Classified Cyber Security Sr

Lockheed MartinHuntsville, AL
10dOnsite

About The Position

Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training, and education. As a cyber security professional at Lockheed Martin, you’ll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you’ll work alongside other cyber security experts and military members to support their military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you’ll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected. We are looking for an individual to serve as a Information System Security Officer (ISSO). This Mid-Career Information System Security Officer (ISSO) position is responsible for cybersecurity efforts at the Huntsville, AL facility supporting development, maintenance, and oversight of the assigned classified and/or unclassified systems. Lockheed Martin is a Cyber Security pioneer, partner, innovator, and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design, and build solutions to some of the world’s hardest engineering problems. Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at work and home. Learn more about Lockheed Martin’s competitive and comprehensive benefits package. We support our employees, so they can support our mission. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you’re invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications. By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.

Requirements

  • 5 years or more of ISSO or SOC Analyst experience or other Information Assurance discipline
  • Demonstrated experience utilizing Tenable.sc, Trellix ePO, Splunk, and/or other vulnerability management compliance tools
  • Experience hardening Operating Systems to DISA STIG baselines
  • Experience with Information Systems auditing and investigations
  • Possess a valid certification that meets or exceeds DoD 8140 basic foundational requirements for ISSO work role, to include Security+, GSEC, CAP, CASP+, CCISO, CSSP, CISM, CISSP, Cloud+, SSCP, or GSLC
  • Current Secret Clearance

Nice To Haves

  • Attention to detail and adherence to established security policies
  • Excellent verbal and writing skills
  • Experience with system certification, auditing, and continuous monitoring
  • Experience managing and implementing the ATO Lifecyle utilizing eMASS, Xacta, or other technologies
  • Experience with network device configuration (i.e., Cisco, Juniper, etc)
  • Account Management
  • Experience with Agile and DevSecOps concepts and toolsets (e.g. JIRA, Confluence, Docker, Ansible, Git, etc.)
  • Experience with the National Industrial Security Program Operating Manual (NISPOM) and the DCSA Assessment and Authorization Guide (DAAG)
  • Familiarity with Joint Special Access Program (SAP) Implementation Guide (JSIG), Committee on National Security Systems Instruction (CNSSI) 1253, NIST SP 800-37 Risk Management Framework (RMF), and/or NIST SP 800-53 Security and Privacy Controls requirements

Responsibilities

  • Overseeing technical administration of information system in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF) to include Continuous Monitoring, Plan of Action and Milestones (POA&M), and Change Management.
  • Maintaining the site’s cybersecurity program for assigned systems.
  • Ensuring all applicable cybersecurity policy, plans and procedures are followed.
  • Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions and auditing for assigned systems.
  • Developing and maintaining cybersecurity related plans, procedures and guidance.
  • Monitoring and recognizing non-compliance, suspicious and anomalous activity (i.e., threats), and effectively reporting such activity and associated risks to the appropriate parties.
  • Ensuring plans of actions and milestones or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, required corrective actions.
  • Conducting role-based cybersecurity training for assigned users.
  • Creating, collecting and retaining data to meet reporting requirements.
  • Monitoring and correlating data (e.g., logs, events, activity, etc.) from a variety of sources (e.g., Splunk, ePO, ESS, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
  • Investigating, analyzing and responding to cyber events, incidents and non-compliance, to include trend analysis, assembling detailed written reports and briefing the appropriate parties.
  • Ensure configuration management (CM) for security-relevant IS software, hardware, firmware, and system documentation.

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service