F-35 Information System Security Manager (ISSM) - ANG

Lockheed Martin Corporation
Madison, WI, United States
Full-time
Part-time
We are sorry. The job offer you are looking for is no longer available.

Description : Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Our amazing employees are on a mission to make a difference in the world and every single day we use our unique skills and experiences to create, design and build solutions to some of the worlds’ hardest engineering problems.

Do you want to be part of a culture that encourages employees to think big, perform with excellence and build incredible products?

We provide the resources, inspiration and focus - if you have the passion and courage to dream big, then we want to build a better tomorrow with you.

At Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach and yours as a Lockheed Martin employee.

Lockheed Martin values your skills, training and education. Come and experience your future!The Information System Security Manager (ISSM) is responsible for the F-35 cybersecurity program at multiple ANG locations, to include : Burlington ANGB, VTDannelly Field ANGB, ALTruax Field ANGB, WIThe selected candidate will operate from an existing F-35 site, to include but not limited to the above locations.

The ISSM leads the Information System Security Officer(s) (ISSO) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems.

Typical responsibilities of the ISSM include : Developing and maintaining the site’s F-35 cybersecurity program for assigned systems.

Leading and managing assigned ISSO(s) in successful execution of the site’s F-35 cybersecurity program, to include assuming responsibilities of the ISSO(s) in their absence.

Ensuring all applicable cybersecurity policy, plans and procedures are followed.Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.

Developing and maintaining cybersecurity related plans, procedures and guidance.Monitoring and recognizing non-compliance, suspicious and anomalous activity (i.

e., threats), and effectively reporting such activity and associated risks to the appropriate parties.Ensuring plans of actions and milestones or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc.

and implementing, or overseeing, required corrective actions.Conducting role-based cybersecurity training for assigned users.

Creating, collecting and retaining data to meet reporting requirements.Monitoring and correlating data (e.g., logs, events, activity, etc.

from a variety of sources (e.g., Splunk, ELA, ePO, ESS, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.

Investigating, analyzing and responding to cyber events, incidents and non-compliance, to include trend analysis, assembling detailed written reports and briefing the appropriate parties.

Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.

Basic Qualifications : Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.

Ability to obtain and maintain Special Access Program (SAP) access.Possess a valid certification that meets or exceeds DoD 8570.

01-M IAM II () requirements.Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.

Desired Skills : Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.

Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.

g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).Prior experience with the system authorization process, associated artifacts and their requirements (e.

g., SSP, SCTM, Security CONOPs, SOPs).Security Clearance Statement : This position requires a government security clearance, you must be a US Citizen for consideration.

Clearance Level : Secret with Investigation or CV date within 5 yearsOther Important Information You Should KnowExpression of Interest : By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match.

Should this match be identified you may be contacted for this and future openings.Ability to Work Remotely : Part-time Remote Telework : The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility.

The specific weekly schedule will be discussed during the hiring process.Work Schedules : Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees.

Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.

Schedule for this Position : Non- standard 40 hour work week as assigned by leaderLockheed Martin is an Equal Opportunity / Affirmative Action Employer.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.

At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges.

Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility.

Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work.

We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.

If this sounds like a culture you connect with, you’re invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications.

Experience Level : Experienced ProfessionalBusiness Unit : RMSRelocation Available : PossibleCareer Area : Information Security / Information AssuranceType : Full-TimeShift : First

13 days ago
Related jobs
Promoted
Lockheed Martin
Madison, Wisconsin

The ISSM leads the Information System Security Officer(s) (ISSO) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems. Information System Security Manager (ISSM). Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information sys...

Promoted
Canonical - Jobs
Madison, Wisconsin

Participate in the creation and or maintenance of the Information Security Management System. IaC, IAM, network security, systems security, cryptography. The Security Compliance Engineer works in the office of the CISO in the Risk & Compliance team to help Canonical to achieve overall security &...

Promoted
Lockheed Martin
Madison, Wisconsin
Remote

Seeking a skilled and motivated security manager with strong special access program knowledge and experience to perform in the role of F-35 Deputy Security Manager for the USAF and ANG military installations participating in the F-35 program. Leadership responsibilities will include providing guidan...

Promoted
Capital One
Shorewood Hills, Wisconsin

Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Senior Manager, Information Security Office (ISO) Consultant. Professional c...

Recruiters
Madison, Wisconsin

Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Senior Manager, Information Security Office (ISO) Consultant. Professional c...

Gundersen Health System
Wisconsin

Integrate security designs to ensure the organizations proprietary information (data and systems) are safeguarded on simple to moderately complex systems. Analyzes security management systems, enterprise systems, and data files to validate security. Involves implementing and testing new security fea...

Ryder System, Inc.
Madison, Wisconsin
Remote

Will be Responsible for facility security system designs, implementation and specification of alarm systems, access control, video surveillance, intrusion detection, and all other types of physical security equipment to achieve security program goals for special projects and initiatives. Responsible...

Promoted
Serigor Inc.
Madison, Wisconsin
Remote

The service being provided through this RFS will be responsible for developing and maintaining system security plans, ensuring compliance with client policy, standards, and regulatory requirements, and conducting thorough security assessments to safeguard our organization's information assets. S...

Promoted
GLOBAL OPTICS, INC.
WI, United States

To perform the Systems Administrator job successfully, an individual must be able to perform each essential responsibility satisfactorily. These requirements are representative, but not all-inclusive, of the knowledge, skill, and ability required of the company Systems Administrator. Information tec...

Promoted
Tanson Corp
Madison, Wisconsin
Remote

The Client is looking for a Security Analyst IV. Information Security Risk Assessment: Identifies, analyzes, evaluates, and documents information security risks and controls based on established risk criteria. Experience evaluating and implementing vendor security offerings 4+ years. Risk Management...