SlideShare a Scribd company logo
1 of 3
Download to read offline
United States Cybersecurity Magazine0
Identifying, hiring and retaining cyber specialists is
becoming increasingly competitive in today’s marketplace.
Corporations, government, and other organizations
are actively seeking skilled information technologists
with cybersecurity specialties such as intelligence
analysis and identification, forensics, and fusion. In
fact, more than 26,980 cybersecurity-related positions
were open in April 2015 on the popular job-seeking
website SimplyHired.com. Those seeking cyber job
opportunities are still finding it challenging to integrate
their operational skills with the strategic threat and cyber
analysis skills typically gained through hands-on training.
Lockheed Martin and Temple University’s Institute for
Business and Information Technology (IBIT) partnered to
combat this cyber talent crisis by hosting the first National
Cyber Analyst Challenge. The challenge was designed to
encourage and support the highest-performing students
currently pursuing cyber-related degrees in the nation’s top
cyber programs via a three-phase competition.
STARTING EARLY
The nation’s military academies have been conducting
simulation games for years known as Cyber Defense
Exercises (CDX).
The Cyber Defense Exercises (CDX) conducted by the
nation’s military academies inspired Chris Kearns, teaching
as an adjunct professor at Temple University, to develop
the National Cyber Analyst Challenge. By day, Kearns is
the vice president of Enterprise IT Solutions at Lockheed
SPECIALIZED
TALENT:National
Cyber Analyst Challenge
Focuses on Recruiting
University Students
Martin, and he knows all too well how challenging it is to
not only attract talented cyber professionals, but to retain
them in in these critical roles.
“Our programs and our customers have a significant
need for students to enter the workforce with not only
the technical cyber skills but the analysis mindset that a
competition like this will foster,” he said. “We are thrilled
to partner with our nation’s top universities to invest in the
future workforce.”
One of Kearns’ key strategies at Lockheed Martin is
to rotate his cybersecurity talent pool early and often.
“We want them to get a broad range of experiences so
they’re exposed to all aspects of the career,” he said. “It
also helps them to better understand what areas they
really want to focus on or specialize in as they grow their
career.” By exposing the cyber specialists to numerous
opportunities, they gain more hands-on knowledge,
broaden their understanding from customer to industry
mindsets, and begin to identify the track areas on which
they will focus during their career.
THE CHALLENGE
The three-phase competition began this August. Each
team was first analyzed based on their proposed solutions
to a realistic cyber-facing scenario, such as a government
agency contacting a business seeking information related
to a cyber-attack. Lockheed Martin’s team of cyber experts
will be evaluating the solutions from the universities.
Chris Kearns
Vice President of Enterprise IT Solutions
Lockheed Martin
Fall 2015 | www.uscybersecurity.net 0
Kearns explained that seven universities
will be invited to continue through the
second phase of the competition, which
includes virtual training and hands-on
learning from some of Lockheed Martin’s
cybersecurity experts, and mentors that
are assigned to support the students
through the duration of their projects. The
training features an intelligence-driven
defense and Lockheed Martin’s Cyber Kill
Chain®, a seven-step process focused on
remediating and mitigating advanced persistent threats.
The finals, held at the Lockheed Martin Global Vision
Center in Crystal City, Virginia, in early November, include
a real-time practical challenge involving a cyberattack
on an enterprise architecture. The students will also be
invited to a special reception the night before the third
phase of the competition. “This provides them with a
great networking opportunity with one another, as well as
a chance to explore some of the innovations on display at
Lockheed Martin,” Kearns said.
The event will conclude by recognizing the winning team
of students with a $25,000 prize for their outstanding
achievement.
Much of the competition runs through October, National
Cybersecurity Awareness Month. This challenge is just
one of numerous ongoing university outreach activities
that address the need for recruiting and encourage
the development of the appropriate talent for science,
technology, engineering, and mathematics (STEM).
THE STUDENTS
Schools with appropriate programs were invited to field a
team of top students from their undergraduate or master’s
programs such as information systems, computer science,
or engineering. The schools in this year’s competition
include Carnegie Mellon University, Howard University,
Iowa State University, Penn State University, Temple
University, University of Alabama in Huntsville, University
of Arizona, University of Central Florida, University of
Maryland, University of New Hampshire, and Western
Washington University.
The participating students have been actively
communicating about the challenge via a dedicated forum.
One student commented that Phase One “was a very fun
and rewarding challenge—we had trouble initially setting
up a good working environment and finding the correct
tools to analyze the data.” He noted that “the amount
of data given was intimidating because our team did not
have as much experience as some other teams in this
arena. Once we got our ideas on a whiteboard and started
analyzing the data, the process became a lot more fluid.”
The competition will enhance the skills of students while
inspiring them to pursue careers in the field. Students
will receive fast-paced, real world practical experience,
scholarships, mentorship, recognition, and the opportunity
to engage with others who share their interests.
“This competition is unique because it focuses on
student development from the start and will serve as a
role model for how to develop talent by engaging with
industry in a systematic and sustained manner,” said Laurel
Miller, assistant professor in the Fox School of Business’s
Management Information Systems department, and IBIT
director at Temple University.
THE COMPETITION WILL ENHANCE
THE SKILLS OF STUDENTS WHILE
INSPIRING THEM TO PURSUE
CAREERS IN THE FIELD.
About the Contributor:
Chris Kearns is Vice President of Enterprise
Information Technology Solutions within Lockheed
Martin’s Information Systems and Global Solutions,
where he is responsible for leading the information
technology business serving U.S. Department of
Defense customers. These programs include the
operation and cyber defense of critical national infrastructure, and
the management of private data centers and high performance
computing laboratories. In 2015, he was recognized as one of
Federal Computing Week’s Top 100 Executives.
For more information about the National Cyber Analyst Challenge,
visit http://cyberanalystchallenge.org.
United States Cybersecurity Magazine0
Lockheed Martin is an Equal Opportunity Employer. All qualified applicants
will receive consideration for employment without regard to race, color,
religion, sex, pregnancy, sexual orientation, gender identity, national origin,
age, protected veteran status, or disability status.
© 2015 Lockheed Martin Corporation
HOWFARWILLYOUGOTOSTOPTHE
NEXTCYBERINVASION?
ANYWHERE AND EVERYWHERE.
Lockheed Martin’s diverse thinkers know that cyberattacks can start anywhere and end
up anywhere, be it the Pentagon, your favorite shopping site or your own PC. So they never
stop at finding new ways to track and annihilate billions of attacks each day. That’s why the
U.S. federal government, corporations and foreign nations are turning to their expertise.
Cybersecurity is one way you can change the world and yourself. At Lockheed Martin,
we’re engineering a better tomorrow.
For more information and to submit your résumé online, visit:
www.lockheedmartinjobs.com/cybersecurity
Congratulations to all the universities participating in the
National Cyber Analyst Challenge (NCAC).
LHM15060m_Cybersecurity_Print-Ad_7.125x9.625.indd 1 9/18/15 1:55 PM

More Related Content

Viewers also liked

CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...
CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...
CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...Anis Rahman
 
Portfólio Juliana Reis
Portfólio Juliana ReisPortfólio Juliana Reis
Portfólio Juliana ReisJuliana Reis
 
копирайт и плагиат
копирайт и плагиаткопирайт и плагиат
копирайт и плагиатMaria Pliutina
 
Autoevaluation001
Autoevaluation001Autoevaluation001
Autoevaluation001helenaaldaz
 
Battle of the Match Types - SME East 2015
Battle of the Match Types - SME East 2015Battle of the Match Types - SME East 2015
Battle of the Match Types - SME East 2015Katy Tonkin
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationYuyi Love
 
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...Penelope Thomas Siourda
 
2015 AHP International Conference session - Operations Opportunities
2015 AHP International Conference session - Operations Opportunities 2015 AHP International Conference session - Operations Opportunities
2015 AHP International Conference session - Operations Opportunities Dan Lantz
 
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)gymnaziumkalush
 
Kelsey presentation
Kelsey presentationKelsey presentation
Kelsey presentationkldockter
 
EricNormanResume
EricNormanResumeEricNormanResume
EricNormanResumeEric Norman
 

Viewers also liked (16)

CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...
CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...
CMNS 446-4 Communication, Science & Technology, Updated Syllabus, Fall 2015 A...
 
Portfólio Juliana Reis
Portfólio Juliana ReisPortfólio Juliana Reis
Portfólio Juliana Reis
 
How would I recruit top talents
How would I recruit top talentsHow would I recruit top talents
How would I recruit top talents
 
Visa
VisaVisa
Visa
 
копирайт и плагиат
копирайт и плагиаткопирайт и плагиат
копирайт и плагиат
 
Autoevaluation001
Autoevaluation001Autoevaluation001
Autoevaluation001
 
Battle of the Match Types - SME East 2015
Battle of the Match Types - SME East 2015Battle of the Match Types - SME East 2015
Battle of the Match Types - SME East 2015
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...
Aξιολόγηση εκπαιδευτικου υλικου εξ αποστάσεως εκπαίδευσης ενηλίκων στο γνωστι...
 
2015 AHP International Conference session - Operations Opportunities
2015 AHP International Conference session - Operations Opportunities 2015 AHP International Conference session - Operations Opportunities
2015 AHP International Conference session - Operations Opportunities
 
Group 3
Group 3Group 3
Group 3
 
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)
Каталізація ідеї соборності України в роки третього Голодомору (1946-1947 рр)
 
Social media business tips
Social media business tipsSocial media business tips
Social media business tips
 
Kelsey presentation
Kelsey presentationKelsey presentation
Kelsey presentation
 
EricNormanResume
EricNormanResumeEricNormanResume
EricNormanResume
 
Html
HtmlHtml
Html
 

Similar to CYBER ARTICLE ON LMCO

WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Sri Bharadwaj
 
Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Vaibhav Bhandari
 
Cybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCapgemini
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemBrett Campbell
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
cyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfcyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfCareerera
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
Center for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationCenter for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationTaylor Rosecrans
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber securityzapp0
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldFerdinand Kjærulff
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 

Similar to CYBER ARTICLE ON LMCO (20)

WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
 
Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019
 
Cybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber Protection
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
cyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfcyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdf
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
Center for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationCenter for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity Education
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
COBNewsletterFeb15
COBNewsletterFeb15COBNewsletterFeb15
COBNewsletterFeb15
 
An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free World
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 

CYBER ARTICLE ON LMCO

  • 1. United States Cybersecurity Magazine0 Identifying, hiring and retaining cyber specialists is becoming increasingly competitive in today’s marketplace. Corporations, government, and other organizations are actively seeking skilled information technologists with cybersecurity specialties such as intelligence analysis and identification, forensics, and fusion. In fact, more than 26,980 cybersecurity-related positions were open in April 2015 on the popular job-seeking website SimplyHired.com. Those seeking cyber job opportunities are still finding it challenging to integrate their operational skills with the strategic threat and cyber analysis skills typically gained through hands-on training. Lockheed Martin and Temple University’s Institute for Business and Information Technology (IBIT) partnered to combat this cyber talent crisis by hosting the first National Cyber Analyst Challenge. The challenge was designed to encourage and support the highest-performing students currently pursuing cyber-related degrees in the nation’s top cyber programs via a three-phase competition. STARTING EARLY The nation’s military academies have been conducting simulation games for years known as Cyber Defense Exercises (CDX). The Cyber Defense Exercises (CDX) conducted by the nation’s military academies inspired Chris Kearns, teaching as an adjunct professor at Temple University, to develop the National Cyber Analyst Challenge. By day, Kearns is the vice president of Enterprise IT Solutions at Lockheed SPECIALIZED TALENT:National Cyber Analyst Challenge Focuses on Recruiting University Students Martin, and he knows all too well how challenging it is to not only attract talented cyber professionals, but to retain them in in these critical roles. “Our programs and our customers have a significant need for students to enter the workforce with not only the technical cyber skills but the analysis mindset that a competition like this will foster,” he said. “We are thrilled to partner with our nation’s top universities to invest in the future workforce.” One of Kearns’ key strategies at Lockheed Martin is to rotate his cybersecurity talent pool early and often. “We want them to get a broad range of experiences so they’re exposed to all aspects of the career,” he said. “It also helps them to better understand what areas they really want to focus on or specialize in as they grow their career.” By exposing the cyber specialists to numerous opportunities, they gain more hands-on knowledge, broaden their understanding from customer to industry mindsets, and begin to identify the track areas on which they will focus during their career. THE CHALLENGE The three-phase competition began this August. Each team was first analyzed based on their proposed solutions to a realistic cyber-facing scenario, such as a government agency contacting a business seeking information related to a cyber-attack. Lockheed Martin’s team of cyber experts will be evaluating the solutions from the universities. Chris Kearns Vice President of Enterprise IT Solutions Lockheed Martin
  • 2. Fall 2015 | www.uscybersecurity.net 0 Kearns explained that seven universities will be invited to continue through the second phase of the competition, which includes virtual training and hands-on learning from some of Lockheed Martin’s cybersecurity experts, and mentors that are assigned to support the students through the duration of their projects. The training features an intelligence-driven defense and Lockheed Martin’s Cyber Kill Chain®, a seven-step process focused on remediating and mitigating advanced persistent threats. The finals, held at the Lockheed Martin Global Vision Center in Crystal City, Virginia, in early November, include a real-time practical challenge involving a cyberattack on an enterprise architecture. The students will also be invited to a special reception the night before the third phase of the competition. “This provides them with a great networking opportunity with one another, as well as a chance to explore some of the innovations on display at Lockheed Martin,” Kearns said. The event will conclude by recognizing the winning team of students with a $25,000 prize for their outstanding achievement. Much of the competition runs through October, National Cybersecurity Awareness Month. This challenge is just one of numerous ongoing university outreach activities that address the need for recruiting and encourage the development of the appropriate talent for science, technology, engineering, and mathematics (STEM). THE STUDENTS Schools with appropriate programs were invited to field a team of top students from their undergraduate or master’s programs such as information systems, computer science, or engineering. The schools in this year’s competition include Carnegie Mellon University, Howard University, Iowa State University, Penn State University, Temple University, University of Alabama in Huntsville, University of Arizona, University of Central Florida, University of Maryland, University of New Hampshire, and Western Washington University. The participating students have been actively communicating about the challenge via a dedicated forum. One student commented that Phase One “was a very fun and rewarding challenge—we had trouble initially setting up a good working environment and finding the correct tools to analyze the data.” He noted that “the amount of data given was intimidating because our team did not have as much experience as some other teams in this arena. Once we got our ideas on a whiteboard and started analyzing the data, the process became a lot more fluid.” The competition will enhance the skills of students while inspiring them to pursue careers in the field. Students will receive fast-paced, real world practical experience, scholarships, mentorship, recognition, and the opportunity to engage with others who share their interests. “This competition is unique because it focuses on student development from the start and will serve as a role model for how to develop talent by engaging with industry in a systematic and sustained manner,” said Laurel Miller, assistant professor in the Fox School of Business’s Management Information Systems department, and IBIT director at Temple University. THE COMPETITION WILL ENHANCE THE SKILLS OF STUDENTS WHILE INSPIRING THEM TO PURSUE CAREERS IN THE FIELD. About the Contributor: Chris Kearns is Vice President of Enterprise Information Technology Solutions within Lockheed Martin’s Information Systems and Global Solutions, where he is responsible for leading the information technology business serving U.S. Department of Defense customers. These programs include the operation and cyber defense of critical national infrastructure, and the management of private data centers and high performance computing laboratories. In 2015, he was recognized as one of Federal Computing Week’s Top 100 Executives. For more information about the National Cyber Analyst Challenge, visit http://cyberanalystchallenge.org.
  • 3. United States Cybersecurity Magazine0 Lockheed Martin is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. © 2015 Lockheed Martin Corporation HOWFARWILLYOUGOTOSTOPTHE NEXTCYBERINVASION? ANYWHERE AND EVERYWHERE. Lockheed Martin’s diverse thinkers know that cyberattacks can start anywhere and end up anywhere, be it the Pentagon, your favorite shopping site or your own PC. So they never stop at finding new ways to track and annihilate billions of attacks each day. That’s why the U.S. federal government, corporations and foreign nations are turning to their expertise. Cybersecurity is one way you can change the world and yourself. At Lockheed Martin, we’re engineering a better tomorrow. For more information and to submit your résumé online, visit: www.lockheedmartinjobs.com/cybersecurity Congratulations to all the universities participating in the National Cyber Analyst Challenge (NCAC). LHM15060m_Cybersecurity_Print-Ad_7.125x9.625.indd 1 9/18/15 1:55 PM