Description:This position is a Blue Sky opportunity contingent on the award of positions associated with GSM-O.What We’re Doing:Lockheed Martin invites you to step up to one of today’s most daunting challenges: the use of advanced electronics to undermine our way of life. As a cybersecurity professi

Cyber Security Defense Analyst- (Entry Level)

Lockheed Martin • 
Columbus, Ohio, United States
Position Type: Permanent
Job Description:

Description:This position is a Blue Sky opportunity contingent on the award of positions associated with GSM-O.


What We’re Doing:
Lockheed Martin invites you to step up to one of today’s most daunting challenges: the use of advanced electronics to undermine our way of life. As a cybersecurity professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted flow of energy that keeps modern life moving. Here, you’ll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you’ll draw on all of your education and experience as well as the resources of Lockheed Martin to keep the threats at bay.

The Work:
The candidate will be a member of Network Assurance supporting a US Government customer as part of our Scott AFB, IL, Hill AFB, UT or Columbus, OH team. The candidate will perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS and custom sensor output as it pertains to the cyber security of communications networks, and participate in the coordination of resources during incident response efforts.

Enter into the cyber terrain that most people know only from headlines and sci-fi. Become part of the Cybersecurity Team at Lockheed Martin. You are meant to make a difference.
Basic Qualifications:
-Hold DoD-8570 baseline certification (Security+,
CEH, CYSA+, CISSP)
-Must possess an active Secret clearance.
-Practical experience with cyber specific analysis
tools.
-General understanding of intrusion detection
and incident response.
-Working knowledge of TCP/IP, common
networking ports and protocols, network traffic
flow, countermeasure techniques, OSI model,
defense-in-depth, Cyber Kill Chain or similar
attack model.
-Willing to perform shift work.
Desired Skills:
-Computer Network Defense experience
(Protect, Detect, Respond, and Sustain) within a
Computer Incident Response organization.
-Demonstrated understanding of the life cycle of
network threats, attacks, attack vectors, and methods of exploitation with an understanding
of intrusion set Tactics, Techniques, and
Procedures.
-Demonstrated hands-on experience analyzing
high volumes of logs, network data (e.g.
Netflow, Full Packet Capture), and other artifacts
in support of incident investigations.
-In-depth knowledge of architecture,
engineering, and operations of at least one
enterprise SIEM platform (e.g. Nitro/McAfee
Enterprise Security Manager, ArcSight, or Splunk).
-Experience and proficiency with any of the
following: Anti-Virus, HIPS, IDS/IPS, Wireshark,
Full Packet Capture, Host-Based Forensics,
Network Forensics, intel threat analysis.
-Familiar with encryption methods and encoding
of data.
-Experience with malware analysis concepts and
methods.
-UNIX/LINUX command line experience.
-Scripting and programming experience.
-Motivated self-starter with strong written and
verbal communications skills, and the ability to
create complex technical reports on analytic
findings.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Top Secret
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: Rotating 40 hour week as assigned by leader
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They’re dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.

As a leading technology innovation company, Lockheed Martin’s vast team works with partners around the world to bring proven performance to our customers’ toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Information Security/Information Assurance
Type: Task Order/IDIQ
Shift: Multiple shifts available

-Computer Network Defense experience
(Protect, Detect, Respond, and Sustain) within a
Computer Incident Response organization.
-Demonstrated understanding of the life cycle of
network threats, attacks, attack vectors, and methods of exploitation with an understanding
of intrusion set Tactics, Techniques, and
Procedures.
-Demonstrated hands-on experience analyzing
high volumes of logs, network data (e.g.
Netflow, Full Packet Capture), and other artifacts
in support of incident investigations.
-In-depth knowledge of architecture,
engineering, and operations of at least one
enterprise SIEM platform (e.g. Nitro/McAfee
Enterprise Security Manager, ArcSight, or Splunk).
-Experience and proficiency with any of the
following: Anti-Virus, HIPS, IDS/IPS, Wireshark,
Full Packet Capture, Host-Based Forensics,
Network Forensics, intel threat analysis.
-Familiar with encryption methods and encoding
of data.
-Experience with malware analysis concepts and
methods.
-UNIX/LINUX command line experience.
-Scripting and programming experience.
-Motivated self-starter with strong written and
verbal communications skills, and the ability to
create complex technical reports on analytic
findings.
(Job and company information not to be copied, shared, scraped, or otherwise disseminated/distributed without explicit consent of JSfirm, LLC)

JSfirm, LLC

Roanoke, TX

jobs@jsfirm.com

JSfirm LLC, Privacy Policy

All rights reserved. 2001-2024 JSfirm