
Senior Cybersecurity Analyst
American Rheinmetall, Auburn Hills, MI, United States
American Rheinmetall is a leader in the design, development, and production of advanced tracked and wheeled vehicles, vehicle systems, and critical components that support U.S. military modernization. Our expertise spans electronic and mechanical systems, fabricated structures, armored products, rubber solutions, and track systems, delivering reliable innovation to both defense and commercial markets. As part of the global Rheinmetall family, we combine proven heritage with forward-looking technology to provide solutions that defend and feed the world.
Job Summary Responsible for the cybersecurity vulnerability assessment, architecture, design, development and integration of complex military combat vehicle hardware and software-based systems.
Essential Functions
Working knowledge of the Risk Management Framework (RMF)
Develop and conduct vulnerability assessments
Assist in the development of vehicle cybersecurity architecture
Research, analyze and execute solution strategies to meet customer requirements
Integration of military lethality, survivability, and C5ISR systems
Assist with the architecting of solutions using design tools
Support prototype development and test
Support system integration lab development
Perform analytical analysis and simulations to evaluate system performance
Support proposal activities
Interact with external customers and suppliers
Component/Vehicle test support
Monitor/analyze test results
Troubleshoot issues and perform corrective action
Project Management
Assist with maintaining project open issues lists
Assist in the preparation/presentation of project status
Support concurrent engineering, SIL/HIL integration, procurement and prototype build/integration activities by providing technical assistance
Willing and able to travel internationally for technology transfer
Knowledge of Systems based design and related Standards/Processes
Compose and review CDRLs for submission to the customers
Supervisory Responsibilities None
Minimum Qualifications
Capable of holding a U.S. Government Security Clearance
Familiarity with Cyber Survivability Endorsement Implementation Guide V2.0
Familiarity with DoD Risk Management Framework (RMF)
Familiarity with Docker, CI/CD pipeline management/configuration
Applied working knowledge of methods and procedures that protect data and information systems by ensuring their integrity, and availability, including securing software downloads
Applied working knowledge of methods and procedures that ensure secured software code developments
Applied working knowledge of applying tools, policies, techniques and security enabled systems used in the collection, processing, preservation, analysis, and presentation of computer‑related evidence in support of system vulnerability mitigation, handling incidents and performing counterintelligence investigations
Applied working knowledge of cryptographic processes
Ability to analyze, reason, problem solve, plan, and organize to make inferences or draw conclusions that enable sound decision‑making in their work
Ability to execute the collection of cybersecurity information to develop intelligence using appropriate strategies and within the priorities established through the collection management process
Ability to present technical solutions to clients and internal stakeholders
Practical “hands on” attitude with the ability to operate independently
Must be able to communicate effectively in a variety of settings and be able to assimilate complex instructions easily. Ability to communicate with all levels of management and staff to establish productive relationships. Must possess the ability to explain complex concepts in a way that makes sense to someone less knowledgeable about the topic.
Must demonstrate an enthusiasm to engage with and support overseas colleagues to ensure all staff have the information and opportunity to perform to the best of their abilities
Must promote collaboration and facilitate teamwork across the organization and its external service providers. Must be tactful, diplomatic, and work with integrity, honesty, and respect for others.
Must display exceptional listening and analytical skills in order to understand customer concerns and needs with the ability to respond promptly and effectively to those needs.
Self‑motivated, with the ability to multi‑task; balancing “analysis” with “doing”. Must be adaptable and able to prioritize and work under pressure to meet deadlines.
Education & Experience
Cybersecurity Certifications desired (i.e., Sec+, CASP, CISSP, etc.)
BS Information Technology, Information Assurance and/or Cyber Security (or like discipline)
Background Prerequisites
Must undergo and meet company standards for background check, employment verification, reference checks and controlled substance testing.
All employment at ARV is contingent upon the ability to obtain and maintain a government security clearance if the position requires it.
Preferred Qualifications
5 years’ experience cybersecurity
Experience with hardware and software standards
Experience with automotive and wireless penetration testing/vulnerability assessments
Experience with standard bus protocols (J1939 CANBus, RS422/485, DMA, 802.3 Ethernet, MIL-STD-1553)
Experience with TCP/IP/UDP, DDS, Multicast, DisplayPort, HDMI, HD-SDI protocols
Experience with Real-Time OS, Linux, Embedded C/C++, Java, Matlab, Labview
Experience with Confluence, Jira, MS Office
Experience with proposal activities, bid capture, contract negotiations and delivery planning
Experience with VICTORY, FACE, GCIA & MOSA standards
Experience with large complex US Defense programs
Working Conditions and Physical Demands With or without reasonable accommodations, requires the physical and mental capacity to perform effectively all essential functions. In addition to other demands, the demands of the job include:
Ability to lift up to 25 pounds occasionally
Ability to stand for long periods
Ability to work overtime as needed
#J-18808-Ljbffr
Job Summary Responsible for the cybersecurity vulnerability assessment, architecture, design, development and integration of complex military combat vehicle hardware and software-based systems.
Essential Functions
Working knowledge of the Risk Management Framework (RMF)
Develop and conduct vulnerability assessments
Assist in the development of vehicle cybersecurity architecture
Research, analyze and execute solution strategies to meet customer requirements
Integration of military lethality, survivability, and C5ISR systems
Assist with the architecting of solutions using design tools
Support prototype development and test
Support system integration lab development
Perform analytical analysis and simulations to evaluate system performance
Support proposal activities
Interact with external customers and suppliers
Component/Vehicle test support
Monitor/analyze test results
Troubleshoot issues and perform corrective action
Project Management
Assist with maintaining project open issues lists
Assist in the preparation/presentation of project status
Support concurrent engineering, SIL/HIL integration, procurement and prototype build/integration activities by providing technical assistance
Willing and able to travel internationally for technology transfer
Knowledge of Systems based design and related Standards/Processes
Compose and review CDRLs for submission to the customers
Supervisory Responsibilities None
Minimum Qualifications
Capable of holding a U.S. Government Security Clearance
Familiarity with Cyber Survivability Endorsement Implementation Guide V2.0
Familiarity with DoD Risk Management Framework (RMF)
Familiarity with Docker, CI/CD pipeline management/configuration
Applied working knowledge of methods and procedures that protect data and information systems by ensuring their integrity, and availability, including securing software downloads
Applied working knowledge of methods and procedures that ensure secured software code developments
Applied working knowledge of applying tools, policies, techniques and security enabled systems used in the collection, processing, preservation, analysis, and presentation of computer‑related evidence in support of system vulnerability mitigation, handling incidents and performing counterintelligence investigations
Applied working knowledge of cryptographic processes
Ability to analyze, reason, problem solve, plan, and organize to make inferences or draw conclusions that enable sound decision‑making in their work
Ability to execute the collection of cybersecurity information to develop intelligence using appropriate strategies and within the priorities established through the collection management process
Ability to present technical solutions to clients and internal stakeholders
Practical “hands on” attitude with the ability to operate independently
Must be able to communicate effectively in a variety of settings and be able to assimilate complex instructions easily. Ability to communicate with all levels of management and staff to establish productive relationships. Must possess the ability to explain complex concepts in a way that makes sense to someone less knowledgeable about the topic.
Must demonstrate an enthusiasm to engage with and support overseas colleagues to ensure all staff have the information and opportunity to perform to the best of their abilities
Must promote collaboration and facilitate teamwork across the organization and its external service providers. Must be tactful, diplomatic, and work with integrity, honesty, and respect for others.
Must display exceptional listening and analytical skills in order to understand customer concerns and needs with the ability to respond promptly and effectively to those needs.
Self‑motivated, with the ability to multi‑task; balancing “analysis” with “doing”. Must be adaptable and able to prioritize and work under pressure to meet deadlines.
Education & Experience
Cybersecurity Certifications desired (i.e., Sec+, CASP, CISSP, etc.)
BS Information Technology, Information Assurance and/or Cyber Security (or like discipline)
Background Prerequisites
Must undergo and meet company standards for background check, employment verification, reference checks and controlled substance testing.
All employment at ARV is contingent upon the ability to obtain and maintain a government security clearance if the position requires it.
Preferred Qualifications
5 years’ experience cybersecurity
Experience with hardware and software standards
Experience with automotive and wireless penetration testing/vulnerability assessments
Experience with standard bus protocols (J1939 CANBus, RS422/485, DMA, 802.3 Ethernet, MIL-STD-1553)
Experience with TCP/IP/UDP, DDS, Multicast, DisplayPort, HDMI, HD-SDI protocols
Experience with Real-Time OS, Linux, Embedded C/C++, Java, Matlab, Labview
Experience with Confluence, Jira, MS Office
Experience with proposal activities, bid capture, contract negotiations and delivery planning
Experience with VICTORY, FACE, GCIA & MOSA standards
Experience with large complex US Defense programs
Working Conditions and Physical Demands With or without reasonable accommodations, requires the physical and mental capacity to perform effectively all essential functions. In addition to other demands, the demands of the job include:
Ability to lift up to 25 pounds occasionally
Ability to stand for long periods
Ability to work overtime as needed
#J-18808-Ljbffr