Information System Security Officer
@ Lockheed Martin

Colorado Springs, CO
$120,000
On Site
Full Time
Posted 5 days ago

Your Application Journey

Personalized Resume
Apply
Email Hiring Manager
Interview

Email Hiring Manager

XXXXXXXX XXXXXXXXXXXXX XXXXXXXX***** @lockheedmartin.com
Recommended after applying

Job Details

About the Role

Lockheed Martin’s Rotary & Mission Systems invites you to step up to one of today’s most daunting challenges. As an Information System Security Officer at Lockheed Martin, you will safeguard sensitive information and warfighting capabilities to protect U.S. and allied interests.

Key Responsibilities

  • Maintain the cybersecurity program for assigned systems.
  • Ensure adherence to cybersecurity policies, procedures, and plans.
  • Monitor for non-compliance, suspicious activities, and threats.
  • Develop, update and enforce cybersecurity plans and guidance.
  • Conduct cybersecurity training and produce detailed reports.
  • Correlate data from various sources (e.g., Splunk, ePO).
  • Investigate, analyze, and respond to cyber incidents.
  • Manage corrective actions and remediation plans.
  • Ensure proper handling and storage of government data.
  • Prepare for customer and self-inspections.

Key skills/competency

  • Cybersecurity
  • Information Technology
  • Risk Management
  • Compliance
  • Continuous Monitoring
  • Data Analysis
  • Incident Response
  • Training
  • Leadership
  • Communication

How to Get Hired at Lockheed Martin

🎯 Tips for Getting Hired

  • Customize your resume: Highlight relevant cybersecurity certifications and skills.
  • Research Lockheed Martin: Understand their mission and recent projects.
  • Showcase experience: Emphasize government or defense project work.
  • Prepare examples: Share instances of incident handling and monitoring.

📝 Interview Preparation Advice

Technical Preparation

Review cybersecurity frameworks and compliance standards.
Practice using security monitoring tools like Splunk.
Study incident response and risk management cases.
Familiarize with government data handling protocols.

Behavioral Questions

Describe a challenging cyber incident response.
Explain a time you enforced compliance procedures.
Share an experience working under pressure.
Discuss teamwork in high-stress situations.

Frequently Asked Questions