F-35 Information System Security Officer - Eglin AFB (Early Career)
Eglin Air Force Base, Florida
Eglin Air Force Base, Florida
Responsibilities
Description:WHAT WE'RE DOING
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Our amazing employees are on a mission to make a difference in the world and every single day we use our unique skills and experiences to create, design and build solutions to some of the worlds’ hardest engineering problems.
Do you want to be part of a culture that encourages employees to think big, perform with excellence and build incredible products? We provide the resources, inspiration and focus - if you have the passion and courage to dream big, then we want to build a better tomorrow with you.
At Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach – and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
THE WORK
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at Eglin AFB. Typical responsibilities of the ISSO include:
- Ensuring all applicable cybersecurity policy, plans and procedures are followed.
- Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
- Supporting the development and maintenance of cybersecurity related plans, procedures and guidance.
- Monitoring and recognizing non-compliance, suspicious and anomalous activity (i.e., threats), and effectively reporting such activity and associated risks to the appropriate parties.
- Ensuring plans of actions and milestones or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, required corrective actions.
- Conducting role-based cybersecurity training for assigned users.
- Creating, collecting and retaining data to meet reporting requirements.
- Monitoring and correlating data (e.g., logs, events, activity, etc.) from a variety of sources (e.g., Splunk, ELA, ePO, ESS, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
- Investigating, analyzing and responding to cyber events, incidents and non-compliance, to include trend analysis, assembling detailed written reports and briefing the appropriate parties.
Assigned systems may vary in classification, capabilities, and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
WHO WE ARE
We provide the resources, inspiration, and focus - if you have the resourcefulness and perseverance to work hard, then we want to create a better tomorrow with you.
WHY JOIN US
Our culture and values are grounded in a shared sense of purpose: ensuring those who serve always stay ahead of ready. That's why we're proud to have some of the most advanced and innovative minds in the industry.
Basic Qualifications:
- Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
- Ability to obtain and maintain Special Access Program (SAP) access.
- Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
- Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
- Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
- Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Desired Skills:
- Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
- Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
- Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: Non- standard 40 hour work week as assigned by leader
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you’re invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Cyber Security
Type: Full-Time
Shift: First
About
Lockheed Martin is the leader of cyber security defense, cyber operations and sensitive data protection. We employ the world's best cyber minds from diverse fields – people who are passionate about and empowered by our customers' missions. Lockheed Martin's best-in-cyber teams are experts in thinking like the enemy – identifying adversary activity and anticipating advanced persistent threats to strengthen platform defenses, inside and out of our networks.
Our Commitment to Sustainability: We foster innovation, integrity and security to preserve the environment, strengthen diverse communities and propel growth.
Here, the possibilities are endless because we offer:
- Full Time
- Level: Entry, Mid, Senior
- Travel: Minimal, dependent on role
Qualifications
What does a successful Cyber Security employee at Lockheed Martin look like?
Check out the info below to see if you have what it takes.
-
Analytical
Advancing technologies and out of the box thinking that enable cyber operations, resulting in inventing solutions that will keep us safe today and into the future.
-
Creative
Natural curiosity is an absolutely essential trait. Curiosity leads to continual learning which allows you to stay one step ahead of the threat.
-
Curious
The ability to anticipate hackers’ intent and disrupt their next move is key. Seeking out new weaknesses before they become weaknesses. Proactively learning and updating systems is how we stay ahead of the threat.
-
Proactive
We have hard problems to solve and we look for people who thrive at solving them, who can see problems from both the defensive and offensive sides.
-
Problem Solver
Whatever you know today could be different tomorrow as security is constantly changing. Possessing strong technical skills and intellectual depth along with a willingness to continually learn from others is important to adapt to and address the Advanced Persistent Threat.
-
Technologically savvy
The ability to analyze and disseminate threat intelligence. The ability to analyze and address the root cause, learn from the attack and anticipate the hacker’s next move.
Quote
“Cyber is the most exciting career field! Every day, there's new cyber threat information that we leverage to shape our courses of action when identifying, assessing, developing, integrating, and continuously evaluating the effectiveness of defensive measures.”
Dr. Dawn B., Senior Fellow
Benefits
-
Healthcare
Medical, Dental and Vision coverage is available for employees who opt-in.
-
401(k)/Retirement Plans
Our 401(k) plan features generous matching and company contributions.
-
Professional Development
We support our employees through mentoring, internal & external educational programs, networking, skills enhancement and career-building programs, funding for cyber certifications.
-
Maternity and Paternity Leave
Our generous parental leave policies support your journey into parenthood. When you return to work, our facilities offer mother's rooms to support your transition and work/life balance.
-
Paid Time Off
We offer PTO, paid holidays and paid time off for jury duty and military obligations.
-
Flex-time
Depending on the position, we offer flexible work schedules.