Information Systems Security Engineer; ISSE/Top Secret/Onsite: FL
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
Lockheed Martin is seeking a seasoned classified cyber security technologist to join an elite team of cybersecurity professionals. Reporting to the Information System Security Manager(s), you will design, implement, and monitor advanced security solutions that protect classified systems, infrastructure, and high‑performance computing clusters (HPCC). Your work will drive proactive risk governance, automation‑enabled operations, and ensure the confidentiality, integrity, and availability of the nation’s most sensitive assets.
Key Responsibilities- Secure Solution Development – Identify, architect, and deploy specialized applications and tools that meet classified system governance and risk‑management requirements.
- HPCC Protection – Apply security controls and mitigations to high‑performance computing environments, safeguarding large‑scale distributed workloads.
- Automation & Operations – Build and maintain automated cyber security workflows for day‑to‑day monitoring, incident response, and compliance reporting.
- Risk Governance – Design and document advanced risk governance processes, supporting proactive security methodologies across enterprise‑wide classified programs.
- Collaboration – Partner with ISSMs/ISSOs, system engineers, and senior leadership to translate security requirements into verifiable, validated controls.
- Log Management & Analytics – Deploy and tune the ELK stack (Elasticsearch, Logstash, Kibana) for secure log aggregation, analysis, and visual reporting in a classified environment.
- Compliance Implementation – Implement NIST SP 800‑53 controls and maintain alignment with DoD security frameworks (RMF, DAAPM, JSIG).
- DoD 8140/8570 IASAE Level III certification (CISM, CISSP, CISSP ISSAP, CISSP ISSEP, CCISO, etc.)
- Hands‑on experience in information system security engineering (ISSE) or a comparable cyber security role, specifically supporting HPCC or large‑scale distributed systems.
- Proven ability to define, verify, and validate security requirements.
- Experience creating, reviewing, and updating system designs and architecture.
- Strong Linux background (RHEL, CentOS, Ubuntu or similar) for system administration, kernel hardening, package management, and security‑focused configurations.
- Direct experience implementing NIST SP 800‑53 security controls.
- Proficiency with the ELK stack for log aggregation, analysis, and visualization in a classified environment.
- Capacity to manage multiple projects in a fast‑paced, demanding setting.
- Demonstrated skill building effective customer and partner relationships.
- Top‑Secret clearance, with ability and willingness to obtain TS/SCI w/Poly.
- Familiarity with JWICS cyber security requirements and architecture.
- Expertise as an SME in DCSA Assessment and Authorization Process Manual (DAAPM), Joint Special Access Program Implementation Guide (JSIG), or the Risk Management Framework (RMF).
- Recognized cloud proficiency (CSSP, AWS, CSA, CompTIA Cloud, CCSK, or similar).
- Experience with complex operating systems, data center and cloud environments, cross‑domain solutions, and NSA Type 1/Commercial Solutions for Classified (CSfC) encryption.
- Prior ISSM/ISSO experience leading teams of ISSOs to meet program security objectives.
- Excellent written and verbal communication skills for interfacing with cognizant security agencies, customers, and senior leadership.
- Advanced Splunk expertise‑writing queries, building dashboards, and integrating third‑party apps (e.g., QMulos).
- Broad understanding of intersecting security disciplines and their impact on information system security.
- Knowledge of network design processes, security objectives, operational goals, and risk mitigation strategies for information systems.
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Work Schedule InformationLockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees.…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).