Cybersecurity - Associate Information System Security Officer (ISSO)
Information systems security officer job at Boeing
Company:
The Boeing Company
The Boeing Company is currently seeking a Cybersecurity - Associate Information System Security Officer (ISSO) to support Department of Defense (DoD) and Special Program activities in Heath, OH.
The selected candidate will rely on Cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and implementing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information.
Position Responsibilities:
Contribute to the development and deployment of program information security for assigned systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures
Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems
Perform security compliance continuous monitoring (CONMON)
Participate in security assessments and audits
Prepare and present technical reports and briefings
Contribute to the identification of root causes, the prioritization of threats, and recommend/implement corrective action
Explore the enterprise and industry for the evolving state of industry knowledge and methods regarding information security best practices
Support development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations
Basic Qualifications (Required Skills/Experience):
IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, Security+ CE, CISSP, CASP, CISM, GSLC)
Experience in cybersecurity policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, or NIST SP 800 series
Ability to obtain access to Special Access Programs (SAP)
Preferred Qualifications (Desired Skills/Experience):
Experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs
Experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS
Experience assessing and documenting test or analysis data to show cyber security compliance
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies
.
Pay & Benefits:
At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities.
The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work.
The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary pay range: $74,800 - $101,200
Language Requirements:
Not Applicable
Education:
Not Applicable
Relocation:
This position offers relocation based on candidate eligibility.
Export Control Requirement:
This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee.
Safety Sensitive:
This is not a Safety Sensitive Position.
Security Clearance:
This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active)
Visa Sponsorship:
Employer will not sponsor applicants for employment visa status.
Contingent Upon Award Program
This position is not contingent upon program award
Shift:
Shift 1 (United States of America)
Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
EEO is the law
Boeing EEO Policy
Request an Accommodation
Applicant Privacy
Boeing Participates in E - Verify
E-Verify (English)
E-Verify (Spanish)
Right to Work Statement
Right to Work (English)
Right to Work (Spanish)
Auto-ApplyF-35 Information System Security Officer - Luke AFB AZ (Mid-Career)
Glendale, AZ jobs
Description:Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Our amazing employees are on a mission to make a difference in the world and every single day we use our unique skills and experiences to create, design and build solutions to some of the worlds' hardest engineering problems.
Do you want to be part of a culture that encourages employees to think big, perform with excellence and build incredible products? We provide the resources, inspiration and focus - if you have the passion and courage to dream big, then we want to build a better tomorrow with you.
At Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at Luke AFB, AZ. Typical ISSO responsibilities include but are not limited to:
* Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
* Supporting the development and maintenance of cybersecurity related plans and procedures.
* Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
* Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
* Creating, collecting and retaining data to meet reporting requirements.
* Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
* Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
* Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
* Conducting self-inspections and preparing for customer inspections.
* Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Basic Qualifications:
* Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
* Ability to obtain and maintain Special Access Program (SAP) access.
* Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
* Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
* Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
* Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Desired Skills:
* Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
* Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
* Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: Non- standard 40 hour work week as assigned by leader
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Information Security/Information Assurance
Type: Full-Time
Shift: First
Information System Security Officer III
Colorado Springs, CO jobs
Summary: The ISSO III's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Five (5) to Seven (7) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements: This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
Auto-ApplyInformation System Security Officer III
Albuquerque, NM jobs
Summary: The ISSO III's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Five (5) to Seven (7) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements: This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
Auto-ApplyInformation System Security Officer II
Colorado Springs, CO jobs
Job DescriptionSalary: Up to $47.95/hourly
Colorado Springs, Colorado
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.
EDUCATION:
Bachelor's Degree
CLEARANCE:
TS/SCI
EXPERIENCE MANDATORY:
2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance in roles such as System/Network Administrator or ISSO; SAP experience; TRAINING: DoD 8570.01-M IAM Level II (in lieu of IAT-Level II).
BENEFITS:
We offer a competitive compensation package including a generous PTO and Flexible holiday package, tax-free healthcare cost reimbursement, and an immediate vesting 401K with 4% matching.
COMPENSATION:
Negotiable unto $47.95/hr
Information Systems Security Officer/ Engineer
Annapolis, MD jobs
CyberCore Technologies is seeking TS/SCI Poly Cleared ISSE and ISSO Candidates to support the sustainment and modernization of a Cyber Security Infrastructure.
CyberCore Technologies provides Services for Government and Commercial Clients. We have procured, integrated, and delivered over $2.6B in Information Technology products. CyberCore provides a wide range of professional services and solutions with specific strengths in Cyber Security, Networking, Engineering/Operations, and Software Development.
Responsibilities
The ISSO/ISSE will support a program, organization, system, or enclave's Information Assurance Program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans, Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices. Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF)
Qualifications:
Active TS/SCI Poly Clearance.
Bachelors Degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline. 14 years experience as an ISSO on programs and contracts of similar scope, type, and complexity.
DOD 8570.01-M Compliance with IASAE Level 2 is required - CISSP. 4 years of ISSO experience may be substituted for a Bachelors's Degree.
CyberCore has, on many occasions, expressed support and commitment to the principles of diversity and equal employment opportunity. It is CyberCore's policy to recruit, hire, train, and promote individuals, as well as administer all personnel actions, without regard to race, color, national or ethnic origin, age, religion, disability, sex, sexual orientation, gender identity and expression, veteran status or any other characteristic protected under applicable federal or state law. CyberCore will not tolerate unlawful discrimination and any such conduct is prohibited. CyberCore is committed to ensuring that CyberCore's workforce and volunteers reflect America's diverse population. CyberCore knows that such diversity will enrich the company with the talent, energy, perspective and inspiration we need to achieve our mission.
Auto-ApplyPrincipal/Sr Principal Cyber Information Assurance Analyst
McClellan Park, CA jobs
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: SCITRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems (NGMS) is seeking a Principal Cybersecurity Analyst/Sr. Principal Cybersecurity Analyst to join our team based in McClellan, CA.
What You'll Get to Do:
Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments.
Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems.
Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.
Assist in the implementation of the required government policy (i.e., NISPOM, ICD 503), make recommendations on process tailoring, participate in and document process activities.
Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M.
Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.
This requisition may be filled as either a Principal Cybersecurity Analyst or Sr. Principal Cybersecurity Analyst.
#MPR
Basic Qualifications for a Principal Cybersecurity Analyst
Bachelor's degree and 5 years of relevant experience; 3 years with a Masters; 1 year with a PhD. An additional 4 years of relevant experience may be considered in lieu of a degree.
Active Top Secret clearance with SCI eligibility
Must possess an IAT Level II (DoD 8570) certification
Experience with Risk Management Framework accreditation functions, including documentation, scanning, assessment, POAM management, through all steps of the RMF
Experience with Continuous Monitoring to comply with RMF
Experience with cybersecurity, information security and information assurance roles
Experience executing and monitoring security tools, such as SIEM, Splunk, and vulnerability and compliance scanners
Demonstrated ability to handle multiple levels of classified systems and data and follow data transfer/trusted download/assured file transfer processes
Basic Qualifications for a Sr. Principal Cybersecurity Analyst
Bachelor's degree and 8 years of relevant experience; 6 years with a Masters. 4 years with a PhD. An additional 4 years of relevant experience may be considered in lieu of a degree.
Active Top Secret clearance with SCI eligibility
Must possess an IAT Level II (DoD 8570) certification
Experience with Risk Management Framework accreditation functions, including documentation, scanning, assessment, POAM management, through all steps of the RMF
Experience with Continuous Monitoring to comply with RMF
Experience with cybersecurity, information security and information assurance roles
Experience executing and monitoring security tools, such as SIEM, Splunk, and vulnerability and compliance scanners
Demonstrated ability to handle multiple levels of classified systems and data and follow data transfer/trusted download/assured file transfer processes
Preferred Qualifications:
Bachelor's degree in a STEM discipline
Active TS/SCI clearance
Active DoD 8570 IAT Level II, or higher, certification such as CompTIA Security+; required to start and must be maintained
Primary Level Salary Range: $137,400.00 - $206,000.00Secondary Level Salary Range: $110,300.00 - $165,500.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyPrincipal/Sr Principal Cyber Information Assurance Analyst
McClellan Park, CA jobs
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems (NGMS) is seeking a Principal Cybersecurity Analyst/Sr. Principal Cybersecurity Analyst to join our team based in McClellan, CA.
**What You'll Get to Do:**
+ Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
+ This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments.
+ Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems.
+ Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.
+ Assist in the implementation of the required government policy (i.e., NISPOM, ICD 503), make recommendations on process tailoring, participate in and document process activities.
+ Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
+ Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
+ Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M.
+ Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.
This requisition may be filled as either a Principal Cybersecurity Analyst or Sr. Principal Cybersecurity Analyst.
**\#MPR**
**Basic Qualifications for a Principal Cybersecurity Analyst**
+ Bachelor's degree and 5 years of relevant experience; 3 years with a Masters; 1 year with a PhD. An additional 4 years of relevant experience may be considered in lieu of a degree.
+ Active Top Secret clearance with SCI eligibility
+ Must possess an IAT Level II (DoD 8570) certification
+ Experience with Risk Management Framework accreditation functions, including documentation, scanning, assessment, POAM management, through all steps of the RMF
+ Experience with Continuous Monitoring to comply with RMF
+ Experience with cybersecurity, information security and information assurance roles
+ Experience executing and monitoring security tools, such as SIEM, Splunk, and vulnerability and compliance scanners
+ Demonstrated ability to handle multiple levels of classified systems and data and follow data transfer/trusted download/assured file transfer processes
**Basic Qualifications for a Sr. Principal Cybersecurity Analyst**
+ Bachelor's degree and 8 years of relevant experience; 6 years with a Masters. 4 years with a PhD. An additional 4 years of relevant experience may be considered in lieu of a degree.
+ Active Top Secret clearance with SCI eligibility
+ Must possess an IAT Level II (DoD 8570) certification
+ Experience with Risk Management Framework accreditation functions, including documentation, scanning, assessment, POAM management, through all steps of the RMF
+ Experience with Continuous Monitoring to comply with RMF
+ Experience with cybersecurity, information security and information assurance roles
+ Experience executing and monitoring security tools, such as SIEM, Splunk, and vulnerability and compliance scanners
+ Demonstrated ability to handle multiple levels of classified systems and data and follow data transfer/trusted download/assured file transfer processes
**Preferred Qualifications:**
+ Bachelor's degree in a STEM discipline
+ Active TS/SCI clearance
+ Active DoD 8570 IAT Level II, or higher, certification such as CompTIA Security+; required to start and must be maintained
Primary Level Salary Range: $137,400.00 - $206,000.00
Secondary Level Salary Range: $110,300.00 - $165,500.00
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.
The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Manager, Information Security
East Syracuse, NY jobs
Saab, Inc. is seeking an experienced and results-driven Information Security Manager to lead our cybersecurity initiatives. In this pivotal role, you will be responsible for developing, implementing, and managing a comprehensive information security program designed to protect our computer systems, networks, and data from unauthorized access, use, disclosure, alteration, or destruction. You will lead a team of security professionals, oversee security operations, ensure regulatory compliance, and respond swiftly to potential security incidents. This position is located in Syracuse, NY. Relocation will be provided.
Key Responsibilities
Strategy and Policy: Develop, implement, and maintain the organization's information security policies, standards, and procedures, aligning security strategy with business objectives.
Risk Management: Conduct regular risk assessments and vulnerability analyses to identify potential security threats and determine appropriate mitigation strategies.
Incident Response: Manage and lead the response to security incidents and breaches, including investigation, containment, recovery, and reporting.
Security Operations: Oversee the deployment, configuration, and monitoring of security tools and technologies (e.g., firewalls, SIEM, data encryption, antivirus).
Compliance & Auditing: Ensure compliance with relevant laws, regulations, and industry standards such as GDPR, HIPAA, PCI DSS, NIST, or ISO 27001.
Team Leadership: Manage, mentor, and train the information security team members, fostering an environment of continuous learning and growth.
Disaster Recovery & Business Continuity: Create, maintain, and test business continuity and disaster recovery plans to ensure data availability and system functionality in the event of an outage or breach.
Security Awareness: Train and educate employees on information security best practices and compliance, promoting a security-conscious culture across the organization.
Budget Management: Develop and manage the information security budget, ensuring cost-effective implementation of security measures and technologies.
Compensation Range: $146,800 - $190,800
The compensation range provided is a general guideline. When extending an offer, Saab, Inc. considers factors including (but not limited to) the role and associated responsibilities, location, and market and business considerations, as well as the candidate's work experience, key skills, and education/training.
Skills and Experience:
Required Qualifications and Skills:
Education: A Bachelor's degree in Computer Science, Information Security, or a related field. A Master's degree is a plus.
Technical Knowledge: Knowledge of operating systems, network security architecture, cloud platforms, and security software solutions.
Certifications: Relevant professional certifications such as CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager) are highly desirable.
Strong leadership, interpersonal, and team management skills.
Excellent written and verbal communication skills, with the ability to explain complex technical issues to non-technical stakeholders.
Strong analytical, problem-solving, and critical-thinking abilities, especially when working under pressure.
Citizenship Requirements:
Must be a U.S. citizen. Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Drug-Free Workplaces:
Saab is a federal government contractor and adheres to policies and programs necessary for sustaining drug-free workplaces. As a condition of employment, candidates will be required to pass a pre-employment drug screen.
Benefits:
Saab provides an excellent working environment offering professional growth opportunities, competitive wages, work-life balance, a business casual atmosphere and comprehensive benefits.
Highlights include:
Medical, vision, and dental insurance for employees and dependents
Generous paid time off, including 8 designated holidays
401(k) with employer contributions
Tuition assistance and student loan assistance
Wellness and employee assistance resources
Employee stock purchase opportunities
Short-term and long-term disability coverage
About Us:
Saab is a leading defense and security company with an enduring mission, to help nations keep their people and society safe. Empowered by its 19,000 talented people, Saab constantly pushes the boundaries of technology to create a safer, more sustainable and more equitable world. In the U.S., Saab delivers advanced technology and systems, supporting the U.S. Armed Forces and the Federal Aviation Administration, as well as international and commercial partners. Headquartered in Syracuse, New York, the company has business units and local employees in eight U.S. locations.
Saab is a company where we see diversity as an asset and offer unlimited opportunities for advancing in your career. We are also a company that respects each person's needs and encourage employees to lead a balanced, rewarding life beyond work. Saab values diversity and is an Affirmative Action employer for protected veterans and individuals with disabilities. Saab is an Equal Employment Opportunity employer, all qualified individuals are encouraged to apply and will be considered for employment without regard to race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, age, veteran, disability status, or any other federal, state, or locally protected category.
Auto-ApplyAnalyst, Information Security
San Antonio, TX jobs
Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
* Conduct risk and security assessments through vulnerability analysis and reporting
* Perform mitigation support for both internal and external security audits
* Investigate, analyze and document security incidents to identify and document the root cause
* Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
* Partner with IT Operation teams to remediate system vulnerabilities
* Participates in the production of documentation and management reporting
* Research security enhancements and make recommendations for improved policy and process
* Analyze IT requirements and provide objective advice on the use of new IT security offerings
* Stay up-to-date on information technology and cybersecurity trends and standards
* Other IT Security-related duties as required
* Capable of identifying, evaluating and mitigating significant risks within an enterprise.
* Strong working experience with Microsoft Office Suite.
* Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
* Possess strong analytical skills attention to detail.
* Ability to prioritize assignments while working on multiple projects
* Ability to work independently and proactively to meet assigned objectives
* Flexible with the ability to multi-task, effectively prioritize and work under pressure
* Basic project management
* Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
* Analyze, report and respond to security alerts within the various IT technologies and global locations
* Proactively remediate information technology security threats as a member of the security team
* Assist in the designing, documenting, architecting and implementing IT security measures and controls
* Provide support through 'Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
* Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
* Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
* Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered.
* 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
* 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
* 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
* 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
* IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
* SDLC, and understand application security.
* Containerization and Development Security Operations
Benefits that make life better:
* Comprehensive Healthcare
* 401(k) with 100% company match; up to 5% vested
* Paid Time Off starting on day one
* Bonus opportunities
* Health- & Dependent Care Flexible Spending Accounts
* Short- & Long-Term Disability
* Life & AD&D Insurance
* Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
Auto-ApplyComputer Systems Security Analyst - Splunk
Baltimore, MD jobs
Write complex SPL to develop Advanced Splunk Dashboards and Queries.
Perform on-boarding of data via Splunk Tools and Automation method.
Work with customers to develop custom content, maintaining consistently high quality communications with the Client.
Create Splunk Dashboards and Queries
Familiar with automating in Splunk
Develop scripts and code with security tools.
Develop processes and schedule to review existing methodologies and queries for all divisional metrics.
Become knowledgeable on the CDM technical requirements for the CDM program.
Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Design, manage, and maintain agency SIEM infrastructure to improve data ingestion processes, including architectural work on data pipelines to ensure optimal flow of data.
Maintenance, configuration, and implementing products, appliances and devices on the network.
Required Candidate Qualifications:
US Citizenship Required and ability to obtain and maintain a Public Trust
Bachelors Degree and 7 experience; or Masters Degree and 5 years of relevant Cyber Security experience; or 11 years experience in lieu of Degree.
Active Splunk Core Certifications of User, Power User and Admin
Minimum 3 years of experience developing and tailoring reporting from network security tools.
At least 6 years experience using Splunk (specifically Splunk Scripting and on-boarding of large collection of meta data from different sources into Splunk.
At least 4 years of experience with:
In depth knowledge of designing, upgrading, maintaining, and implementing network devices on a large scale enterprise.
Coordination and communication with other remotely deployed team members
Developing documentation with processes and procedures.
Proposing, implementing automation features in a large enterprise environment.
At least 2 years experience with:
Splunk Enterprise Security product.
Risk-based Alerting.
Analytics Driven Security
CyberCore has, on many occasions, expressed support and commitment to the principles of diversity and equal employment opportunity. It is CyberCore's policy to recruit, hire, train, and promote individuals, as well as administer all personnel actions, without regard to race, color, national or ethnic origin, age, religion, disability, sex, sexual orientation, gender identity and expression, veteran status or any other characteristic protected under applicable federal or state law. CyberCore will not tolerate unlawful discrimination and any such conduct is prohibited. CyberCore is committed to ensuring that CyberCore's workforce and volunteers reflect America's diverse population. CyberCore knows that such diversity will enrich the company with the talent, energy, perspective and inspiration we need to achieve our mission.
Auto-ApplyComputer Systems Security Analyst (Splunk)
Baltimore, MD jobs
JOIN THE CYBERCORE TECHNOLOGIES TEAM
.
We are Growing! Bring your Technical Capabilities, Enthusiasm, and Team Focus.
Seeking Candidates for a New Computer Systems Security Analyst (Splunk)
US Citizenship or Permanent Residency (Green Card holder) required.
Job Description:
•Write complex SPL to develop advanced Splunk dashboards and queries.
•Work with customers to develop custom content, maintaining consistently high-quality communications.
•Develop processes and schedule to review existing methodologies and queries for all divisional metrics.
•Become knowledgeable on the CDM technical requirements for the CDM Program.
•Understand role in CDM activities.
•Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
•Design, manage and maintain SIEM infrastructure to improve data ingestion processes, including architectural work on data pipelines to ensure optimal flow of data.
Maintenance, configuration and implementing products, appliances and devices on the network.
Required Candidate Qualifications:
United States Citizenship or Permanent Residency Required due to Clearance /Security /Government Needs.
Bachelor's degree and 7 years of related experience, Master's degree and 5 years of related experience, or 11 years of experience in lieu of degree.
At least 6 years' experience using Splunk, specifically Splunk scripting and on-boarding of large collection of meta data from different sources into Splunk
A minimum of 4 years of experience with:
In-depth knowledge of designing, upgrading, maintaining and implementing network devices on a large-scale enterprise.
Coordination and communication with other remotely deployed team members.
Developing documentation with processes and procedures.
Proposing, implementing automation features in a large enterprise environment.
Hold Active Splunk Core Certifications of User, Power User and Admin
Minimum of 3 year of experience in developing and tailoring reporting from network security tools.
Must be able to obtain and maintain US Public Trust Clearance.
.
At CyberCore, Our Goal is to Maintain a Healthy Work-Life Balance and Provide Interesting Work Supporting Our Nation's Security. For more information on CyberCore Technologies, go to
*********************
CyberCore Technologies is proud to be an Equal Opportunity Employer.
CyberCore has, on many occasions, expressed support and commitment to the principles of diversity and equal employment opportunity. It is CyberCore's policy to recruit, hire, train, and promote individuals, as well as administer all personnel actions, without regard to race, color, national or ethnic origin, age, religion, disability, sex, sexual orientation, gender identity and expression, veteran status or any other characteristic protected under applicable federal or state law. CyberCore will not tolerate unlawful discrimination and any such conduct is prohibited. CyberCore is committed to ensuring that CyberCore's workforce and volunteers reflect America's diverse population. CyberCore knows that such diversity will enrich the company with the talent, energy, perspective and inspiration we need to achieve our mission.
Auto-ApplyInformation Security Analyst
Seattle, WA jobs
Discover your future at DAT Freight & Analytics, where innovation meets impact. For over four decades, DAT has been at the forefront of transportation and logistics, helping businesses move freight with greater efficiency and confidence. We are a technology company that removes uncertainty from freight for truckers, brokers, and shippers every day. Our advanced tools and data intelligence empower professionals to make smarter decisions, optimize costs, and operate more successfully. Through the industry's largest digital freight marketplace and insights derived from over $1 trillion in freight transactions, we provide the mission-critical information that keeps supply chains running smoothly across the country. DAT is proud to be an award-winning workplace that fosters innovation, celebrates success, and values professional growth. With strategic offices in Beaverton, Oregon, Denver, Colorado, Springfield, Missouri, and Bangalore, India, our teams collaborate to solve the transportation industry's most complex challenges. Ready to shape the future of freight technology? Learn more at dat.com/company.
Application Deadline: 11/15/2025
The Opportunity
DAT is looking for a Information Security - Security Operations, to join our security team. This position can be based in our Seattle, WA office. The Information Security Analyst - Security Operations, will serve as a member of the Security Operations team, responsible for daily operational security activities that serve at the eyes and ears of incident response. This role is central to DAT's ability to detect, investigate, and respond to security incidents. You will be responsible for collaborating and maturing the SOC's structure, workflows and operational cadence, while ensuring our security posture is continually improved through monitoring, threat intelligence, and testing.
What You'll Do
Execute Security Operations Center Excellence including alerting, detection, investigation, and incident response activities across the organization.
Support and triage security alerts and incidents using SIEM, EDR, and other monitoring platforms; ensure timely escalation, investigation, and remediation.
Leverage threat intelligence feeds and IOCs to improve detection coverage and proactively identify emerging threats relevant to our environment.
Conduct and coordinate security testing including penetration testing with roadmapped plans to expand to more red/purple team testing to validate defenses.
Perform root cause analysis of incidents and drive improvements in monitoring and detection to reduce recurrence.
Document and refine incident response playbooks and ensure junior analysts are trained on consistent execution.
Contribute to security projects across multiple domains to help mature security programs
Collaborate with cross-functional teams to ongoing security control maturation and build trust based relationships throughout the organization
Ask questions and be forever curious, fostering a culture of continuous learning and operational excellence.
The Skills and Experience You'll Bring
Team Player with communication, organizational, and relationship management skills.
Self-motivated, with keen attention to detail and excellent judgment skills.
Knowledge threat detection and investigation tools such as SIEM (Splunk, QRadar, etc.), EDR/XDR solutions, and network monitoring platforms.
Knowledge of threat intelligence integration (IOCs, TTPs, threat feeds) into detection and response workflows.
Working knowledge of hybrid IT systems, networking, co-locations, and cloud environments.
Understanding of incident response frameworks, including NIST and SANS, with ability to perform forensic analysis and post-incident reviews.
1-3 years of experience in Security Operations, Incident Response, or related cybersecurity functions. Professional Certification preferred (e.g., Security +, CEH, CySA, OSCP or equivalent)
Why DAT?
DAT is an award winning employer of choice.
For starters, we have a hybrid work environment, but we also know what makes a great workplace. We have a time-tested and resolute set of operating values predicated on integrity, mutual respect, open communication, and executing with excellence. These values inform our strategic vision as much as any one of our products does. We've been an employer of choice in the Portland metropolitan area for four decades, and within one year of opening our Denver office, DAT was #26 on Built In Colorado's 100 Best Places to Work In Colorado.
Medical, Dental, Vision, Life, and AD&D insurance
Parental Leave
Up to 20 days of paid time off starting in year one
An additional 10 holidays of paid time off per calendar year
401k matching (immediately vested)
Employee Stock Purchase Plan
Short- and Long-term disability sick leave
Flexible Spending Accounts
Health Savings Accounts
Employee Assistance Program
Additional programs - Employee Referral, Internal Recognition, and Wellness
Free TriMet transit pass (Beaverton Office)
Competitive salary and benefits package
Work on impactful projects in a cutting-edge environment
Collaborative and supportive team culture
Opportunity to make a real difference in the trucking industry
Employee Resource Groups
For Washington-based candidates, in compliance with the Washington State Pay Transparency Law, the salary range for this role is $71,000 - $91,000. DAT considers factors such as scope and responsibilities of the position, candidate's work experience, education and training, core skills, internal equity, and market and business elements when extending an offer.
DAT embraces the value of a diverse workforce, and believes it is a core strength of our company that we encourage those values in every DAT employee, at every level of our organization, regardless of tenure or rank. We provide equal employment opportunities (EEO) to all employees and applicants without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
#LI-DR1
Auto-ApplyCyber Defense Analyst (Level 2 / 3rd Shift)
Orlando, FL jobs
Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations (C2Ops) Team in a highly visible enterprise environment that provides security operations center (SOC) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets.
Key Responsibilities:
• Serve as the initial point of contact for security operations floor activities
• Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
• Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
• Provide network forensic and intrusion detection support for high-technology investigations
• Document cyber incident analysis thoroughly at an operational level
• Support the detection, response, mitigation, and reporting of cyber incidents
• Maintain consistent and effective communication across the team
• Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential.
Basic Qualifications
- Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph.
- Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs.
- Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 1+ years of professional experience; or no years of professional experience with a related master's degree.
- Experience with standard security and network environment tools and applications (Splunk, Trellix ePO, ACAS/Tenable.sc, Tanium, Microsoft Sentinel) for use in supporting the detection, response, mitigation, and reporting of cyber incidents.
- Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations.
Desired skills
- Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph.
- Knowledge of other security disciplines and how they impact and interact with information system security.
- Experience with Splunk and the ability to write queries, create dashboards.
- Experience with QMulos Products.
- Experience with using and building Tanium products.
- Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis.
- Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system.
- Recognized cloud proficiency and experience with Cloud Security (CCSP, AWS, CSA, CompTIA Cloud+, CCSK, or others).
- Experience working in an Information System Security Operations Center conducting incident response and recovery.
- Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures.
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $76,500 - $134,895. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $88,000 - $152,490. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Cyber Defense Analyst (Level 1 / 1st Shift)
Orlando, FL jobs
Description:Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations (C2Ops) Team in a highly visible enterprise environment that provides security operations center (SOC) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets.
Key Responsibilities:
* Serve as the initial point of contact for security operations floor activities
* Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
* Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
* Provide network forensic and intrusion detection support for high-technology investigations
* Document cyber incident analysis thoroughly at an operational level
* Support the detection, response, mitigation, and reporting of cyber incidents
* Maintain consistent and effective communication across the team
* Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential.
Basic Qualifications:
* Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph.
* Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs.
* Experience with standard security and network environment tools and applications (Splunk, Trellix ePO, ACAS/Tenable.sc, Tanium, Microsoft Sentinel) for use in supporting the detection, response, mitigation, and reporting of cyber incidents.
* Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations.
Desired Skills:
* Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph.
* Bachelor's or master's degree from an accredited college in a related discipline.
* Knowledge of other security disciplines and how they impact and interact with information system security.
* Experience with Splunk and the ability to write queries, create dashboards.
* Experience with QMulos Products.
* Experience with using and building Tanium products.
* Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis.
* Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system.
* Recognized cloud proficiency and experience with Cloud Security (CCSP, AWS, CSA, CompTIA Cloud+, CCSK, or others).
* Experience working in an Information System Security Operations Center conducting incident response and recovery.
* Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Top Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 4x10 hour day, 3 days off per week
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: CORPORATE HEADQUARTERS
Relocation Available: Possible
Career Area: Cyber Security
Type: Full-Time
Shift: First
Cyber Defense Analyst (Level 2 / 3rd Shift)
Orlando, FL jobs
**Description:** Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations \(C2Ops\) Team in a highly visible enterprise environment that provides security operations center \(SOC\) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets\.
Key Responsibilities:
- Serve as the initial point of contact for security operations floor activities
- Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
- Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
- Provide network forensic and intrusion detection support for high\-technology investigations
- Document cyber incident analysis thoroughly at an operational level
- Support the detection, response, mitigation, and reporting of cyber incidents
- Maintain consistent and effective communication across the team
- Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks\. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential\.
**Basic Qualifications:**
\- Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph\.
\- Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs\.
\- Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 1\+ years of professional experience; or no years of professional experience with a related master's degree\.
\- Experience with standard security and network environment tools and applications \(Splunk, Trellix ePO, ACAS/Tenable\.sc, Tanium, Microsoft Sentinel\) for use in supporting the detection, response, mitigation, and reporting of cyber incidents\.
\- Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations\.
**Desired Skills:**
\- Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph\.
\- Knowledge of other security disciplines and how they impact and interact with information system security\.
\- Experience with Splunk and the ability to write queries, create dashboards\.
\- Experience with QMulos Products\.
\- Experience with using and building Tanium products\.
\- Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis\.
\- Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system\.
\- Recognized cloud proficiency and experience with Cloud Security \(CCSP, AWS, CSA, CompTIA Cloud\+, CCSK, or others\)\.
\- Experience working in an Information System Security Operations Center conducting incident response and recovery\.
\- Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures\.
**Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\.
**Clearance Level:** Top Secret with Investigation or CV date within 5 years
**Other Important Information You Should Know**
**Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\.
**Ability to Work Remotely:** Part\-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility\. The specific weekly schedule will be discussed during the hiring process\.
**Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\.
**Schedule for this Position:** 4x10 hour day, 3 days off per week
**Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.**
**The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.**
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\.
If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\.
**Experience Level:** Experienced Professional
**Business Unit:** CORPORATE HEADQUARTERS
**Relocation Available:** Possible
**Career Area:** Cyber Security
**Type:** Full\-Time
**Shift:** Third
Cyber Defense Analyst (Level 3 / 3rd Shift)
Orlando, FL jobs
**Description:** Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations \(C2Ops\) Team in a highly visible enterprise environment that provides security operations center \(SOC\) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets\.
Key Responsibilities:
- Serve as the initial point of contact for security operations floor activities
- Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
- Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
- Provide network forensic and intrusion detection support for high\-technology investigations
- Document cyber incident analysis thoroughly at an operational level
- Support the detection, response, mitigation, and reporting of cyber incidents
- Maintain consistent and effective communication across the team
- Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks\. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential\.
**Basic Qualifications:**
\- Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph\.
\- Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs\.
\- Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 3\+ years of professional experience; or no years of professional experience with a related master's degree\.
\- Experience with standard security and network environment tools and applications \(Splunk, Trellix ePO, ACAS/Tenable\.sc, Tanium, Microsoft Sentinel\) for use in supporting the detection, response, mitigation, and reporting of cyber incidents\.
\- Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations\.
**Desired Skills:**
\- Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph\.
\- Knowledge of other security disciplines and how they impact and interact with information system security\.
\- Experience with Splunk and the ability to write queries, create dashboards\.
\- Experience with QMulos Products\.
\- Experience with using and building Tanium products\.
\- Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis\.
\- Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system\.
\- Recognized cloud proficiency and experience with Cloud Security \(CCSP, AWS, CSA, CompTIA Cloud\+, CCSK, or others\)\.
\- Experience working in an Information System Security Operations Center conducting incident response and recovery\.
\- Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures\.
**Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\.
**Clearance Level:** Top Secret with Investigation or CV date within 5 years
**Other Important Information You Should Know**
**Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\.
**Ability to Work Remotely:** Part\-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility\. The specific weekly schedule will be discussed during the hiring process\.
**Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\.
**Schedule for this Position:** 4x10 hour day, 3 days off per week
**Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.**
**The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.**
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\.
If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\.
**Experience Level:** Experienced Professional
**Business Unit:** CORPORATE HEADQUARTERS
**Relocation Available:** Possible
**Career Area:** Cyber Security
**Type:** Full\-Time
**Shift:** Third
Cyber Defense Analyst (Level 1 / 1st Shift)
Orlando, FL jobs
**Description:** Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations \(C2Ops\) Team in a highly visible enterprise environment that provides security operations center \(SOC\) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets\.
Key Responsibilities:
- Serve as the initial point of contact for security operations floor activities
- Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
- Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
- Provide network forensic and intrusion detection support for high\-technology investigations
- Document cyber incident analysis thoroughly at an operational level
- Support the detection, response, mitigation, and reporting of cyber incidents
- Maintain consistent and effective communication across the team
- Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks\. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential\.
**Basic Qualifications:**
\- Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph\.
\- Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs\.
\- Experience with standard security and network environment tools and applications \(Splunk, Trellix ePO, ACAS/Tenable\.sc, Tanium, Microsoft Sentinel\) for use in supporting the detection, response, mitigation, and reporting of cyber incidents\.
\- Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations\.
**Desired Skills:**
\- Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph\.
\- Bachelor's or master's degree from an accredited college in a related discipline\.
\- Knowledge of other security disciplines and how they impact and interact with information system security\.
\- Experience with Splunk and the ability to write queries, create dashboards\.
\- Experience with QMulos Products\.
\- Experience with using and building Tanium products\.
\- Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis\.
\- Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system\.
\- Recognized cloud proficiency and experience with Cloud Security \(CCSP, AWS, CSA, CompTIA Cloud\+, CCSK, or others\)\.
\- Experience working in an Information System Security Operations Center conducting incident response and recovery\.
\- Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures\.
**Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\.
**Clearance Level:** Top Secret with Investigation or CV date within 5 years
**Other Important Information You Should Know**
**Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\.
**Ability to Work Remotely:** Part\-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility\. The specific weekly schedule will be discussed during the hiring process\.
**Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\.
**Schedule for this Position:** 4x10 hour day, 3 days off per week
**Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.**
**The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.**
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\.
If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\.
**Experience Level:** Experienced Professional
**Business Unit:** CORPORATE HEADQUARTERS
**Relocation Available:** Possible
**Career Area:** Cyber Security
**Type:** Full\-Time
**Shift:** First
Cyber Defense Analyst (Level 2 / 3rd Shift)
Orlando, FL jobs
Description:Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations (C2Ops) Team in a highly visible enterprise environment that provides security operations center (SOC) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets.
Key Responsibilities:
* Serve as the initial point of contact for security operations floor activities
* Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
* Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
* Provide network forensic and intrusion detection support for high-technology investigations
* Document cyber incident analysis thoroughly at an operational level
* Support the detection, response, mitigation, and reporting of cyber incidents
* Maintain consistent and effective communication across the team
* Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential.
Basic Qualifications:
* Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph.
* Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs.
* Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 1+ years of professional experience; or no years of professional experience with a related master's degree.
* Experience with standard security and network environment tools and applications (Splunk, Trellix ePO, ACAS/Tenable.sc, Tanium, Microsoft Sentinel) for use in supporting the detection, response, mitigation, and reporting of cyber incidents.
* Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations.
Desired Skills:
* Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph.
* Knowledge of other security disciplines and how they impact and interact with information system security.
* Experience with Splunk and the ability to write queries, create dashboards.
* Experience with QMulos Products.
* Experience with using and building Tanium products.
* Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis.
* Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system.
* Recognized cloud proficiency and experience with Cloud Security (CCSP, AWS, CSA, CompTIA Cloud+, CCSK, or others).
* Experience working in an Information System Security Operations Center conducting incident response and recovery.
* Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Top Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 4x10 hour day, 3 days off per week
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: CORPORATE HEADQUARTERS
Relocation Available: Possible
Career Area: Cyber Security
Type: Full-Time
Shift: Third
Information Security Analyst 2
New Bremen, OH jobs
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities