StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Information Systems Security Manager (ISSM)

Castelion Corporation - Torrance, CA

Apply Now

Job Description

OverviewAbout CastelionCastelion is bringing a new approach to defense development and production: one that focuses on short, iterative design cycles, rapid testing in development, and modern commercial manufacturing strategies for production at scale. We're designing, building, and testing next generation long range strike weapons systems to give America and its Allies a definitive edge and deter future conflicts.RoleInformation Systems Security Manager (ISSM)This position requires a TS/SCI Clearance and Special Access Program ExperienceCastelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment.The ISSM/'s primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide /"day-to-day/" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.ResponsibilitiesLead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and terface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.Develop Assured File Transfer (AFT) in accordance with JSIGConduct all self-inspections and report findings to Cognizant Security Agency annuallyEnsure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and mediaDevelop and execute security assessment plans that include verification that the features and assurances required for each protection level functioningMaintain a and/or applicable repository for all system authorization documentation and modificationsDevelop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidentsEnsure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a systemEnsure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirementsEnsure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.Evaluate threats and vulnerabilities to ascertain whether additional safeguards are neededAssess changes in the system, its environment, and operational needs that could affect the authorizationEnsure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purviewReview AIS assessment plansCoordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)Conduct periodic assessments of the security posture of the authorization boundariesInstitute and implement a Configuration Control Board (CCB) charterEnsure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determinationEnsure all authorization documentation is current and accessible to properly authorized individualsEnsure that system security requirements are addressed during all phases of the system life cycleBasic QualificationsA degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.Finalized CI polygraph, or willingness to submit to oneU.S. citizenship is requiredPreferred Skills and ExperienceProven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systemsExpert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.Experience executing DISA STIG/SRG hardening across Linux and Windows.Background in network/systems security (architecture, topology, protocols, components, principles).Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.Masters in Cybersecurity, Computer Science, or related engineering field.CISSP-ISSEP / ISSMP or PMP.Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.Additional InformationThis job description is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.All employees are granted long-term stock incentives as part of their employment as Castelion. All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.Leadership QualitiesBias to Action and Creative Problem Solving. Desire and experience questioning assumptions in ways that lead to break through ideas that are ultimately implemented. Successfully bring in applicable processes/concepts/materials from other industries to achieve efficiency gains. Ability to personally resolve minor issues in development without requiring significant support.High Commitment, High Initiative. A successful candidate will have a genuine passion for Castelion/'s mission and consistently look for ways to contribute to the company's technical goals and prevent hardware blockers. Ability to work in a fast paced, autonomously driven, and demanding atmosphere. Strong sense of accountability and integrity.Clear Communicator. Proactively communicates blockers. Trusted in previous roles to be voice of company with regulators, suppliers, gate keepers and customers. Capable of tactfully managing relationships with stakeholders to achieve company-desired outcomes without compromising relationships. Emails, IMs and verbal interactions are logical, drive clarity, and detailed enough to eliminate ambiguity.ITAR RequirementsTo conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State.Employment with Castelion is governed on the basis of competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status. #J-18808-Ljbffr

Created: 2025-09-22

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.