Cyber Analyst

Lockheed Martin Corporation Colorado Springs , CO 80928

Posted 2 months ago

Description:This position fulfills a Cyber technical role in support of the Lockheed Martin Rotary Mission Systems (RMS) Command and Control, Battle Management, and Communications (C2BMC) program.

The successful candidate will have a working knowledge of Cybersecurity controls for the Assessment of Mission systems. The candidate will be expected to communicate and work closely with process and system owners, information technology management, Cyber peers, Program Office technical/management staff and other C2BMC Functional Areas to ensure the relevance of architecture and system designs in implementing program requirements. The majority of the Assessment and Authorization (A&A) work will include technical documentation, working authorization packages in eMASS, assessing Cybersecurity vulnerabilities, engineering responses for system Plan of Action and Milestones (POA&Ms), conducting risk analysis for Risk Acceptance Requests (RARs) and providing Cybersecurity support for C2BMC program and Customer meetings.

In addition, the selected candidate will provide technical support to the C6ISR Cyber & Security Solutions Team (CaS2T) by ensuring program management and other program stakeholders are elated with performance execution and customer delivery to achieve mission success milestones.

Basic Qualifications:

  • Final Secret Clearance

  • DoDI 8570 certification (e.g., GSEC, Security+, SCNP, SSCP) or higher

  • The position requires a working knowledge of Information Assurance (IA) technologies, NIST standards, DoDI 8500.2 and SP 800-53

  • Must have experience in the Cybersecurity Lifecycle to include: requirements, design, development, implementation and deployment

  • Excellent technical document preparation and verbal communication skills are required

  • The position requires recent hands on Assessment & Authorization (A&A) experience with Risk Management Framework (RMF) packages

  • Strong working knowledge of IA concepts such as patch management, multi-factor authentication, host-based security, intrusion detection, security event management and defense-in-depth is required

  • Must have experience with RMF controls, Risk assessment, Plan of Actions and Milestones (POAMs), Information Assurance Vulnerability Management (IAVM) and compliance reporting for mission systems

Desired Skills:

  • Previous experience working with Missile Defense mission systems

  • Recent experience creating and updating A&A packages with the eMASS tool

  • PowerShell script creation, debugging and maintenance experience

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Sec Analyst

Engility Corporation

Posted 7 days ago

VIEW JOBS 11/14/2019 12:00:00 AM 2020-02-12T00:00 JOB DESCRIPTION: Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducts risk and vulnerability assessment at the network, system and application level. Conducts threat modeling exercises. Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy. Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff. Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff. Frequent use and application of technical standards, principles, theories, concepts and techniques. Receives assignments in the form of objectives and establishes goals to meet outlined objectives. Work is reviewed by supervisor/lead to measure meeting objectives. Directs established guidelines, procedures and policies. PROBLEM COMPLEXITY: Provides solutions to a variety of technical problems of moderate scope and complexity where analysis of situations or data requires a review of the variety of factors. FREEDOM TO ACT: Works under general direction on routine work. May receive detailed instructions on new projects or assignments. Follows established procedures. Work is reviewed for soundness of technical judgment, overall adequacy and accuracy. Exercises judgement within defined procedures and practices to determine appropriate action. IMPACT: Contributes to completion of milestones associated with specific projects. Failure to achieve results or erroneous decisions or recommendations may cause delays in program schedules and may result in allocation of additional resources. LIASON: Primarily internal company contacts. Infrequent inter-organizational andoutside customer contacts on routine matters. TYPICAL EDUCATION AND EXPERIENCE: Bachelors and two (2) years or more experience; Masters and 0 years related experience. Engility Corporation Colorado Springs CO

Cyber Analyst

Lockheed Martin Corporation