PitchMeAI
Lockheed Martin

Classified Cyber Security Staff

Lockheed Martin · Liverpool, NY

  • On site
  • Full-time
  • $120,000 / year
  • Liverpool, NY

Job highlights

  • Design and automate security controls for classified systems.
  • Enhance cyber resilience for sensitive data and capabilities.
  • Collaborate with cyber experts and program teams.
  • Focus on risk orchestration and continuous monitoring.
  • Requires active Secret clearance and specific certifications.

About the role

Job Summary

Lockheed Martin Rotary and Mission Systems (RMS) is seeking a senior member of the Classified Cyber Security Staff (Level 4) to join their team in Syracuse, NY. This role focuses on safeguarding the nation’s sensitive data and warfighting capabilities by embedding robust security controls into development, build, and deployment processes. You will collaborate with Information System Security Managers, cyber experts, military operators, and program teams to advise on design and architecture for continuous monitoring, risk-based security, and supply chain assurance. The position emphasizes designing and automating security controls rather than daily administration, enhancing Lockheed Martin’s classified cyber resilience.

What You'll Do

  • Holistic Risk Orchestration: Develop unified solutions for aggregated cyber tool data into a single risk view across programs.
  • Continuous Monitoring Architecture: Design end-to-end monitoring systems (Splunk, Qmulos) to normalize security events from classified environments.
  • Security as Code Pipelines: Automate security checks (config compliance, vulnerability scans, integrity verification) within CI/CD pipelines using Ansible and ePO.
  • Vulnerability Scanning: Integrate Nessus scans, automating scheduling, parsing, and remediation tracking.
  • Application & Hardware Whitelisting: Define and validate approved software and hardware baselines within build and procurement pipelines.
  • Q Compliance: Automate control mapping and reporting for NIST 800-53, DoD 8500, and CNSSI 1253, generating evidence for DCSA and DAAPM.
  • Ivanti SSCM: Manage configuration baselines and patch deployment, producing audit-ready records.
  • Supply Chain Risk Reviews: Collaborate with the CI Review Team to assess acquisitions, evaluate supplier artifacts, and recommend mitigations.
  • Advanced Risk Assessments: Conduct threat modeling, attack surface analysis, and RMF assessments, translating findings into architectural improvements.
  • Metrics & Dashboards: Define KPIs/KRIs and publish executive dashboards (e.g., Splunk) for continuous improvement.
  • Threat Hunting: Utilize analytics to uncover hidden activity and refine detection rules and automated response playbooks.
  • Security Control Design: Engineer network segmentation, DLP, Trellix endpoint protection, and encryption, verifying through automated testing.
  • Compliance Coordination: Ensure monitoring meets RMF and NIST 800-137, preparing evidence for oversight bodies.
  • Incident Response Automation: Create run books and orchestration scripts to reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) for classified incidents.
  • Stakeholder Collaboration: Act as the primary technical liaison for security reviews, ATO sustainment, and joint exercises, briefing leadership.
  • Knowledge Base Maintenance: Author and update SSPs, SOPs, and policy artifacts reflecting current capabilities.
  • Mentorship & SETA: Provide Security Engineering and Technical Assistance (SETA) training on monitoring, threat hunting, whitelisting, and ATT&CK; guide junior staff.
  • Reporting: Issue status reports, risk analyses, and executive summaries.
  • Other classified cybersecurity duties as assigned.

Basic Qualifications

  • Active Secret security clearance.
  • DoD 8570/8140 IAT Level II certification (e.g., Security+ CE, CySA+, CCNA Security, CND).
  • Ability to work independently with leadership direction and build strong team and customer relationships.
  • Strong technical root cause analysis skills with experience developing corrective actions, policies, and procedures.
  • Experience conducting risk and vulnerability assessments in line with regulations such as DCSA DAAG, NISPOM, NIST SP 800-53, and DISA STIGs.
  • Hands-on experience with cybersecurity tools including vulnerability scanners (Tenable), SIEM/auditing platforms (Splunk), endpoint protection (Trellix), and package submission tools (eMASS, XACTA).

Desired Skills

  • DoD 8570/8140 IAM Level II certification (e.g., CISSP, CISM, CASP+/SecurityX).
  • In-depth knowledge of NISPOM and DAAG.
  • Familiarity with security frameworks like JSIG, CNSSI 1253, and NIST SP 800-37 (RMF).
  • Bachelor’s degree in a relevant discipline, supplemented by 8+ years of professional experience.

Why Join Us

Lockheed Martin offers flexible schedules, competitive pay, and comprehensive benefits to support your health, wealth, and life. Learn more about our benefits package and how we support our employees so they can support our mission.

Key skills/competency

  • Cyber Security
  • Risk Assessment
  • Vulnerability Management
  • Security Controls
  • Splunk
  • Tenable
  • NIST 800-53
  • RMF
  • CI/CD Automation
  • Incident Response

Skills & topics

  • Cyber Security
  • Information Security
  • Risk Management
  • Vulnerability Assessment
  • Splunk
  • Tenable
  • NIST
  • RMF
  • Security Clearance
  • Lockheed Martin

How to get hired

  • Tailor your resume: Highlight your active Secret clearance, DoD 8570/8140 IAT Level II certification, and experience with vulnerability scanners, SIEM, and endpoint protection tools relevant to the Classified Cyber Security Staff role.
  • Showcase technical skills: Emphasize your experience with root cause analysis, risk and vulnerability assessments (NISPOM, NIST SP 800-53, STIGs), and automation in CI/CD pipelines.
  • Demonstrate relationship building: Provide examples of your ability to work independently, build team cohesion, and foster effective customer relationships.
  • Prepare for technical questions: Be ready to discuss your hands-on experience with tools like Tenable, Splunk, Trellix, eMASS, and XACTA, and your understanding of security frameworks.
  • Understand Lockheed Martin's mission: Research RMS's role in safeguarding national security and align your application with their values of innovation and integrity.

Technical preparation

Master vulnerability scanners like Tenable.,Implement and manage SIEM tools like Splunk.,Automate security checks with Ansible and ePO.,Understand and apply NIST SP 800-53 controls.

Behavioral questions

Describe a complex security issue you resolved.,How do you ensure team collaboration on security projects?,Provide an example of leading under leadership direction.,How do you prioritize tasks in a high-stakes environment?

Frequently asked questions

What level of security clearance is required for the Classified Cyber Security Staff position at Lockheed Martin?
An active Secret security clearance is a mandatory basic qualification for the Classified Cyber Security Staff role at Lockheed Martin. This clearance is essential for working with sensitive data and warfighting capabilities.
Which certifications are essential for the Classified Cyber Security Staff job at Lockheed Martin?
A DoD 8570/8140 IAT Level II certification, such as Security+ CE, CySA+, CCNA Security, or CND, is a required basic qualification. While not mandatory, an IAM Level II certification like CISSP or CISM is considered a desired skill.
Does the Classified Cyber Security Staff role at Lockheed Martin involve direct system administration?
No, the role centers on designing and automating security controls, rather than day-to-day administration. The focus is on enhancing Lockheed Martin's classified cyber resilience through proactive security measures and architectural improvements.
What type of tools and platforms are used by the Classified Cyber Security Staff at Lockheed Martin?
Candidates should have hands-on experience with industry-standard cybersecurity tools such as vulnerability scanners (e.g., Tenable), SIEM and auditing platforms (e.g., Splunk), endpoint protection solutions (e.g., Trellix), and package submission tools (e.g., eMASS, XACTA). Experience with Qmulos, Ansible, ePO, Nessus, Ivanti SSCM, and DAAPM is also relevant.
Can the Classified Cyber Security Staff position at Lockheed Martin be performed remotely?
While Lockheed Martin offers flexible schedules and mentions the ability to work remotely in other contexts, this specific position is listed as 'Onsite Full-time'. The work associated with this role will be performed at a designated Lockheed Martin facility in Syracuse, NY.
What educational background is preferred for the Classified Cyber Security Staff role at Lockheed Martin?
A Bachelor’s degree from an accredited institution in a relevant discipline is desired, supplemented by 8+ years of professional experience in the field. Strong practical experience and certifications can also be highly valued.
What are the key responsibilities of a Classified Cyber Security Staff member at Lockheed Martin?
Key responsibilities include designing and automating security controls, conducting risk and vulnerability assessments, implementing continuous monitoring, managing security pipelines, performing threat hunting, and collaborating with stakeholders to ensure the security of classified systems.