Fourteen (14) years’ experience as an ISSE on programs and contracts of similar scope, type, and complexity is required. Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification is required.
Four (4) years of ISSE experience may be substituted for a bachelor’s degree.
E2544:Info Assurance Engineer Stf
At Lockheed Martin Rotary and Mission Systems, Cyber solutions, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach – and yours as Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Lockheed Martin invites you to create “new realities,” enabling solutions that have never been seen before. You’ll work with fast-paced teams on diverse challenges, from creating out-of-the-box Web apps to designing software for legendary advanced projects. Whatever the project, you can rely on the backing of a global technology leader with a culture that values innovative thinking and the resources that make it happen. Stand on the shoulders of a rich heritage of achievement as you write our next chapter.
Lockheed Martin is looking for an ISSE to join our team in our Annapolis Junction, MD office.So take on what’s never been done before. Become a Lockheed Martin software engineer. You are meant to solve the hardest challenges.
Job Specific Required Skills:
-design, development, implementation and/or integration of secure networking, computing, and enclave environments
-design, development, implementation and/or integration of IA architectures, systems, or system components
-design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments
-Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
-Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments
-Support security planning, assessment, risk analysis, and risk management