Program Experience · Northrop Grumman · Strategic Bomber

B-2 Spirit / B-21 Raider

Two generations of America's most sensitive strategic bomber programs. Security operations, classified material management, and SAP access control across both platforms.

First Generation · In Service Since 1997
B-2 Spirit
Strategic Stealth Bomber
Company:Northrop Grumman
Type:Strategic Stealth Bomber
Program Classification:Special Access Program — Details Restricted
Position Held:Cybersecurity Engineer (GRC Focus)
Position Location:Palmdale, California, USA
Next Generation · Program Active
B-21 Raider
Next-Generation Stealth Bomber
Company:Northrop Grumman
Type:Next-Generation Stealth Bomber
Program Classification:Special Access Program — Details Restricted
Position Held:Cybersecurity Engineer (GRC Focus — Support)
Position Location:Palmdale, California, USA
What Was Done

Placeholder. This section will detail the specific security functions performed across both programs — the overlap between B-2 and B-21 security requirements, the transition between programs, and what operating inside two generations of the same platform family teaches you about how classified programs are structured and protected.

No classified details. The focus is on the security discipline, the accountability standards, and what working at this level of sensitivity requires from the people inside it.

Clearance & SAP

DoD Secret clearance. Special Access Program (SAP) access held across both platforms. This section will describe what SAP access means in practice — the additional vetting, the compartmented information protocols, and the accountability obligations that come with it.

Clearance is currently lapsed. Eligible for reinstatement. The infrastructure for reinstatement is in place.

2
Stealth Programs
SAP
Access Level
TS
Clearance Basis
NG
Northrop Grumman
Why It Matters

Placeholder. The B-2 and B-21 are not defense programs in the commercial sense. They are strategic assets with direct implications for nuclear deterrence and global force projection. The security requirements that surround them exist for reasons that are not theoretical.

Working inside these programs provides a baseline understanding of what high-consequence security looks like — not as a concept, but as a daily operational reality. That baseline informs everything else.