Skip to main content
Search Jobs

Search Jobs

Information System Security Officer

King of Prussia, Pennsylvania

King of Prussia, Pennsylvania

Responsibilities

Job ID: 686822BR Date posted: Feb. 13, 2025
Description:At Lockheed Martin Rotary and Mission System (RMS), we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach – and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training, and education. Come and experience your future!

This position requires the candidate primarily function as the backup COMSEC Hand-Receipt Holder 9HRH) for the Local Element (LE) while also performing Information System Security Officer (ISSO) for multiple programs and performs as a technical liaison in support of the security standards and requirements relevant to the NIST Risk Management Framework (RMF) Step 1 thru Step 6 for the information System.

The desired candidate will possess a foundational understanding of the COMSEC Hand-Receipt Holder role, NIST 800-53 Security and Privacy Controls for Federal Information System and Organizations combined with experience supporting computer System through previous experience in a system engineering or system administration capacity. The candidate must have working experience with the development, implementation, and maintenance of either the Linux and/or Microsoft Windows operating System and supporting applications.

As the ISSO, this individual is responsible for the oversight of the information system’s security posture and will develop necessary supporting artifacts such as the System Security Plan (SSP), Plan of Action and Milestones (POA&M), and Security Controls Traceability Matrix (SCTM) while also aiding in the development and implementation of relevant security policies and procedures required by assessment and authorization activities associated with any of the following guidance directives:

• Intelligence Community Directive 503 (ICD-503)
• DCSA Assessment and Authorization Process Manual (DAAPM)
• National Industrial Security Program Operating Manual (NISPOM Chapter 8)
• Joint Special Access Program (SAP) Implementation Guide (JSIG)

Effective communication is a key attribute within this role. The ISSO assists the Information System Security Manager (ISSM) with cybersecurity oversight and will provide guidance and direction to program personnel. The ISSO also assists program IT and infrastructure support personnel with the application of security patches and secure configurations commensurate with Security Technical Implementation Guides (STIGs). Some working knowledge of Industry Standard tools for purposes of audit reduction, vulnerability scanning, and malware analysis is preferred. Relevant tools include but are not limited to: Splunk, Tenable Nessus, Host Based Security System (HBSS) components, Security Content Automation Protocol (SCAP) Checker and STIG viewer.

The ISSO is also a primary stakeholder and facilitator of the continuous monitoring efforts that promote RMF compliance throughout the organization. The ISSO is required to routinely monitor the applicable security controls assigned to the information system(s) using a blend of automated and manual techniques. This ensures that the security controls are: (1) being met and (2) implemented correctly with respect to the environment. Deficiencies and weaknesses identified throughout the process will be reported back to the ISSM.

Additional support activities include:

• Self-inspection reviews
• Comprehensive investigations of computer security incidents
• Policy and procedure interpretation associated with Program and Cyber Security
• Participation in programmatic Review Boards and Technical Exchange Meetings
• Review and Approval of change requests relevant to the information system
Basic Qualifications:
Experience the Keying and testing of COMSEC equipment and providing related support and oversight to multiple programs

Submitting all required accounting reports to the COMSEC Account Manager
Hands on experience with Windows operating System
Final Secret Clearance
Understanding of the Risk Management Framework (RMF) process & requirements.
Strong interpersonal and communications skills
Security + or another DoDD 8570/8140 Information Assurance Management certification
Desired Skills:
• Some relevant ISSO/ISSE experience within the DoD or Intelligence Community
• Knowledge of the Defense Information System Agency (DISA) Security Technical Implementation Guides (STIGs) and configuration standards
• Experience with Security Directives, Policies, Publications and Regulations
• Experience with Linux operating System
• Interface with the oversight agency personnel and internal program customers to ensure successful and compliant operations.
• Maintain administrative and management control of the COMSEC account equipment and functions, including maintaining necessary approvals from both the issuing agency and Contracting Authority and also ensuring validity of the equipment is up to date.
• Conduct appropriate COMSEC and Cryptographic briefings and provide appropriate safeguarding and handling training to material-end users. Maintain and update local COMSEC standard operating procedures.
• Assist with investigations and documents mishandling of COMSEC material.
• Ensure that COMSEC material shipped outside of the account is packaged and shipped compliantly.
• Conduct security education training. Interface with internal/external customers to identify requirements and provide problem resolution.
• Publicize and maintain security directives, policies, and procedures.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Secret
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 4x10 hour day, 3 days off per week
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.

With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.

If this sounds like a culture you connect with, you’re invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Cyber Security
Type: Full-Time
Shift: First
Apply Now

About

At Lockheed Martin, we apply our passion for purposeful innovation to keep people safe and solve the world's most complex challenges.

Mission-Focused Innovation: From aerospace to outer space to cyber space, you can solve the world's most complex challenges for our customers.

Foundational Values: Our culture of performance excellence, ethics, teamwork and inclusion is embedded in everything we do.

Diverse Career Opportunities with Meaningful Work: Grow your career and skills for life. Our technology-driven learning platforms and programs enable your development and agility.

Your Health, Your Wealth, Your Life: Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.

Empowered to Be Your Best: Use your strengths to make a difference in the lives of one another, our customers, our communities and our planet.

Here, the possibilities are endless because we offer:

  • Full Time
  • Level: Entry, Mid, Senior
  • Travel: Minimal, dependent on role

Back to Job Navigation (About)

Qualifications

What does a successful Cyber Security employee at Lockheed Martin look like?
Check out the info below to see if you have what it takes.

  • Analytical

    Advancing technologies and out of the box thinking that enable cyber operations, resulting in inventing solutions that will keep us safe today and into the future.

  • Creative

    Natural curiosity is an absolutely essential trait. Curiosity leads to continual learning which allows you to stay one step ahead of the threat.

  • Curious

    The ability to anticipate hackers’ intent and disrupt their next move is key. Seeking out new weaknesses before they become weaknesses. Proactively learning and updating systems is how we stay ahead of the threat.

  • Proactive

    We have hard problems to solve and we look for people who thrive at solving them, who can see problems from both the defensive and offensive sides.

  • Problem Solver

    Whatever you know today could be different tomorrow as security is constantly changing. Possessing strong technical skills and intellectual depth along with a willingness to continually learn from others is important to adapt to and address the Advanced Persistent Threat.

  • Technologically savvy

    The ability to analyze and disseminate threat intelligence. The ability to analyze and address the root cause, learn from the attack and anticipate the hacker’s next move.

Back to Job Navigation (Qualifications)

Quote

“Cyber is the most exciting career field! Every day, there's new cyber threat information that we leverage to shape our courses of action when identifying, assessing, developing, integrating, and continuously evaluating the effectiveness of defensive measures.”

Dr. Dawn B., Senior Fellow

Benefits

  • Healthcare

    Medical, Dental and Vision coverage is available for employees who opt-in.

  • 401(k)/Retirement Plans

    Our 401(k) plan features generous matching and company contributions.

  • Professional Development

    We support our employees through mentoring, internal & external educational programs, networking, skills enhancement and career-building programs, funding for cyber certifications.

  • Maternity and Paternity Leave

    Our generous parental leave policies support your journey into parenthood. When you return to work, our facilities offer mother's rooms to support your transition and work/life balance.

  • Paid Time Off

    We offer PTO, paid holidays and paid time off for jury duty and military obligations.

  • Flex-time

    Depending on the position, we offer flexible work schedules.

Back to Job Navigation (Benefits)