Cyber Security Analyst

Lockheed Martin
Tewkesbury
7 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst - Training Course

GRC Analyst - Cyber Security

Trainee Cyber Security Analyst - No experience needed

Trainee Cyber Security Analyst - Training Course

Join to apply for theCyber Security Analystrole atLockheed Martin

Join to apply for theCyber Security Analystrole atLockheed Martin

Get AI-powered advice on this job and more exclusive features.

Direct message the job poster from Lockheed Martin

Recruitment Business Partner - Lockheed Martin

Cyber Security Analyst

Great salary, BUPA and benefits

Remote Working with 4 Day Work Week

Here at Lockheed Martin we are seeking a Cyber Security Analyst / Cyber Intel Analyst who will work within a globally dispersed team of intelligence analysts with the mission of defending the enterprise’s computing assets.

Lockheed Martin is a global aerospace, defense, security, and advanced technologies company with global interests.

Lockheed Martin’s computing environment stretches to every continent and houses cutting edge intellectual property.

About the role:

This role will be an integral part of Lockheed Martin’s Computer Incident Response Team (LM-CIRT) and will work in the Global Defense and Intelligence Mission Area.

This role is responsible for defending the enterprise against network intrusion activity originating from criminal and nation state adversaries.

It is focused on supporting effective execution of operational workflows, analytical completeness, enhancing tradecraft, and implementing resilient countermeasures.

The ideal candidate for this position has proven experience working in highly effective global teams, is an advanced analyst in the cyber security realm, is proficient in incident response activities and has a passion for innovation and collaboration.

The responsibilities of this role include, but are not limited to:

  • Computer network defence and incident response
  • Thorough documentation of analysis at an operational level
  • Ensuring analysis and remediation efforts across the enterprise are followed through to completion
  • Leading initiatives, analytical research and hardening across the enterprise
  • Advanced Threat Actor campaign development
  • Creation and maintenance of resilient detections and countermeasures
  • Consistent and effective communication across the team and the wider organization
  • Managing priorities and workloads with established accountability to deliverables

Other useful info:

Our incident response team consists of a geographically dispersed global workforce serving mission excellence from four strategically located Security Intelligence Centers (SIC).

The members of our CIRT team include a combination of analysts and technologists, with varying backgrounds and specialties, practicing the core tenets of Intelligence Driven Defense (IDD).

Our mission is governed by principles including IDD, advanced counter measures, agile development of custom technologies, and cross industry collaboration.

Lockheed Martin sets the global standard in enterprise cyber security.

What skills will I need?

  • Ability to obtain and maintain a MoD Secret Clearance
  • At least 5 years of experience in computer network defense or related field; or 3 years of experience with relevant Masters degree
  • Excellent technical knowledge of large-scale computer network environments
  • Demonstrated background using computer network defense tools, processes, and tradecraft.
  • Experience in a broad spectrum of technologies including intrusion detection systems, security information and event management (SIEM), and forensic tools.
  • Demonstrated excellence in technical writing and communication
  • Demonstrated experience progressing cyber initiatives in large-scale, globally dispersed and highly collaborative environments

Desired Skills:

  • Proficiency in Unix/Linux command line
  • BASH knowledge including BASH Shell Scripting would be very useful
  • Demonstrated experience developing and maintaining custom detection capabilities using programming and development expertise, including Python, Shell scripting, and regular expressions
  • Demonstrated experience with in-depth security log analysis
  • Reverse engineering of malware
  • Demonstrated proficiency with SIEM and Enterprise Security technologies
  • Experience with Cloud technologies and services
  • Experience in host and network-based security technologies
  • Experience in detection tooling such as Yara, Suricata or CrowdStrike IOAs

Equal Opportunity Statement

Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment.

Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence.

By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value.

We know that diversity of thought leads to better solutions for our customers.

Our top priority is finding the best candidate for the job and if you are interested in the position, we’d love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don’t believe you meet every one of the criteria set out in our job advert.

In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process.

If you require assistance or adjustments to participate in the job application or interview process, please contact or call 023 92 458 000.

Seniority level

  • Seniority levelMid-Senior level

Employment type

  • Employment typeFull-time

Job function

  • Job functionEngineering and Information Technology
  • IndustriesDefense and Space Manufacturing, IT Services and IT Consulting, and IT System Design Services

Referrals increase your chances of interviewing at Lockheed Martin by 2x

Get notified about new Cyber Security Analyst jobs inGloucestershire, England, United Kingdom.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.


#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.