Job Description
Your Mission :
At Lockheed Martin, we're on a mission to find an accomplished Information Security Engineer to join our elite Corporate Information Security Office, supporting the LM Space Business Area.
In this pivotal role, you'll be responsible for engineering and IT cybersecurity, safeguarding our systems and information from ever-evolving threats.
Key Responsibilities :
- Conduct threat analysis and modeling, defining security requirements, and documenting the security posture of the environment, including unmitigated risks
- Design and implement robust security solutions encompassing Information Assurance, Information Security (InfoSec), and Network Security Engineering
- Evaluate and mitigate system security threats / risks throughout the program lifecycle
- Collaborate on system security requirements definition, analysis, and verification
- Perform security certification and accreditation planning, testing, and liaison activities
- Support secure systems operations and maintenance
Succeeding at the above imperatives will require demonstrated network security engineering expertise in architectures and best practices to secure large scale, enterprise networks, as well as proven domain and practical experience in architecture, design, and engineering of computer networks with security controls that meet best practice and minimize cyber security risks.
As a valued member of our team, you'll be instrumental in safeguarding our systems and information, ensuring the ongoing success and security of Lockheed Martin's business operations.
Don't miss this opportunity to make a real difference in the world of cybersecurity - apply now and join our mission!
Why Join Us?
The Enterprise Business & Digital Transformation organization is responsible for developing strategies and implementing integrated, cross-functional solutions that transform operations through technology, culture, and processes to deliver business-based outcomes.
It is comprised of the corporation’s Digital Transformation and Enterprise Information Technology teams, with more than 4,700 professionals worldwide.
What’s In It For You
From onsite to remote, we offer flexible work schedules to comprehensive benefits investing in your future and security,
Like Fridays off? This role is scoped on a 4x10 Schedule (Mon-Thur), and will be a hybrid role, with strong preference for King of Prussia, PA or Littleton, CO.
And of course you want to be part of a company culture that empowers employees to think big, lead with a growth mindset, and make the impossible a reality.
Lockheed Martin provides the resources and the flexibility to enable inspiration and focus! If you have the passion and courage to dream big, work hard, and have fun doing what you love then we want to build a better tomorrow with you!
Our Commitment to Diversity and Inclusion
We Hear You, We See You. At LM Enterprise Operations we invest in people and promoting the sharing of ideas to create incredible solutions.
We know that our success depends on the combined efforts of diverse-thinkers like you! At LM Enterprise Operations, we cultivate an inclusive environment that appreciates differences and unique thinking.
Our global commitment to diversity and inclusion reflects our values of doing what's right, respecting others and performing with excellence. Learn more here :
Desired skills
- Familiarity with Lockheed Martin security policies and Information Protection Manual (IPM), along with an active DoD Secret Security Clearance (preferred)
- Possession of CISSP, CISM or other relevant security certifications
- Experience with LM scanning, vulnerability remediation, CyRIS, and exception processes
- Knowledge of NIST SP 800 series and FIPS guidelines
- Expertise in Cloud technologies, including Amazon Web Services, with a focus on transitioning physical security architectures to cloud-based, software-defined network constructs
- Proficiency in secure software development practices and understanding of networks, especially enterprise-grade 802.11 architectures
- Familiarity with Hashing, Salting, and other cryptographic methodologies
- Comprehension of OWASP Top 10 Web Application Security Risks and their countermeasures, as well as the SANS Top 25 Most Dangerous Software Errors and their countermeasures