Castelion Corporation-posted 3 days ago
Full-time • Mid Level
Onsite • Torrance, CA

Castelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment. The ISSM's primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide "day-to-day" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.

  • Lead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.
  • Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.
  • Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.
  • Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and customers.
  • Interface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.
  • Develop Assured File Transfer (AFT) in accordance with JSIG
  • Conduct all self-inspections and report findings to Cognizant Security Agency annually
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
  • Maintain a and/or applicable repository for all system authorization documentation and modifications
  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
  • Assess changes in the system, its environment, and operational needs that could affect the authorization
  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
  • Review AIS assessment plans
  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
  • Conduct periodic assessments of the security posture of the authorization boundaries
  • Institute and implement a Configuration Control Board (CCB) charter
  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
  • Ensure all authorization documentation is current and accessible to properly authorized individuals
  • Ensure that system security requirements are addressed during all phases of the system life cycle
  • A degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.
  • 5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).
  • Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.
  • Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.
  • Finalized CI polygraph, or willingness to submit to one
  • U.S. citizenship is required
  • Proven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systems
  • Expert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.
  • Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.
  • Experience executing DISA STIG/SRG hardening across Linux and Windows.
  • Background in network/systems security (architecture, topology, protocols, components, principles).
  • Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.
  • Masters in Cybersecurity, Computer Science, or related engineering field.
  • CISSP-ISSEP / ISSMP or PMP.
  • Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.
  • All employees are granted long-term stock incentives as part of their employment as Castelion.
  • All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service