Information Systems Security Manager (ISSM)

OkloSanta Clara, CA
Remote

About The Position

Thanks for your interest in Oklo! We are searching for an Information Systems Security Manager (ISSM) to join our team. The Information Systems Security Manager (ISSM) at Oklo, Inc. reports to the Senior Manager of IT and Cyber and is responsible for the implementation, operation, and continuous improvement of Oklo’s information system security program. This role owns the day-to-day security posture of Oklo’s information systems, ensuring confidentiality, integrity, and availability while maintaining compliance with applicable regulatory frameworks, including NIST 800-53, NIST 800-171, and DOE export control requirements under 10 CFR Part 810. The ISSM is a hands-on security leader who bridges technical execution with compliance rigor. This role partners closely with IT, engineering, legal, and compliance stakeholders to ensure secure system design, secure operations, and audit readiness across Oklo’s rapidly evolving technology environment. This position is ideal for someone who thrives in a fast-paced startup, enjoys building and operating security programs, and is motivated by protecting mission-critical systems that support advanced nuclear energy innovation.

Requirements

  • 6+ years of experience in information security or cybersecurity, with 3+ years in a system security, security engineering, or compliance-focused role.
  • Proven experience applying, remediating, and maintaining compliance with security configuration frameworks such as DISA STIGs and CIS Benchmarks.
  • Proven operational experience securing and maintaining systems across Linux, macOS, and Windows environments, with Linux as the primary operating system.
  • Demonstrated experience implementing or operating security controls under NIST frameworks.
  • Experience using automated or semi-automated compliance tooling to assess and remediate STIG or CIS controls (e.g., SCAP, OpenSCAP, compliance-as-code, or equivalent).
  • Prior experience supporting federally regulated environments, including DOE, NRC, DoD, or similar regulatory bodies.
  • Active certification meeting DoD 8570 / DoD 8140 baseline requirements for Information Assurance / Cybersecurity roles, including one or more of the following: CISSP, CISM, CASP+, GSLC, Security+.
  • Must be considered a “U.S. Person” under 8 U.S.C. 1324b(a)(3).
  • Strong working knowledge of NIST 800-53, NIST 800-171, and risk-based security control implementation.
  • Demonstrated hands-on experience remediating systems using DISA STIGs and CIS Benchmarks, including validation, documentation, and ongoing compliance monitoring.
  • Strong proficiency across operating systems, with hands-on experience in Linux (primary), macOS (secondary), and Windows (tertiary) environments, including system hardening, security configuration, and troubleshooting.
  • Experience supporting regulated environments, including DOE, DoD, NRC, or other federal compliance frameworks.
  • Ability to translate regulatory requirements into practical, operational security controls.
  • Proven experience leading incident response and vulnerability remediation efforts.
  • Excellent written and verbal communication skills, with the ability to clearly document security decisions and risks.
  • Strong organizational and time-management skills, capable of managing multiple priorities in a fast-paced environment.
  • Comfortable operating in a fast-paced, highly iterative startup environment.
  • Curious, adaptable, and willing to propose creative and novel solutions to security challenges.
  • An excellent writer who communicates clearly in a modern, active voice.
  • Passionate about clean energy and making advanced fission a reality.
  • A startup person: You aren't driven by titles or hierarchy, and prefer efficiency to excess process. You don't need or expect to have a lot of guidance but you enjoy working in a fast-paced team.
  • Motivated: You are self-motivated. You bring an enthusiasm to the team, and imbue a sense of passion that goes beyond clocking in and clocking out.
  • A team-player: Oklo genuinely is a team. We aren’t about taking credit for ourselves, and we aren’t about pushing blame to others. We do incredible things because we work as a team.
  • An excellent communicator: We need a person who is not only technically competent but also a clear and upbeat communicator.
  • Creative: Being creative means that when things fall outside clear scopes or processes or problems arise without clear solutions, you are able to identify it as well as invent ways to solve a problem or fill a need without micromanagement.
  • Detail-oriented: This focus is a big part of excellence, consistency, and quality. Excellent grammar and spelling matter for both good communication as well as the image of the company that we put forward.

Responsibilities

  • Serve as the primary authority for the security posture of Oklo’s information systems.
  • Implement, maintain, and continuously improve information system security controls in alignment with NIST 800-53 and NIST 800-171.
  • Ensure security requirements are embedded into system design, configuration, and operations across on-premises and cloud environments.
  • Implement, assess, and remediate system configurations against security baselines and hardening standards, including DISA STIGs and CIS Benchmarks, ensuring secure and compliant system configurations across servers, endpoints, and cloud resources.
  • Partner with IT and engineering teams to ensure secure architectures, access controls, encryption, and monitoring.
  • Oversee system-level security monitoring, logging, and alerting to detect and respond to security events.
  • Lead incident response activities, including investigation, containment, remediation, and post-incident reviews.
  • Coordinate vulnerability management activities, including scanning, remediation tracking, and validation.
  • Ensure timely application of security patches and configuration hardening across systems and platforms.
  • Own execution of security compliance activities related to various standards and contract requirements such as SOX, NIST and CMMC.
  • Build, Create and Maintain System Security Plans (SSPs), policies, procedures, and supporting security artifacts.
  • Conduct system risk assessments and track risks through mitigation, acceptance, or remediation.
  • Support internal and external audits and assessments, ensuring evidence readiness and corrective action tracking.
  • Enforce controls related to export-controlled data (DOE ECI), including access restrictions, segmentation, and secure data handling.
  • Develop, maintain, and enforce information security policies, standards, and procedures.
  • Ensure security documentation is accurate, current, and aligned with operational reality.
  • Provide clear, actionable guidance to system owners and users regarding security responsibilities and expectations.
  • Act as a trusted advisor to the Senior Manager of IT and Cyber on system security risks, gaps, and improvement opportunities
  • Partner with engineering, operations, and compliance teams to balance security, usability, and innovation
  • Communicate security risks, decisions, and requirements effectively to both technical and non-technical stakeholders

Benefits

  • flexible time off
  • equity
  • competitive pay
  • 401k
  • health insurance
  • FSA
  • flexible work hours
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service