Information Systems Security Officer (ISSO) Law Enforcement & Security at Geebo

Information Systems Security Officer (ISSO)

Job Description :
Perform cyber-security compliance tasks as an Information Systems Security Officer (ISSO), as specified by management and the facility's Information Systems Security Manager (ISSM). Verifying the implementation of procedural and technical aspects of the Lockheed Martin Information System Security Program as it applies to handling classified information according to well-defined processes and procedures, referring any unusual conditions requiring the exercise of discretion and judgment to the ISSM for resolution. Training will be provided in all processes, procedures, documentation, and specialized software tools necessary to complete assigned tasks, which may include any aspect of the National Industrial Security Program Operating Manual (NISPOM). Successful performance will be measured by conformance to these processes, procedures, documentation and proper use of software tools. Typical assigned work may include:
Supporting multiple programs to ensure implementation of cyber-security measures in accordance with facility procedures pertaining to administrative, operational, physical and personnel controls in accordance with NISPOM Chapter 8.
Conducting self-inspections to measure compliance of information systems configurations, providing proposed corrective actions to the ISSM.
Prepare, maintain, and implement System Security Plans (SSPs) that accurately reflect planned or existing hardware, software, and administrative cyber-security arrangements.
Notify Program Management and ISSM, when an IS no longer processes classified information, or when changes occur that might affect accreditation.
Ensure unauthorized personnel are not granted use of, or physical access to the information system and that system recovery processes are monitored to ensure security features and procedures are properly restored.
Implement facility procedures to govern marking, handling, controlling, removing, transporting, sanitizing, reusing, and destroying media and equipment containing classified information; ensuring that vendor-supplied authentication (password, account names) features or security-relevant features are properly implemented; reporting of IS security incidents and initiating, with the approval of the ISSM, protective or corrective measures when a security incident or vulnerability is discovered.
Prepare, record, process and maintain user agreements for each user of the system.
Implement and maintain security-related software for detection of malicious code, viruses, and intruders (hackers).
Prepare, revise, and implement System Security Plans (SSP) under the oversight of the ISSM. Ensure accreditation is continuously in place, tracking expiration dates.
Ensure SSPs accurately describe the classified information system (IS) and its cyber-security provisions, identifying any issues to the ISSM for resolution.
Perform end user training in cyber-security procedures, monitoring the system to identify non-compliance with established SSP and accreditation stipulations with reporting to the ISSM. This includes performing periodic audit log reviews of multi-platform systems, following up as needed by assembling pertinent facts and proposed corrective actions.
Participate in configuration management procedures for authorizing the use, maintenance, and disposal of hardware and software used to process classified information. This may include completing and maintaining access approvals, reports and briefings.
Perform or oversee data transfers from system to system, commonly known as trusted download or media transfers in accordance with established security procedures.
Basic Qualifications
Demonstrated customer service skills, ability to use common desktop applications (e.g. MS Office), attention to detail, above average interpersonal communication skills, ability to multi-task.
Desired skills
Experience with administrative methods and security-type tasks, such as ISSO tasks listed in the Job Description section. Functional skills at the power user level with Unix (Sun, HP, Linux) and Windows Operating systems. Knowledge of NISPOM Chapter 8 or related US Department of Defense cyber-security methods, processes, and procedures. COMPIA Security+CE or similar technical certifications.
As a leading technology innovation company, Lockheed Martin's vast team works with partners around the world to bring proven performance to our customers' toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Join us at Lockheed Martin, where we're engineering a better tomorrow.
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Job Location(s): Moorestown New Jersey
Security Clearance :
Secret
Business Unit :
ESS6500 RMS
Job Class :
Security
Job Category :
Hourly/Non-Exempt
City :
Moorestown
State :
NJ
Virtual :
No
Relocation Available :
No
Work Schedule :
TEMPO: 9X80A - Standard Fri to Fri (Flex & Rigid)
Req Type :
Full-Time
Shift :
First
Additional Posting Locations :
Moorestown
. Apply now!Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.