Information System Security Manager (ISSM)/F-35/MCAS at Lockheed Martin in Beaufort, SCother related Employment listings - Beaufort, SC at Geebo

Information System Security Manager (ISSM)/F-35/MCAS at Lockheed Martin in Beaufort, SC

Description:
At Lockheed Martin Rotary and Mission Systems (RMS), we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! This position is located at Marine Corp Air Station Beaufort, SC and supports the F-35 Program as an Information System Security Manager (ISSM) and Lockheed Martin Leader responsible for managing the day to day activities of F-35 Information System Security Officers (ISSOs) and monitoring information system security tasks on assigned information systems utilizing Joint Special Access Guide (JSIG), DoD 8500 documents, F-35 authorization documentation and other related DoD documents in the F-35 Pilot Training Center (PTC) and flying squadrons. Manages ISSOs across a diverse environment consisting of classified operations, unclassified operations and possible air vehicle support operations. Responsibilities also include developing system authorization documentation, develop and implement risk mitigation strategies for complex simulation and training systems and operational systems supporting F-35 Pilot training. The ISSM provides guidance to internal LM and Government customers on the multiple F-35 system boundaries at the PTC. In the absence of ISSOs, the ISSM will conduct ISSO duties such as auditing and Special Access Program Facilities (SAPF) management. Successful candidate must be knowledgeable of information technology security principles, COMSEC, Windows Servers/Clients, PC Desktops, LAN management, and Microsoft suite of applications. The ISSM ensures self-inspection reviews and system reviews are conducted on assigned systems. This is a multi-tasking environment that demands customer service, communication, and organizational skills. Mission requirements may require other than first-shift work. Perform Lockheed Martin responsibilities of an L-coded manager. Tasks would include supervising, scheduling and evaluating performance, etc of ISSOs. This is a mid senior level position. Basic
Qualifications:
1) Final Transferable Secret security clearance, last Periodic Reinvestigation (PR) must be within the last six years or enrolled in the Continuous Evaluation program. 2) Must have and maintain DOD 8570 IAM Level III certification before applying 3) Must be able to attain and maintain Special Access Program (SAP) access. 4) Understanding of configuration management principles. 5) Frequent use and application of technical principles, IA methodologies and concepts. 6) Keen attention to detail and adherence to established security policies. Desired Skills:
1) Experience working in a military environment. 2) Proven complex problem solver using ingenuity and creativity while working with a considerable amount of latitude. 3) One year experience with the day to day operations of an F-35 training center. 4) Knowledge of multiple F-35 boundaries supporting academics and flying operations such as Full Mission Simulators, Autonomic Logistics Information System, and Specialized Test Equipment. 5) Prior experience as an Information System Security Manager. 6) Ability to speak in front of large groups of people. 7) Prior experience as an L-coded manager.
Salary Range:
$80K -- $100K
Minimum Qualification
IT Security, Technology ManagementEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.