Classified Cyber Security Staff/ISSO/Troy

Lockheed MartinTroy, AL
14dOnsite

About The Position

You will be the Information Systems Security Officer for the Lockheed Martin Missiles & Fire Control Team. MFC is a recognized designer, developer and manufacturer of precision engagement aerospace and defense systems for the U.S. and allied militaries. MFC develops, manufactures and supports advanced combat, missile, rocket, manned and unmanned systems for military customers that include the U.S. Army, Navy, Air Force, Marine Corps, NASA and dozens of foreign allies. Classified Cybersecurity help secure lifesaving products and critical state-of-the-art engineering and manufacturing systems by applying cutting edge cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. The Cybersecurity position will partner with the security team, program, and government customers to perform as an Information Systems Security Officer, Staff (ISSO) in Troy, AL.

Requirements

  • Must have an ACTIVE Secret Clearance with the ability to obtain TS.
  • Bachelor’s degree from an accredited college in a Cybersecurity-related discipline with Cybersecurity-related professional experience, or equivalent experience/combined education.
  • DoD 8570 IAT Level III baseline certification or must be able to obtain within 6 months of hire.
  • Experience with system accreditation requirements under the Risk Management Framework (RMF) and NIST 800-53 security controls.
  • Experience with developing, reviewing and maintaining RMF artifacts.
  • Hands on experience with industry standard Information Assurance tools (Splunk, Nessus/Tenable/ACAS, STIG Viewer/SCAP Compliance Checker/eSTIG, McAfee ePO, McAfee DLP).

Nice To Haves

  • Experience implementing new and complex technologies at multiple classification levels within large environments and at an Enterprise level.
  • Experience with IS auditing and investigations.
  • Demonstrated technical experience in Windows, Linux operating systems and command line use.
  • Knowledgeable of operating system security requirements.
  • Experience implementing complex technologies within large environments, possessing strong technical skills.
  • In-depth experience in system hardening, analysis, and vulnerability management.
  • Understand Agile operations while possessing sound business acumen.
  • Ability to manage multiple projects in a dynamic, demanding environment.
  • Knowledge of other security disciplines and how they impact and interact with information system security.
  • Understanding of networking concepts and cybersecurity related tools to include, Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) and Security Content Automation Protocol (SCAP), and vulnerability scanners.
  • Ability to perform technical certifications for systems being presented to the government for authorization.
  • Ability to speak in front of large groups of people.
  • Ability to obtain and maintain a Top Secret Clearance.

Responsibilities

  • Oversee day-to-day information system security operations including auditing the IS, hardware, and software implementations and RMF package authorizations.
  • Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF).
  • Upkeep, monitor, analyze, and respond to network and security events.
  • Document compliance actions with the ISSM to address non-compliance in the allotted time frame.
  • Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices.
  • Participate in internal/external security audits/inspections; performs risk assessments.
  • Ensure records are maintained for workstations, software, servers, routers, firewalls, network switches, telephony equipment, etc. throughout the information system's life cycle.
  • Evaluate proposed changes or additions to the information system, and advise the ISSM of their security relevance.
  • Ensure configuration management (CM) for security relevant IS software, hardware, and firmware is maintained and documented.
  • Assist in conducting investigations of computer security violations and incidents, reporting as necessary.
  • Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered.
  • Communicate, implement and manage a formal Information Security / Information Systems Security Program together with ISSM and Program Security.

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service