Job ID:715409BR
Description: By bringing together people that use their passion for purposeful innovation, at Lockheed Martin we keep people safe and solve the world's most complex challenges.
At Lockheed Martin Rotary and Mission Systems (RMS), we are driven by innovation and integrity. We apply the highest standards of business ethics and visionary thinking to push the boundaries of what's possible. As a Lockheed Martin employee, you will have the opportunity to contribute to groundbreaking projects that shape the future of Aerospace and Defense. We value your skills, training, and education, and we are committed to providing a supportive environment where you can thrive.
The Work
As a Cyber Security Systems Engineer supporting the Air Force Special Operations Command (AFSOC) program, you will apply an interdisciplinary, collaborative approach to plan, design, develop, validate, and verify Cyber solutions across the lifecycle.
Your responsibilities will include:
Conducting cyber risk assessment activities, including vulnerability analysis, and analysis of mitigation solutions.
Conducting cybersecurity test and evaluation of hardware and/or software designs to verify and validate compliance with defined specifications and requirements.
Implementing appropriate Assessment and Authorization activities as required by customers.
Specific technical responsibilities include:
Evaluating Linux and Windows computing platform devices, network designs, and devices for cyber security vulnerabilities.
Assessing and driving mitigation efforts of system security threats/risks throughout the program lifecycle.
Validating system security requirements definition and supporting secure systems operations and maintenance.
Implementation of security policies to meet Risk Management Framework (RMF) objectives including monthly operating system (OS) and software patches and quarterly reviews of Security Technical Implementation Guidelines (STIG).
Interacting significantly with other technicians, analysts, and engineers to implement security designs, resolve vulnerabilities, modify system or software components security settings, and mitigate risk.
Who We Are