Job Description
The selected individual will serve as a Classified Cyber Security Technologist Sr. In this role, the selected individual will collaborate with a team of cybersecurity professionals and work closely with the Information System Security Manager(s) to implement and monitor comprehensive cybersecurity solutions. This will involve identifying, designing, securing, and deploying specialized applications and tools that support the governance and risk management of classified systems, infrastructure, and tools, ensuring the confidentiality, integrity, and availability of classified assets. The selected candidate will also help design and document advanced risk governance operations to implement proactive security methodologies for classified programs. This position requires an understanding of DevSecOps, Artificial Intelligence (AI), software development and related security controls, as well as a mindset focused on automation-enabled cybersecurity for day-to-day activities.
Desired Skills
- Demonstrated ability to manage the demands of multiple diverse customers, formulate and drive security direction, and ensure effective prioritization and delivery of security solutions
- Recognized proficiency in cloud computing, with certifications such as:
- CSSP, AWS, CSA, CompTIA Cloud+, CCSK
- Other relevant cloud security certifications
- Proven experience working with complex operating systems and networks, including:
- Data centers
- Cloud environments
- Cross-domain solutions
- NSA Type 1/Commercial Solutions for Classified (CSfC) encryption solutions
- Prior experience as an Information System Security Manager (ISSM) or Information System Security Officer (ISSO), with a proven track record of:
- Collaborating with a team of ISSOs to satisfy requirements and achieve goals
- Providing leadership and guidance on information system security matters
- Demonstratable experience conducting internal and external customer assessments, including:
- Identifying areas for improvement
- Providing recommendations for remediation
- Developing and implementing corrective action plans
- Proven ability to evaluate proposed changes or additions to the information system, including:
- Assessing their security relevance
- Providing advisory support to the ISSM
- Ensuring compliance with relevant regulations and standards
- Demonstratable experience assisting in investigations of computer security violations and incidents, including:
- Reporting and documentation as necessary
- Collaborating with incident response teams to resolve security incidents
- Proven experience implementing new and complex technologies at an enterprise level, including:
- Ensuring seamless integration with existing systems
- Minimizing disruption to operations
- Providing training and support to users
- Familiarity with SIPRNet or JWICS cybersecurity requirements and architecture, including:
- Ensuring compliance with relevant regulations and standards
- Implementing security controls and measures to protect sensitive information
- Collaborating with stakeholders to ensure the secure operation of SIPRNet or JWICS systems
- Understanding of Dev/Sec/Ops concepts and processes, with the ability to apply them in real-world scenarios, including:
- Expertise in Splunk, including: Writing queries, Creating dashboards, Implementing third-party apps (e.g., Qmulos Products)
- Experience with network design processes, including: Understanding security objectives, Operational objectives, Risk mitigation strategies for information systems
- Experience in creating, understanding, and updating system designs and architecture
- Knowledge of various security disciplines and how they impact and interact with information system security
- Skilled in developing practical solutions to complex problems, working under general direction, and contributing to determining assignment objectives
- Experience with SPLUNK, including data analysis, visualization, configuration and management
- Experience with Q-Audit and Q-Compliance
- Experience with ePO, including managing and deploying endpoint security solutions
- Experience with ACAS and Security Center
- Experience with Linux operating System
- Experience with Windows operating System
- Publicize and maintain security directives, policies, and procedures
- Department of the Defense Information System Agency (DISA) Security Technical Implementation Guides (STIGs) and configuration standards
- Experience with cyber security products (i.e., Splunk, Nessus, McAfee, Ivanti, etc.)
- Experience with Windows Operating Systems and Windows Domain infrastructure (i.e., Windows Server 2016, Windows 10, Group Policy Objects, Active Directory, etc.
- Experience with configuration management products (i.e., Ansible, SCCM/MECM, Chef, Puppet, etc.)
- Ability/willingness to interact with various engineering, software, and cyber teams across the LM Enterprise.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.