Information System Security Officer
@ Lockheed Martin

Colorado Springs, CO
$120,000
On Site
Full Time
Posted 8 hours ago

Your Application Journey

Personalized Resume
Apply
Email Hiring Manager
Interview

Email Hiring Manager

XXXXXXXX XXXXXXXXX XXXXXXXX***** @lockheedmartin.com
Recommended after applying

Job Details

Overview

Lockheed Martin’s Rotary & Mission Systems (LM RMS), Classified Cyber Security, invites you to tackle one of today’s most challenging roles. As an Information System Security Officer at Lockheed Martin, you will safeguard sensitive information and warfighting capabilities, supporting U.S. and ally interests.

Role and Responsibilities

The Information System Security Officer is responsible for cybersecurity efforts at the Colorado Springs, CO facility. Key duties include:

  • Maintaining the site’s cybersecurity program for assigned systems.
  • Ensuring compliance with applicable cybersecurity policies and procedures.
  • Implementing and validating security controls and continuous monitoring.
  • Developing cybersecurity plans and conducting role-based training.
  • Monitoring logs and correlating data (Splunk, ePO, ESS, ACAS) to mitigate threats.
  • Investigating cyber events, analyzing incidents, and reporting risks.
  • Ensuring proper handling and storage of Government data and electronic media.
  • Conducting inspections and preparing documentation for audits.

Key Skills/Competency

Cybersecurity, Risk Management, Incident Response, Compliance, Monitoring, Training, Analysis, Government Security, Collaborative, Technical

How to Get Hired at Lockheed Martin

🎯 Tips for Getting Hired

  • Customize your resume: Highlight cybersecurity certifications and experience.
  • Research Lockheed Martin: Understand their latest aerospace and defense projects.
  • Prepare for technical questions: Review incident response and monitoring tools.
  • Practice behavioral interviews: Emphasize teamwork and leadership skills.

📝 Interview Preparation Advice

Technical Preparation

Review Splunk and ePO troubleshooting techniques.
Study cybersecurity frameworks and government standards.
Practice incident response simulations and log analysis.
Update knowledge on continuous monitoring tools.

Behavioral Questions

Describe a time you solved a security incident.
Explain working with cross-functional teams effectively.
Discuss managing compliance under pressure.
Share an experience of taking initiative in training.

Frequently Asked Questions