Enhancing Cybersecurity with Cyber Kill Chain®

Cyber Kill Chain

Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.

The seven steps of the Cyber Kill Chain® enhance visibility into an attack and enrich an analyst’s understanding of an adversary’s tactics, techniques and procedures.

A: Advanced

Targeted, Coordinated, Purposeful

P: Persistent

Targeted, Coordinated, Purposeful

T: Threat

Person(s) with Intent, Opportunity, and Capability

Join our Team   ___

We're engineering a better tomorrow.

Your individual skills play a critical role in changing the way the world works and helping us develop products that make it a safer place to achieve your goals. Our teams are made up of diverse employees from a wide range of disciplines and backgrounds, working together to tackle complex challenges and push the boundaries of innovation.

Explore our skill areas to find the right opportunity for you.

View all career areas


For more than a decade, Lockheed Martin’s Intelligence Driven Defense® and Cyber Kill Chain® methodologies have helped our customers defend their most sensitive networks. It is because of this proven framework, superior technology, and hundreds of skilled analysts that Lockheed Martin remains a global leader in cyber innovation.

How to Get a Job in Cybersecurity: Career Advice

Interested in cybersecurity? Not sure what to study or how to prepare? Our Lockheed Martin experts share advice about how to get a cyber job.

Gaining the Advantage

Applying Cyber Kill Chain® Methodology

Guide: Download the analyst’s guide to understanding and applying the Cyber Kill Chain® methodology to network defense.

Apply Cyber Kill Chain

Change How Your Team Handles Incidents

White Paper: Examine seven ways to apply the Cyber Kill Chain® with a threat intelligence platform.

Defendable Architecture

Defendable Architectures

Whitepaper:  Examine an alternate approach to information security that more accurately reflects how networked systems must be defended.

Threat Driven

Threat-Driven Approach to Cyber Security

White Paper: Examine methodologies, practices and tools to enable a functionally integrated cybersecurity organization using Intelligence Driven Defense® practices.

Apply Cyber Kill Chain

Cybersecurity: Coding Out Crime

Cyber criminals aren’t a new threat, but how we respond to them has radically changed.

Hear From Our Experts



Lockheed Martin Computer Incident Response Team

LM-CIRT is responsible for detecting, assessing, and mitigating information security threats across the global enterprise. They at the forefront of industry and government collaboration to develop new, more effective computer network defense (CND) tradecraft.

Latest News   ___
How Digital Transformation is Modernizing the Cyber Force
Nov 28, 2022
Lockheed Martin’s MR2 platform is helping the U.S. military digitally transform with real-time reports on employee training and readiness.
Cyber Security Employee Perspectives
May 03, 2022
Lockheed Martin wouldn’t be a leader in digital safety without top talent.
New Technology Revolutionizes Analog and Digital Systems
Mar 11, 2021
Intel recently announced a new technology that enables customers to significantly reduce the size, weight, power and cost of systems used in radar, electronic defense, high-end commercial test equipment and 5G/6G communications markets.
Additional Information   ___
Contacts   ___