Information Systems Security Manager

Colorado Springs

Applications have closed

The Aerospace Corporation

Aerospace operates the only federally funded research and development center (FFRDC) committed exclusively to the space enterprise. Our technical experts span every discipline of space-related science and engineering.

View company page

The Aerospace Corporation is the trusted partner to the nation’s space programs, solving the hardest problems and providing unmatched technical expertise. As the operator of a federally funded research and development center (FFRDC), we are broadly engaged across all aspects of space— delivering innovative solutions that span satellite, launch, ground, and cyber systems for defense, civil and commercial customers. When you join our team, you’ll be part of a special collection of problem solvers, thought leaders, and innovators. Join us and take your place in space.

At Aerospace, we are committed to providing an inclusive and diverse workplace for all employees to share in our common passion and aspiration – to carry out a mission much bigger than ourselves.

Job Summary

The primary function of the Information System Security Manager is to ensure security policies standards and procedures are implemented in a way that aligns with the Aerospace and Government customer requirements. This position is responsible for supporting Department of Defense (DoD) agencies and Intelligence Community (IC) customers.   This position will support Special Access Program (SAP), Sensitive Compartmented Information (SCI), and collateral activities. This position supports both Aerospace and Government customers within a classified environment and is responsible for managing assets and individuals.

Work Model

This position will be located 100% onsite in Colorado Springs, CO.

What You’ll Be Doing

  • Functions as the primary Information System Security Manager (ISSM)
  • Supervise a team of Information System Security Officers  (ISSOs) supporting SAP, SCI, and collateral programs for multiple customers.
  • Ensure proper IA staffing levels are met and maintained to meet the needs of our government customers.
  • Coordinates technical assessments with the primary government site Information System Security Manager (ISSM)
  • Provides counsel to government organizations relative to information assurance practices issues and concerns ensuring continued mission success.
  • Obtains government Authorization to Operate (ATOs) – through the appropriate government channels – by creating and maintaining System Security Plans (SSPs) and other related documentation per system for multiple government customers. Most SSPs are created within Xacta.
  • Reviews develops and implements Standard Operating Procedures (SOP) for existing and future computer systems.
  • Conducts weekly audit log reviews (using applications such as ArcSight) for inappropriate activity.
  • Conducts hardware tracking using IA tools such as System Center Configuration Manager and Nessus.
  • Conducts evaluation and analysis of software/hardware intended for use on the classified systems.
  • Obtains approval (through the appropriate government channels) for hardware and software utilized on classified systems.
  • Prepares for and assists with government inspections. Documents and executes test procedures.
  • Ensures Government security policies procedures and standards are understood and followed by personnel.
  • Provides guidance for classified media control in accordance with ICS 500-18 and insures media logs are properly maintained.
  • Monitors low to high and high to low data transfers performed by data transfer agents (DTA) to ensure compliance with government regulations.
  • Possesses the knowledge of techniques to sanitize system components memory and media – and to verify IT personnel has properly implemented.
  • Understands complex Government regulations and translates them into necessary technical and security solutions.
  • Trains and briefs staff on information assurance for classified systems. Verifies (through appropriate channels) users have appropriate security clearances and need to know. Provides initial IA briefing and annual refresher.
  • Reviews records of end-user issues submitted to the appropriate classified help desk in accordance with government policies and practices.
  • Reports security incidents (including classified messaging incidents) and assists with the resulting investigation as required. Ensures proper protection or corrective measures have been taken.
  • Communicates regularly with Government (and Aerospace) customers for status of requests and facilitating the completion of requests.

What You Need to be Successful

Minimum Requirements:

  • Eight (8) or more years of progressively more responsible experience in Information Assurance or other relevant field with a Bachelor’s Degree
  • Must have previous leadership experience in Information Assurance/Cybersecurity
  • Must communicate clearly and in a professional manner (verbal, written, presentations, etc.)
  • Ability to simultaneously manage multiple assets through the assessment and authorization (A&A) process to obtain the Authorization to Operate (ATO)
  • Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) or other DoD 8570 IAM III compliant baseline certification or the ability to obtain certification within nine months of hire date
  • DoD 8570/88140 IAM level II certification
  • Current TS/SCI w/ CI Poly

How You Can Stand Out

It would be impressive if you have one or more of these:

  • 10 or more years of relevant experience with master’s degree
  • TS/SCI with adjudicated polygraph
  • Experience with the assessment and authorization (A&A) process and obtaining Authorization to Operate (ATO) for multiple systems
  • Experience with the control families in NIST 800-53 and the tests necessary to show the controls have been properly implemented. Understanding of Confidentiality Integrity and Availability and how CNNSI 1253 determines these for federal information systems
  • Experience with ICD-503 and other Intelligence Community Directives/Standards
  • Experience in utilizing compliance and vulnerability tools; such as Assured Compliance Assessment Solution (ACAS) and Nessus
  • Experience with IA tools such as ArcSight Solar Winds and Xacta which are government resources
  • Understand Intelligence Community Vulnerability Alerts (ICVA) and Common Vulnerabilities and Exposures (CVE)

We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our business.  The grade-based pay range for this job is listed below.  Individual salaries within that range are determined through a wide variety of factors including but not limited to education, experience, knowledge and skills. 

(Min - Mid - Max)

$121,128 - $155,564 - $190,000

Pay Basis: Annual

Leadership Competencies

Our leadership philosophy is simple: every employee, regardless of level and role, can demonstrate leadership. At Aerospace, our commitment is our people. To cultivate our talent and ensure that we have a strong pipeline of future leaders, we want individuals who:

  • Operate Strategically
  • Lead Change   
  • Engage with Impact   
  • Foster Innovation   
  • Deliver Results  

Ways We Reward Our Employees

During your interview process, our team will provide details of our industry-leading benefits.

Benefits vary and are applicable based on Job Type.  A few highlights include:

  • Comprehensive health care and wellness plans

  • Paid holidays, sick time, and vacation

  • Standard and alternate work schedules, including telework options

  • 401(k) Plan — Employees receive a total company-paid benefit of 8%, 10%, or 12% of eligible compensation based on years of service and matching contributions; employees are immediately eligible and vested in the plan upon hire

  • Flexible spending accounts

  • Variable pay program for exceptional contributions

  • Relocation assistance

  • Professional growth and development programs to help advance your career

  • Education assistance programs

  • An inclusive work environment built on teamwork, flexibility, and respect

We are all unique, from diverse backgrounds and all walks of life, yet one thing bonds all of us to each other—the belief that we can make a difference. This core belief empowers us to do our best work at The Aerospace Corporation.

Equal Opportunity Commitment

The Aerospace Corporation is an Equal Opportunity/Affirmative Action employer. We believe that a diverse workforce creates an environment in which unique ideas are developed and differing perspectives are valued, producing superior customer solutions. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, age, sex (including pregnancy, childbirth, and related medical conditions), sexual orientation, gender, gender identity or expression, color, religion, genetic information, marital status, ancestry, national origin, protected veteran status, physical disability, medical condition, mental disability, or disability status and any other characteristic protected by state or federal law. If you’re an individual with a disability or a disabled veteran who needs assistance using our online job search and application tools or need reasonable accommodation to complete the job application process, please contact us by phone at 310.336.5432 or by email at ieo.mailbox@aero.org. You can also review Know Your Rights: Workplace Discrimination is Illegal, as well as the Pay Transparency Policy Statement

Tags: ACAS ArcSight CISM CISSP Compliance DoD DoDD 8570 IAM ICS Nessus NIST NIST 800-53 Polygraph SAP System Security Plan TS/SCI Vulnerabilities

Perks/benefits: Career development Competitive pay Equity Flex vacation Health care Relocation support Startup environment Transparency Wellness

Region: North America
Country: United States
Job stats:  10  0  0
Category: Leadership Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.