Staff Security Architect, Missile Defense

True AnomalyLos Angeles, CA
2d$200,000 - $290,000Onsite

About The Position

As a Staff Security Architect, you will be the critical technical bridge securing True Anomaly's national security space systems with particular emphasis on ground-based command and control (C2) infrastructure, missile defense software platforms, and cloud environments operating at DoD Impact Level 5/6 and SECRET/TS/SCI classification levels. This is a unique, hands-on role that blends deep security architecture expertise with active software development. You will design and implement security architectures spanning the full mission lifecycle including satellite operations, ground segments, C2 systems, and mission planning platforms while supporting the end-to-end journey to Authority to Operate (ATO) across IL-5, IL-6, and TS/SCI environments. You will be responsible for ensuring our systems meet the most rigorous federal security standards while maintaining operational effectiveness in contested environments. This is an ideal role for a security-focused technologist who can write code, architect secure systems, engage government assessors, and lead cross-functional teams through complex RMF processes. If you're energized by the challenges of securing mission-critical systems that protect lives and national interests, this role is for you. This position requires an active SECRET clearance at minimum; TS/SCI is strongly preferred.

Requirements

  • 10+ years of combined experience in security architecture, security engineering, and/or software development with increasing responsibility
  • Active SECRET clearance required; TS/SCI strongly preferred
  • Demonstrated experience implementing NSA Type 1 cryptographic solutions in operational national security systems
  • Proven expertise with RMF processes and achieving ATOs for complex systems, with direct experience at IL-5 or IL-6 impact levels
  • Strong working knowledge of NIST SP 800-53 security controls and how they map to application and infrastructure design
  • Hands-on experience implementing STIGs (OS, container, platform, and application-level)
  • Proficiency in at least one modern programming language (e.g., Python, Go, Elixir, or similar) and demonstrated ability to contribute directly to secure software development
  • Experience architecting security for systems combining hardware, firmware, embedded systems, and cloud-native software
  • Deep knowledge of cryptographic protocols, key management, and secure communications architectures
  • Familiarity with space system architectures including satellite operations, ground segments, and TT&C systems
  • Excellent communication skills with ability to articulate security requirements to engineering teams, executive leadership, and government stakeholders
  • DoD 8570.01-M / DoD 8140 IAM Level II certification at minimum (e.g., CASP+ CE, CISM, CAP, or CISSP/Associate); IAM Level III certification (CISM or full CISSP) required for personnel performing ISSE functions on IL-6 or TS/SCI systems
  • Bachelor's degree in Computer Science, Cybersecurity, Engineering, or related field (or equivalent experience)
  • To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State.

Nice To Haves

  • Active TS/SCI clearance with polygraph
  • Direct experience securing C2 systems, missile defense software platforms, or other DoD mission systems
  • Experience with CNSSI 1253, ICD 503, JSIG, or other Intelligence Community security standards
  • Experience supporting DoD or IC customers through ATO, re-ATO, or continuous authorization
  • Knowledge of cloud security control inheritance and shared responsibility models within IL-6 environments
  • Familiarity with Cross Domain Solutions (CDS), data guards, or other information flow control technologies
  • Experience with FedRAMP High, CMMC, or DoD IL-5/IL-6 authorizations
  • Knowledge of RF security, anti-jam techniques, and secure satellite communications
  • Experience integrating security tooling (e.g., SIEMs, vulnerability scanners, audit/logging systems) into development workflows
  • Understanding of zero trust architectures and modern identity solutions applied to classified environments
  • Understanding of supply chain risk management (SCRM) for national security systems
  • Relevant certifications such as CISSP-ISSAP, CCSP, CEH, or vendor-specific security certifications
  • Experience supporting red team or penetration testing activities against complex systems
  • Background in aerospace engineering, systems engineering, or a related technical discipline

Responsibilities

  • Design and implement end-to-end security architectures for ground-based C2 systems, missile defense software platforms, and on-orbit satellite constellations, spanning firmware, embedded systems, cloud-native applications, and operational technology
  • Architect and deploy NSA Type 1 cryptographic solutions for classified C2 communications and satellite command pathways, including protection of TT&C (telemetry, tracking, and command) systems
  • Develop comprehensive threat models specific to C2 and missile defense systems, accounting for adversary capabilities across RF spectrum, cyber, and physical domains
  • Ensure security architectures enable effective monitoring, logging, and incident response without compromising operational tempo
  • Design, develop, and maintain secure, cloud-native SaaS applications and C2 platform components aligned with NIST SP 800-53 control requirements
  • Implement security controls natively in application code and architecture, not as afterthoughts but ensuring RMF findings are minimized through strong upfront engineering
  • Implement and validate DISA STIG requirements at the OS, container, platform, and application layers within missile defense and C2 software stacks
  • Integrate RMF controls into CI/CD pipelines through DevSecOps practices including IaC, automated security scanning, and continuous monitoring tooling
  • Remediate findings from STIGs, vulnerability scans, penetration testing, and SCA activities to maintain ATO posture
  • Lead system architectures to achieve and sustain IL-5, IL-6, and TS/SCI ATOs in cloud and hybrid environments under the NIST Risk Management Framework
  • Support all RMF Steps 1–6, with emphasis on control implementation, assessment preparation, and remediation for DoD and IC programs
  • Ensure compliance with NIST 800-53, CNSSI 1253, ICD 503, JSIG, and other applicable frameworks for National Security Systems (NSS) handling classified information up to TS/SCI
  • Support cloud Provisional Authorization (PA) and inherited control models across classified cloud environments (e.g., IL-6 CSPs)
  • Contribute technically to security artifacts including SSPs, SAPs, SARs, and POA&Ms; serve as a credible technical voice with government ISSOs, ISSEs, and third-party assessors during ATO and reauthorization activities
  • Serve as the technical security bridge between spacecraft engineering, ground systems, software development, C2 operations, and government mission partners
  • Conduct security architecture reviews and provide authoritative guidance on secure design patterns as C2 and missile defense capabilities evolve
  • Communicate complex security requirements, risk trade-offs, and compliance strategies to diverse stakeholders including engineering teams, executive leadership, and government customers

Benefits

  • Equity + Benefits including Health, Dental, Vision, HRA/HSA options, PTO and paid holidays, 401K, Parental Leave
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service