Information Systems Security Manager (ISSM)
Castelion
About Castelion
Castelion is bringing a new approach to defense development and production: one that focuses on short, iterative design cycles, rapid testing in development, and modern commercial manufacturing strategies for production at scale. We're designing, building, and testing next generation long range strike weapons systems to give America and its Allies a definitive edge and deter future conflicts.
Information Systems Security Manager (ISSM)
*This position requires a TS/SCI Clearance and Special Access Program Experience*
Castelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment.
The ISSM's primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide "day-to-day" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.
Responsibilities
- Lead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.
- Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.
- Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.
- Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and customers.
- Interface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.
- Develop Assured File Transfer (AFT) in accordance with JSIG
- Conduct all self-inspections and report findings to Cognizant Security Agency annually
- Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
- Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
- Maintain a and/or applicable repository for all system authorization documentation and modifications
- Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
- Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
- Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
- Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
- Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
- Assess changes in the system, its environment, and operational needs that could affect the authorization
- Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
- Review AIS assessment plans
- Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
- Conduct periodic assessments of the security posture of the authorization boundaries
- Institute and implement a Configuration Control Board (CCB) charter
- Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
- Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
- Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
- Ensure all authorization documentation is current and accessible to properly authorized individuals
- Ensure that system security requirements are addressed during all phases of the system life cycle
Basic Qualifications
- A degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.
- 5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).
- Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.
- Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.
- Finalized CI polygraph, or willingness to submit to one
- U.S. citizenship is required
Preferred Skills and Experience
- Proven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systems
- Expert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.
- Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.
- Experience executing DISA STIG/SRG hardening across Linux and Windows.
- Background in network/systems security (architecture, topology, protocols, components, principles).
- Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.
- Masters in Cybersecurity, Computer Science, or related engineering field.
- CISSP-ISSEP / ISSMP or PMP.
- Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.
Additional Information
- This job description is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.
All employees are granted long-term stock incentives as part of their employment as Castelion. All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.
Leadership Qualities
Bias to Action and Creative Problem Solving. Desire and experience questioning assumptions in ways that lead to break through ideas that are ultimately implemented. Successfully bring in applicable processes/concepts/materials from other industries to achieve efficiency gains. Ability to personally resolve minor issues in development without requiring significant support.
High Commitment, High Initiative. A successful candidate will have a genuine passion for Castelion's mission and consistently look for ways to contribute to the company's technical goals and prevent hardware blockers. Ability to work in a fast paced, autonomously driven, and demanding atmosphere. Strong sense of accountability and integrity.
Clear Communicator. Proactively communicates blockers. Trusted in previous roles to be voice of company with regulators, suppliers, gate keepers and customers. Capable of tactfully managing relationships with stakeholders to achieve company-desired outcomes without compromising relationships. Emails, IMs and verbal interactions are logical, drive clarity, and detailed enough to eliminate ambiguity.
ITAR Requirements:
· To conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State.
Employment with Castelion is governed on the basis of competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status.