[Close] 

Info Assurance Engineer Senior

Job Description :
The selected individual will support ICBM programs. The ideal candidate will assess and mitigate system security threats/risks throughout the program life cycle; validate system security requirements definition and analysis; establish system security designs; implement security designs in hardware, software, data, and procedures to satisfy security requirements; and support secure systems operations and maintenance across the system. The Info Assurance Engineer will interface with Government counter-parts, as well as the subcontractor team members. The candidate will establish direction, provide alignment with program objectives, and meet multiple program commitments with a team of engineers across multiple segments (projects) and disciplines. The candidate will also work with SSC leadership to develop new work and business opportunities related to Cyber. Responsibilities include ensuring technical and schedule objectives are met. The Information Assurance Engineer will also interface with the Program Manager, Engineering Program Manager (EPM), Chief Engineer (CE), and Information Assurance (IA) Lead.
This position is contingent upon program award.
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Basic Qualifications
Excellent communication skills (verbal and written)
Experience working in a complex system integration environment
Familiarity with Network Security Architecture.
Cybersecurity professional with 8570.1 experience.
Demonstrated experience performing system security engineering activities in support of software and system requirements, design, development, testing and sustainment
Ability to provide guidance on DoD Cyber/IA regulations and requirements to engineering staff.
Desired skills
Ability to interact effectively with customers and senior program management
Experience working with the Air Force Customer
Experience with creation of Development and Operations products.
Demonstrated experience in managing an engineering skill set to achieve functional and programmatic requirements and goals
CISSP, GSLC, or CISM certified
Ability to work in an environment with evolving requirements and dynamic schedules
Demonstrated experience with risk and vulnerability assessments and mitigation
Experience with Secure Configuration/Hardening of DoD Information Systems.
Experience with system audit configuration, capture, analysis, and reduction.
Experienced and knowledgeable in the latest industry trends and developments in enterprise IA solutions.
Understanding of Air Force and government Operations and sustainment
As a leading technology innovation company, Lockheed Martin's vast team works with partners around the world to bring proven performance to our customers' toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Join us at Lockheed Martin, where we're engineering a better tomorrow.
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Job Location(s): Hill Air Force Base Utah
Security Clearance :
Secret
Business Unit :
ESS4400 SPACE SYSTEMS COMPANY
Program :
ICBM Programs
Job Class :
Information Security/Information Assurance
Job Category :
Experienced Professional
City :
Hill Air Force Base
State :
UT
Virtual :
No
Relocation Available :
Possible
Work Schedule :
9x80A-9,9,9,9,8 hrs/d in wk1, /9,9,9,9,off in wk2
Req Type :
Full-Time
Shift :
First
Additional Posting Locations :
Hill Air Force Base

. Apply now!

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.