F-35 Information System Security Officer - Luke AFB AZ (Mid-Career)

Lockheed Martin CorporationLuke Air Force Base, AZ
54dOnsite

About The Position

Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Our amazing employees are on a mission to make a difference in the world and every single day we use our unique skills and experiences to create, design and build solutions to some of the worlds' hardest engineering problems. Do you want to be part of a culture that encourages employees to think big, perform with excellence and build incredible products? We provide the resources, inspiration and focus - if you have the passion and courage to dream big, then we want to build a better tomorrow with you. At Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! The Work: This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at Luke AFB, AZ. Typical ISSO responsibilities include but are not limited to: Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems. Supporting the development and maintenance of cybersecurity related plans and procedures. Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks. Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions. Creating, collecting and retaining data to meet reporting requirements. Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance. Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties. Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media. Conducting self-inspections and preparing for customer inspections. Interacting professionally during the enforcement of security policy and procedures. Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.

Requirements

  • Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
  • Ability to obtain and maintain Special Access Program (SAP) access.
  • Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
  • Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
  • Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
  • Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.

Nice To Haves

  • Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
  • Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
  • Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).

Responsibilities

  • Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
  • Supporting the development and maintenance of cybersecurity related plans and procedures.
  • Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
  • Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
  • Creating, collecting and retaining data to meet reporting requirements.
  • Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
  • Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
  • Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
  • Conducting self-inspections and preparing for customer inspections.
  • Interacting professionally during the enforcement of security policy and procedures.

Benefits

  • Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees.
  • Schedules range from standard 40 hours over a five day work week while others may be condensed.
  • These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Transportation Equipment Manufacturing

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service