More jobs:
Cyber Security Technologist Security Clearance
Job in
King of Prussia, Montgomery County, Pennsylvania, 19406, USA
Listed on 2026-01-23
Listing for:
Lockheed Martin
Full Time
position Listed on 2026-01-23
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Job Description & How to Apply Below
Job Number 714768
Description:
The selected individual will serve as a Classified Cyber Security Technologist Sr. In this role, the selected individual will collaborate with a team of cybersecurity professionals and work closely with the Information System Security Manager(s) to implement and monitor comprehensive cybersecurity solutions. This will involve identifying, designing, securing, and deploying specialized applications and tools that support the governance and risk management of classified systems, infrastructure, and tools, ensuring the confidentiality, integrity, and availability of classified assets.
The selected candidate will also help design and document advanced risk governance operations to implement proactive security methodologies for classified programs. This position requires an understanding of Dev Sec Ops , Artificial Intelligence (AI), software development and related security controls, as well as a mindset focused on automation-enabled cybersecurity for day-to-day activities.
Basic Qualifications:
• Demonstratable experience with standard cybersecurity and network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc.
• Ability to manage multiple projects simultaneously in a dynamic and demanding environment.
• Excellent written and verbal communication skills, with the ability to effectively interface with numerous cognizant security agencies, customers, and senior leadership.
• Proven knowledge of the DCSA Assessment and Authorization Process Manual (DAAPM), Joint Special Access Program Implementation Guide (JSIG), or Risk Management Framework (RMF).
• DoD 8140/8570 IAT/M or IASAE Level-III Certification, such as: CISM, CISSP, CISSP-ISSAP, CISSP-ISSEP, or CCISO.
Desired
Skills:
• Demonstrated ability to manage the demands of multiple diverse customers, formulate and drive security direction, and ensure effective prioritization and delivery of security solutions
• Recognized proficiency in cloud computing, with certifications such as: o CSSP, AWS, CSA, CompTIA Cloud+, CCSK
o Other relevant cloud security certifications
• Proven experience working with complex operating systems and networks, including: o Data centers
o Cloud environments
o Cross-domain solutions
o NSA Type 1/Commercial Solutions for Classified (CSfC) encryption solutions
• Prior experience as an Information System Security Manager (ISSM) or Information System Security Officer (ISSO), with a proven track record of: o Collaborating with a team of ISSOs to satisfy requirements and achieve goals
o Providing leadership and guidance on information system security matters
• Demonstratable experience conducting internal and external customer assessments, including: o Identifying areas for improvement
o Providing recommendations for remediation
o Developing and implementing corrective action plans
• Proven ability to evaluate proposed changes or additions to the information system, including: o Assessing their security relevance
o Providing advisory support to the ISSM
o Ensuring compliance with relevant regulations and standards
• Demonstratable experience assisting in investigations of computer security violations and incidents, including: o Reporting and documentation as necessary
o Collaborating with incident response teams to resolve security incidents
• Proven experience implementing new and complex technologies at an enterprise level, including: o Ensuring seamless integration with existing systems
o Minimizing disruption to operations
o Providing training and support to users
• Familiarity with SIPRNet or JWICS cybersecurity requirements and architecture, including: o Ensuring compliance with relevant regulations and standards
o Implementing security controls and measures to protect sensitive information
o Collaborating with stakeholders to ensure the secure operation of SIPRNet or JWICS systems
• Understanding of Dev/Sec/Ops concepts and processes, with the ability to apply them in real-world scenarios, including:
o Expertise in Splunk, including:
Writing queries, Creating dashboards, Implementing third-party apps (e.g., Qmulos Products)
o
Experience with network design processes,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×