More jobs:
F-Information System Security Officer Mid-Career
Job in
Yuma, Yuma County, Arizona, 85366, USA
Listed on 2026-01-22
Listing for:
Lockheed Martin
Full Time
position Listed on 2026-01-22
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
*
* Description:
*
* ** What We're Doing:*
* Lockheed Martin's, Rotary & Mission Systems LM RMS , F 35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and war fighting capabilities that our citizens and the world depend upon to protect U S and ally interests Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment In this fast paced, real world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected
** The Work:*
* This Information System Security Officer ISSO position will support the Information System Security Manager ISSM in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F 35 systems at
** MCAS Yuma
** Typical ISSO responsibilities include but are not limited to:
+ Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems
+ Supporting the development and maintenance of cybersecurity related plans and procedures
+ Monitoring for non compliance, anomalous activity i e , threats , and effectively reporting such activity and associated risks
+ Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc and implementing, or overseeing, corrective actions
+ Creating, collecting and retaining data to meet reporting requirements
+ Monitoring and correlating data i e , events from a variety of sources e g , Splunk, ELA, ePO, ACAS, etc to identify and mitigate threats, vulnerabilities and non compliance
+ Investigating, analyzing and responding to cyber events, incidents and non compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties
+ Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media
+ Conducting self inspections and preparing for customer inspections
+ Interacting professionally during the enforcement of security policy and procedures
Assigned systems may vary in classification, capabilities and complexity Mission requirements may require other than first shift work and additional responsibilities as assigned
*
* Who we are:
*
* Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems
** Why Join Us:*
* Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee Lockheed Martin values your skills, training and education Come and experience your future
*
* Basic Qualifications:
*
* + Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five 5 years or enrollment in Continuous Vetting program
+ Ability to obtain and maintain Special Access Program SAP access
+ Possess a valid certification that meets or exceeds
** DoD 8570 01 M IAT II
** requirements
+ Meets: CCNA Security, CySA , GICSP, GSEC, Security CE, CND, SSCP
+ Exceeds: CASP CE, CCNP Security, CISA, CISSP or Assc , GCED, GCIH, CCSP
+ Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks
** Desired
Skills:
*
* + Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F 35 information systems
+ Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs e g , DoDI 8510 01, JSIG, DoDM 5205 07, NIST SP 800 series
+ Prior experience with the system authorization process, associated artifacts and their requirements e g , SSP, SCTM, Security CONOPs, SOPs
** Security Clearance Statement:
** This position requires a government…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×