Bachelor of Science in one of the following areas: Computer Science, Software Engineering, Electrical Engineering, Computer Engineering.
Experience with Open System Architecture design and partitioning.
Prior real-time embedded system design experience.
Familiarity with the DoD system development lifecycle.
Experience delivering written and oral presentations to program personnel and customers.
Ability to maintain a security clearance and considered a US Citizen.
Secret clearance is required to start.
E2542:Info Assurance Engineer
At Lockheed Martin, you’ll have an opportunity to create a better world every day. For most individuals, our work challenges belong merely to headlines and tweets. But our employees routinely experience a broad range of programs and projects, each geared to important human needs. Whatever your assignment, you’ll use your education and experience to take on formidable challenges. Meanwhile, you can rely on the resources of a global technology leader to back the kind of innovation that has characterized our historic breakthroughs.
The Cyber-security Engineer will applycyber-security policies principles, and practices in the delivery of all Department of Defense (DOD) technology solutions. You will develop recommendations and courses of action to solve complex embedded cyber-security problems. The candidate will participate as a security engineering representative on engineering teams for the design, development, implementations and/or integration of DOD tactical systems.
In addition, you will identify securityrisks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.
The selected candidate will assist architects and system developers in the identification and implementation of appropriate cyber-security functionality to ensure uniform application of DOD security policy and apply system security engineering expertise in one or more of the following: system security design process; engineering life cycle; cross domain solutions; cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; auditing; certification and accreditation process; security verification testing.
Candidate will prepare all Risk Management Framework (RMF) artifacts required of the contractor (and system owner, if required) to achieve Authority to Operate. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system securitythreats/risks throughout the program life cycle. Designs perimeter defense systems including intrusion detection systems, firewalls, sensors, etc.; ability to enhance rule sets to detect or block sources of malicious traffic; and establishes a protective net of layered defenses to prevent, detect, and eradicate threats.
Monitors and evaluates the effectiveness of cyber-securitysecurity procedures and safeguards to ensure they provide the intended level of protection.
Knowledge of DOORS and requirements development / flow-down.
Familiarity with Modeling and Simulation (M&S) tools, e.g., MATLAB / Simulink.
Experience with Model Based Systems Engineering (MBSE) tools (e.g., Rational Rhapsody, Enterprise Architect), DODAF views, development of MBSE diagrams.
Penetration testing experience including use of tools such as those found in Kali Linux, Backtrack, or equivalent.
Knowledge of at least one of: secure boot implementations, cryptographic key management, state of the art cryptographic architectures for power-limited solutions.
Demonstrated experience in at least one of the following: defeating physical anti-tamper mechanisms, performing and defending against side-channel and fault-injection attacks, and/or reverse-engineering and exploitation of embedded systems hardware and protocols.
Knowledge of AT- and Cyber-related governance, e.g., RMF, LO/CLO.
Familiarity with Anti-Tamper architectures, to include AT System design and/or vulnerability assessment.
Understanding of NSA-approved cryptographic standards and methods.
Experience integrating software components from several different vendors and working with subcontractors.
Ability to think critically to find optimal approaches to difficult design issues.