Mid Career Information System Security Officer (ISSO)

Lockheed MartinColorado Springs, CO
12dOnsite

About The Position

Lockheed Martin is a cybersecurity pioneer, partner, innovator and builder. Our amazing employees are on a mission to make a difference in the world and every single day we use our unique skills and experiences to create, design and build solutions to some of the worlds’ hardest engineering problems. Do you want to be part of a culture that inspires employees to think big, perform with excellence and build incredible products? We provide the resources, inspiration and focus – if you have the passion and courage to dream big, then we want to build a better tomorrow with you. At Lockheed Martin Rotary and Mission Systems (RMS), we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach – and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! We are looking for a Cyber Security SME to join an exciting opportunity within the RMS classified cybersecurity group. The position is located in Colorado Springs, CO and will support multiple Department of Defense (DoD) programs. The candidate will ensure compliance through the implementation of mandatory information system security tasks on assigned information systems utilizing various government guidance publications (e.g., NISPOM, DoD 8500 series, NIST, CNSSI, DAAPM, etc.) in support of development and operations. The work that our Classified Cyber Security Professionals do can be summarized in this way: You will have a direct impact to national security, ultimately contributing to protecting your loved ones – this is dynamic, gratifying and impactful work! You will have the opportunity to engage in all aspects of the cyber discipline within our large organization & portfolio, often getting exposure to many projects You get to be a part of a company widely recognized as a top employer for women, people of color and veterans – a highly inclusive culture and ranked #13 in Forbes 2023 "World's Best Employers" You will have an opportunity to make a difference in your first year by: Coordinating and managing interactions with government authorities to facilitate and maintain 100% active status of all Authorization to Operate. Overseeing technical administration of information system in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF) to include Continuous Monitoring, Plan of Action and Milestones (POA&M), and Change Management. Developing and implementing government-approved information security procedures and system security plans for the operation of networked and standalone classified computers systems. Communicating, implementing, and managing a formal Information Security / Information Systems Security Program Overseeing and conducting risk assessments on cybersecurity architecture and perform comprehensive investigations of computer security incidents, collaborating with outside agencies as required. Other Key Responsibilities and Challenges of this role include: Ensure configuration management (CM) for security-relevant IS software, hardware, firmware, and system documentation. Assist and conduct security IS education and training. Assist in conducting investigations of computer security violations and incidents. Handling mission requirements which may drive unpredictable work hours/schedules Working in a high paced environment driven by growing and ever-changing technical implementation requirements

Requirements

  • 5 years or more of ISSO or ISSM experience or other Information Assurance discipline
  • Demonstrated experience utilizing Tenable.sc, Trellix ePO, Splunk, and/or other vulnerability management compliance tools
  • Experience hardening Operating Systems to DISA STIG baselines
  • Experience with Information Systems auditing and investigations
  • Possess a valid certification that meets or exceeds DoD 8140 basic foundational requirements for ISSM work role, to include Security+, GSEC, CAP, CASP+, CCISO, CSSP, CISM, CISSP, Cloud+, SSCP, or GSLC
  • Current Secret Clearance

Nice To Haves

  • Keen attention to detail and adherence to established security policies
  • Excellent verbal and writing skills
  • Experience with system certification, auditing, and continuous monitoring
  • Experience managing and implementing the ATO Lifecyle utilizing eMASS, Xacta, or other technologies
  • Experience with network device configuration (i.e., Cisco, Juniper, etc)
  • COMSEC Account Management
  • Experience with Agile and DevSecOps concepts and toolsets (e.g. JIRA, Confluence, Docker, Ansible, Git, etc.)
  • Experience with the National Industrial Security Program Operating Manual (NISPOM) and the Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM)
  • Familiarity with Joint Special Access Program (SAP) Implementation Guide (JSIG), Committee on National Security Systems Instruction (CNSSI) 1253, NIST SP 800-37 Risk Management Framework (RMF), and/or NIST SP 800-53 Security and Privacy Controls requirements

Responsibilities

  • Coordinating and managing interactions with government authorities to facilitate and maintain 100% active status of all Authorization to Operate.
  • Overseeing technical administration of information system in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF) to include Continuous Monitoring, Plan of Action and Milestones (POA&M), and Change Management.
  • Developing and implementing government-approved information security procedures and system security plans for the operation of networked and standalone classified computers systems.
  • Communicating, implementing, and managing a formal Information Security / Information Systems Security Program
  • Overseeing and conducting risk assessments on cybersecurity architecture and perform comprehensive investigations of computer security incidents, collaborating with outside agencies as required.
  • Ensure configuration management (CM) for security-relevant IS software, hardware, firmware, and system documentation.
  • Assist and conduct security IS education and training.
  • Assist in conducting investigations of computer security violations and incidents.
  • Handling mission requirements which may drive unpredictable work hours/schedules
  • Working in a high paced environment driven by growing and ever-changing technical implementation requirements

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service