Back to Jobs

Cyber Security Engineer

#25751489

USA Right to Hire On-Site Flexibility/Remote: 100%

Posted on

• Develop an understanding of an existing suite of applications implemented with multiple technologies, including but not limited to:
o Cloud-based services (e.g., AWS, Azure, Google Cloud)
o On-premises applications (e.g., Windows, Linux, mainframe)
o Mobile and web applications
o Datalakes and databases
o External SaaS integrations including Ariba, Exostar, NS2, Fieldglass, and BMC
o Applications developed in-house by Lockheed Martin
• Analyze the identity and access management patterns of each tool, including:
o Authentication protocols (e.g., OAuth, SAML, LDAP)
o Authorization mechanisms (e.g., RBAC, ABAC)
o Identity lifecycle management (e.g., provisioning, deprovisioning)
• Leverage previous experience directly integrating with and implementing security and identity controls to identify areas for improvement, and suggest enhancements to the identity and access management patterns, including:
o Recommendations for security controls and countermeasures
o Improvements to authentication and authorization protocols
o Enhancements to identity lifecycle management processes
• Document and maintain a governance framework for identity and access management, including:
o Policies and procedures for identity and access management
o Standards for authentication and authorization protocols
o Guidelines for identity lifecycle management
• Collaborate with cross-functional teams, including development, operations, and compliance, to ensure aligned security and governance practices
• Stay up-to-date with emerging trends and technologies in IAM and security, and apply this knowledge to continuously improve our IAM systems and processes

• Overall, 10+ years' experience in information management or information security roles
• 5+ years' experience (of the total) in identity engineer roles
• Bachelor's degree in Computer Science, Information Technology, a related field, or equivalent professional experience.
• Experience directly integrating with and implementing security and identity controls within in a variety of applications, including authentication platforms such as directory services or federation
• Clear understanding of the large enterprise Identity and Access Management landscape including how authentication and authorization are related to enterprise operations
• Proficiency in analysis and evaluation of complex systems and technologies
• Excellent communication and collaboration skills, with the ability to work effectively with technical and non-technical stakeholders
• Experience with security automation and orchestration tools (e.g., Ansible, Jenkins)
• Familiarity with agile development methodologies and version control systems (e.g., Git)
• Certification in IAM or a related field, such as CISSP, CISM, or CEH
Apply now