and networks. Standing up and maintaining accreditations for classified systems and networks. Classified Systems & Networks range in complexity and size to include multi-platform computing (Linux, Windows, Solaris, VMWare), virtual environments, and mobile systems. Extensive experience with eMASS, NISPOM Chapter 8, DCSA DAAPM, DISA STIGs. Assemble and maintain security plan accreditation packages per Risk Management Framework (RMF).
ISSO Responsibilities, but are not limited to:
· Provide technical and procedural Information System (IS) Security advice to government and industrial teams.
· Understand, implement, and enforce the security policies and processes that are required by: the NISPOM, DCSA DAAPM, System Security Plans (SSPs), NIST Security Controls.
· Coordinate with PSO or cognizant security official on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
· Oversee any ISSO/ISSE or Security Analysts under their purview to ensure they follow established IS policies and procedures.
· Assume ISSO/ISSE responsibilities in the absence of other ISSO/ISSE; maintain required IA certifications
· Understand, implement, and enforce security policies and processes to maintain the with respect to: Removable Media Creation, Trusted Download, Safeguarding Classified Information, Classified Markings, Wireless Devices, and relevant System Security Plans (SSPs).
· Perform Systems Administration for Linux/Windows operating systems.
· Serve as the lead for Windows/Linux security configurations and interact with Textron Systems and Government Approving Authorities for all inspections of these systems.
· Utilize a variety of accredited security software tools to conduct vulnerability assessments, continuous monitoring scans, and those employed to maintain OS configurations.
· Coordinate IS security inspections, tests, and reviews
· Ensure CM policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification
· Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures
· Working experience with High Assurance Internet Protocol Encryptors/TACLANE
· Analyze security audits for non-standard events and media write control logs. Assist in investigations involving anomalies
· Validate systems & networks are patched in accordance with IAVM guidelines for patching and executing Continuous Monitoring activities
· Maintain a working knowledge of Textron Systems security policies and procedures and the requirements of the National Industrial Security Program Operating Manual (NISPOM). Be knowledgeable of and enforce policies in the area of information systems security, including Textron Systems and Government policies related to IT security.
· Maintain and modify accreditation packages. Prior experience with eMASS, XACTA.
· Assist with administrative processes related to User Accounts, Data Transfer Agents (DTA), Media Write Control, and Trusted Downloads (TD).
Note: This job summary and listing of duties is for the purpose of describing the position and its essential functions at time of hire and may change over time.
Job Summary:
System Administrators collaborate with a diverse team to support classified information systems. Success in this role means you can develop, implement, and maintain secure, cost-efficient environments supporting the warfighters. Program teams rely on your collaboration and guidance to define computing requirements and develop solutions to solve infrastructure problems. Knowledge of Windows and Linux desktop and server operating systems is required. The System Administrator is responsible for information system patching, anti-virus updates and installations, vulnerability management, and user account management. You will work with Cybersecurity professionals, such as ISSM, ISSO to maintain security compliance requirements. This candidate will perform desktop support, resetting passwords, installing, network configuration and troubleshooting, upgrading applications, and respond to incidents that occur on the information systems.
Systems Administrator Responsibilities, but are not limited to:
• The ability to maintain an Active SECRET Clearance.
• 3+ years of Windows and/or Linux System Admin experience, certifications and degree considered in lieu of experience.
• Ability to satisfy Department of Defense Directive (DoD) 8140 / 8570 Certification requirements (Minimum CompTIA Security+ CE or equivalent certification) at time of hire.
• Administer and maintain systems support for software, hardware, and servers: test, troubleshoot, diagnose, and resolve all problems.
• Familiarity with Active Directory
• Provide timely technical support for users and work with them to solve existing problems.
• Working knowledge in support of Microsoft Windows desktops (Windows 10/11)
• Troubleshooting workstation and server issues
• Network administration and configuration
• Vulnerability Management processes and procedures for all information systems, to include discovery and mitigation.
• Develop Detailed Security Design by analyzing design constraints, analyzing trade-offs, generating detailed system and security design, with life-cycle support consideration.
• Self-Starter, close attention to detail, time management skills, and the ability to multitask
• Ability to lift 15 pounds.
• Microsoft Group Policy fundamentals
• System hardening in accordance with government regulations.
• System image creation and disk cloning
• RAID Configuration & Monitoring
• Direct working experience with DFARS, DAAPM, JSIG environments
• Experience with XACTA, eMASS
• Experience with STIG and SCAP tools, and applying STIG Settings
• PowerShell or BAT scripting
• Account Management: Password Resets/Unlocks
Note: This job summary and listing of duties is for the purpose of describing the position and its essential functions at time of hire and may change over time.
About This Role
We believe people should love what they do – in this role, you will be responsible for:
- Performing troubleshooting and failure analysis on product networks and networking components
- Implementing network designs through the configuration of embedded and general purpose computing devices (ie switches, routers, compute hosts, etc)
- Contributing to the efforts of the Cyber Security and Infrastructure Support (CSIS) team to support the assessment and authorization of products in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate (ATO)
- Utilizing vulnerability scan, port scan, compliance, and network analysis tools (e.g. ACAS, Nessus, NMAP, SCC, and Wireshark), and conducting in-depth analysis of the results against Security Technical Implementation Guides (STIGs) and Security Requirement Guides (SRGs)
- Developing remediation and mitigation plans, and creating packages for the implementation of those plans
- Willing and able to occasional travel to other locations in support of cybersecurity test activities and network troubleshooting (less than 10%)
- Working both individually and cohesively on a team with exciting technologies and products in an engineering environment