• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Cyber Security Engineer / Associate Member Eng Staff

Cyber Security Engineer / Associate Member Eng Staff

2021-05-12 by Geo

cyber security job NJ

Cyber Security Engineer / Associate Member Eng Staff – Lockheed Martin Moorestown, NJ

Note: We may earn a commission from products or services when you click on a link and make a purchase.

At Lockheed Martin Rotary and Mission Systems, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach – and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training, and education. Come and experience your future!

This position is for a Cyber Security Engineer in Moorestown, NJ. This position will support multiple programs in the Integrated Warfare Systems & Sensors (IWSS) Line of Business (LOB). The successful candidate must have a strong system administration background with Cyber/Information Assurance (IA) training to design, test, and implement state-of-the-art secure operating systems and networks. Support a wide range of security issues including architectures, firewalls, electronic data traffic, network access, event management, and backup solutions. The position will support various programs and lab environments including Combat System Engineering Development Site (CSEDS) and Naval Systems Computing Center (NSCC).
Position

Requires a bachelor’s degree from an accredited college in related discipline and professional engineering experience, with hands-on experience in computing and network infrastructure components and technologies.

Motley Fool Stock Advisor

Specific Technical Responsibilities Include

  • Troubleshooting computers, networks, infrastructure and cyber security applications.
  • Evaluating Linux and Windows computing platform devices, network designs and devices for cyber security vulnerabilities.
  • Implementation of security policies to meet Risk Management Framework (RMF) objectives including monthly operating system (OS) and software patches and quarterly reviews of Security Technical Implementation Guidelines (STIG).
  • Significant interaction with other technicians, analysts, and engineers to implement security designs; resolving vulnerabilities, modifying system or software components security settings and mitigating risk.

READ 5 Reasons Why Cyber Security Certification Is Worth It

Detailed Documentation Responsibilities Include

  • Develop and/or support DIACAP/RMF eMASS accreditation packages for site and program systems
  • Identify, document, and maintain test results for DoD 8500.01 DIACAP/DoD 8510.01 RMF IA Controls (IACs)
  • Complete and/or support all required eMASS documentation including SIP, Implementation Plan, IAC Inheritance, Risk Assessment Report (RAR), PPSM Registration (if required) and POA&M.
  • Complete and/or support development of Contingency Plan, Incident Response, Configuration Management, and all other site plan testing activities.
  • Research and coordinate the implementation of vulnerability remediation (identified via ACAS and STIG/SCAP assessments) with subject matter experts, document and update POA&M and generate required reports and artifacts, as required.

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Basic Qualifications

  • Bachelor’s degree (BS/BA) in Computer Science, Computer Engineering, System Engineering, Info Security/Network Administration from an accredited college or related discipline with professional cyber experience.
  • Expertise in securing at least one of the following: Linux, Windows, or Cisco.
  • Have an understanding of NISPOM/DISA security requirements and know how to implement required security settings.
  • Developing core understanding of security engineering concepts as they relate to the Sec+ certification.
  • Developing understanding of Unix/Linux file system and command line.
  • Developing knowledge of for DoD 8500.01 DIACAP/DoD 8510.01 RMF IA Controls (IACs).
  • Ability to analyze security scan reports and develop/implement a plan to mitigate security vulnerabilities.
  • Security+ or CISSP certified
  • Ability to obtain and maintain DoD Security Clearance
  • All of the above or currently enrolled in the RMS Cyber Acceleration Program (CAP)

READ Cyber Security Bootcamp – Learn Online – Get Hired

Desired Skills

  • Proven experience in an engineering discipline.
  • Experience with Model Based Engineering, Agile methodologies, Automation techniques, or DevSecOps concepts
  • Vulnerability analysis using cyber security tools (e.g., ACAS, Nessus, SCAP, SCC, eMass, STIG Viewer).
  • Scripting experience (e.g. Python, Bash, Perl, Powershell).
  • Experience with Host Base Security System (HBSS) Deployment
  • Experience with Splunk, network security, and system security supporting event management tools, including SIEMs
  • Maintains Security relevant certifications such as: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Administrator (CISA)
  • Experience with Cyber Threat Analytics

Job Qualifications

BASIC QUALIFICATIONS:

Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience, and precision. They’re dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.


Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native


As a leading technology innovation company, Lockheed Martin’s vast team works with partners around the world to bring proven performance to our customers’ toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.


Experience
Level: 4 yr and up College

LinkedIn Apply
Apply on LikedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version