Information Systems Security Officer, Classified Cybersecurity

Lockheed MartinLittleton, CO
19hOnsite

About The Position

This position requires TS/SCI clearance with ability to receive Polygraph. The Cybersecurity Specialist will partner with the security team, program, and government customers to perform as an Information Systems Security Officer (ISSO) for Special Access Programs located at the LM Waterton facility in Littleton, CO. In this role you will: - Oversee day-to-day information system security operations including auditing the IS, hardware, and software implementations and RMF package authorizations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). - Upkeep, monitor, analyze, and respond to network and security events. - Document compliance actions with the ISSM to address non-compliance in the allotted time frame. - Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices. - Participate in internal/external security audits/inspections; performs risk assessments. - Ensure records are maintained for workstations, software, servers, routers, firewalls, network switches, telephony equipment, etc. throughout the information system's life cycle. - Evaluate proposed changes or additions to the information system, and advise the ISSM of their security relevance. - Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented. - Assist in conducting investigations of computer security violations and incidents, reporting as necessary. - Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered. - Communicate, implement and manage a formal Information Security / Information Systems Security Program together with ISSM and CPSO.

Requirements

  • TS/SCI with the ability to receive Polygraph
  • DoD 8570 IAT Level II certification or Higher, or ability to obtain within 6 months of hire
  • Information Systems auditing experience
  • Knowledgeable of operating system security requirements
  • Hands on experience with industry standard Information Assurance tools

Nice To Haves

  • Experience implementing new and complex technologies at multiple classification levels within large environments and at an Enterprise level
  • Currently working in environment supporting IC customers
  • Proved ability to obtain and maintain system ATOs
  • Hands-on experience with ICD 503/JSIG and DAAPAM
  • DoD 8570 IAM Level III certification
  • Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Masters degree

Responsibilities

  • Oversee day-to-day information system security operations including auditing the IS, hardware, and software implementations and RMF package authorizations.
  • Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF).
  • Upkeep, monitor, analyze, and respond to network and security events.
  • Document compliance actions with the ISSM to address non-compliance in the allotted time frame.
  • Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices.
  • Participate in internal/external security audits/inspections; performs risk assessments.
  • Ensure records are maintained for workstations, software, servers, routers, firewalls, network switches, telephony equipment, etc. throughout the information system's life cycle.
  • Evaluate proposed changes or additions to the information system, and advise the ISSM of their security relevance.
  • Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented.
  • Assist in conducting investigations of computer security violations and incidents, reporting as necessary.
  • Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered.
  • Communicate, implement and manage a formal Information Security / Information Systems Security Program together with ISSM and CPSO.

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service