Classified Cybersecurity

Lockheed MartinFort Worth, TX
2dOnsite

About The Position

Lockheed Martin is also embarking on a transformational journey – destination the future. Digital Transformation (DT) is Lockheed Martin’s path to the future with its interconnected environment where data becomes information and information drives decisions that create value across the entire lifecycle. This includes how our workforce will operate, as well. To help us along this journey we are is seeking a qualified candidate for the position of Workforce Programs Lead. We’re looking for someone with passion and enthusiasm in leading us on programs to build and enable the future workforce. This position can be summarized in this way. At Lockheed Martin Aeronautics, we're taking innovation to the next level. From designing the most advanced air vehicle to designing aircraft that defies gravity, our engineers live on the cutting edge of technology. But we are not just invested in aircraft; we are also invested in people. We know that our success is a combined effort, and we therefore strive to provide opportunities for employees to learn, grow, and thrive. Never have the opportunities for a technical career been so limitless. Classified Cybersecurity help secure lifesaving products and critical state-of-the-art engineering and manufacturing systems by applying cutting edge cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. The Cybersecurity will partner with the security team, program, and government customers to perform as an Information Systems Security Officer (ISSO) in Fort Worth, Texas. The work that Cybersecurity do can be summarized in this way  You will have a direct impact to national security, ultimately contributing to protecting your loved ones – this is dynamic, gratifying and impactful work!  You will have the opportunity to engage in all aspects of the cyber discipline  You can enjoy a work-life balance that allows for flex hours and a family-first culture You will have an opportunity to make a difference in your first year by:  Developing processes for identifying / communicating vulnerabilities to be remediated - assess current use of cyber tools and whether efficiencies can be made  Delivering security assessments with 100% accuracy - Perform system security validations with 100% accuracy, verifying baselines and security configurations  Maintaining 100% active accreditation status of all Authorization To Operate (ATO) packages  Maintaining above 95% credentialed vulnerability scan rates  Completing 100% Continuous Monitoring (ConMon) objectives for Classified Information Systems  Effectively communicating with leadership to ensure awareness of progress of deliverables

Requirements

  • Clearance required
  • DoD 8570 IAT Level II certification or higher
  • Experience with IS auditing and investigations
  • Knowledgeable of operating system security requirements
  • Hands-on experience with industry-standard Information Assurance tools
  • Experience with developing, reviewing and maintaining RMF artifacts

Nice To Haves

  • Demonstrated technical experience in Windows and Linux based operating systems and command line
  • In-depth experience in system hardening, analysis, and vulnerability management
  • Previous experience working with system accreditation requirements and NIST 800-53 (DAAPM/JSIG) RMF implementation
  • Experience implementing complex technologies within large environments, possessing strong technical skills
  • Understand Agile operations while possessing sound business acumen
  • Experience setting up or using Tenable Nessus / Security Center
  • Experience setting up or using Splunk
  • Experience with scripting languages
  • Experience implementing or validating Secure Technical Implementation Guidance (STIGs)
  • Bachelor’s degree in a relevant discipline and 5 years of relevant work experience or a master’s degree and 3 years of relevant work experience
  • Active Directory

Responsibilities

  • Oversee day-to-day information system security operations including hardware and software implementations.
  • Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF).
  • Upkeep, monitor, analyze, and respond to network and security events.
  • Document compliance actions within the approved automated compliance tracking system or develop a plan of actions and milestones (POA&M) with the Information Systems Security Manager (ISSM) to address non-compliance in the allotted time frame.
  • Ensure systems are operated, maintained, and disposed of in accordance with internal security.

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service