Information Systems Security Officer

Lockheed MartinOrlando, FL
4dOnsite

About The Position

Are you passionate about cybersecurity, automation, and risk governance? Lockheed Martin recognizes the challenges we face today and the need to embrace the convergence of these disciplines to transform ourselves for tomorrow. This transformation will enable Lockheed Martin to provide more autonomous and continuous cyber support for our classified environments. The Rotary and Mission Systems (RMS) Classified Cyber Security organization is seeking a Classified Cyber Security professional to deliver automated, sustainable, and consistent cyber products and services for the RMS Business AreaLine of Business, which willthat enable the delivery of 21st-century security services to our classified programs. THE WORK The selected individual will serve as a Classified Cyber Security Technologist Sr. In this role, the selected individual will collaborate with a team of cybersecurity professionals and work closely with the Information System Security Manager(s) to document, implement and monitor comprehensive cybersecurity solutions. This will involve identifying, designing, securing, and deploying specialized applications and tools that support the governance and risk management of classified systems, infrastructure, and tools, ensuring the confidentiality, integrity, and availability of classified assets. The selected candidate will also help design and document advanced risk governance operations to implement proactive security methodologies for classified programs. This position requires an understanding of development and security controls, as well as a mindset focused on automation-enabled cybersecurity for day-to-day activities.

Requirements

  • Must be a U.S. citizen
  • Minimum of Active Secret security clearance required
  • Minimum of 3+ years of related experience in cybersecurity
  • Demonstratable experience with standard cybersecurity and network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc.
  • Proven experience in executing security hardening on Windows and RHEL operating systems, utilizing approved DISA STIGs and SRGs, and implementing NIST SP 800-53 security controls to ensure compliance with industry standards.
  • Proven knowledge of the DCSA Assessment and Authorization Process Manual (DAAPM), Joint Special Access Program Implementation Guide (JSIG), or Risk Management Framework (RMF).
  • IASAE Level-II Certification, such as: CASP, CISSP, RHCSA, or CSSLP
  • Be well-versed in information system security architectural documentation standards.
  • Apply information assurance and cybersecurity standards, directives, guidance, and policies to an architectural/risk-based framework.
  • Understand and implement relevant frameworks, such as NIST, ISO, or other industry-recognized standards.
  • Provide a structured approach to information system security, ensuring that all aspects of the system are properly secured and aligned with organizational and regulatory requirements
  • Ensure compliance with governing documents and security policies.
  • Assist in regulatory periodic assessments to ensure adherence to government regulations and information assurance/cybersecurity guidelines.
  • Provide recommendations for secure implementation and compliance.
  • Support the development of information system security documents and reports to regulatory agencies.

Nice To Haves

  • Proven expertise in Dev/Sec/Ops concepts and processes, with the ability to apply them in real-world scenarios, including:
  • Expertise in Splunk, including: Writing queries, Creating dashboards, Implementing third-party apps (e.g., Qmulos Products)
  • Experience with network design processes, including: Understanding security objectives, Operational objectives, Risk mitigation strategies for information systems
  • Demonstratable experience working with complex operating systems and networks, including:
  • Data centers
  • Cloud environments
  • Cross-domain solutions
  • NSA Type 1/Commercial Solutions for Classified (CSfC) encryption solutions
  • Demonstratable experience conducting internal and external customer assessments, including:
  • Identifying areas for improvement
  • Providing recommendations for remediation
  • Developing and implementing corrective action plans
  • Proven ability to evaluate proposed changes or additions to the information system, including:
  • Assessing their security relevance
  • Providing advisory support to the ISSM
  • Ensuring compliance with relevant regulations and standards
  • Proven experience implementing new and complex technologies at an enterprise level, including:
  • Ensuring seamless integration with existing systems
  • Minimizing disruption to operations
  • Providing training and support to users

Responsibilities

  • Plan, implement, test, and monitor classified cybersecurity measures to ensure the security and integrity of our systems.
  • Assess and mitigate classified system security threats and risks throughout the program life cycle.
  • Coordinate activities with the Information System Security Manager (ISSM) to ensure systems are secure and technically ready for inspection.
  • Validate system security requirements and establish technical system security documentation.
  • Assist with the implementation of security procedures and verify system security requirements.

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Education Assistance
  • Parental Leave
  • Paid time off
  • Holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service