Computer Systems Security Leader 6

Company Name:
ULA/United Launch Alliance
Job Description:
Under the direction of the IT Director, the Information Security Manager and Chief Information Security Officer (CISO), shall be responsible for the overall Security of the ULA Information System. This responsibility includes:
Ensure the Security of United Launch Alliance Data, Systems and overall IT Environment through the implementation and management of Leading Information Security Controls, Monitoring and Analysis Solutions, Advanced Threat Management Solutions, Intrusion Detection and Prevention Systems, Risk Management, the development management of Information Security Strategy and Roadmaps and forward leaning Information Security Leadership.
Leadership of the IT Security organization including employees and service providers, Business Process Development, Documentation, and Integration of the IT Security value stream throughout other IT and ULA functional organizations
Compliance, Risk, and Operations Management of ULA IT products and services. Develop, maintain, and audit IT policies and procedures. Develop and maintain a high level of system integrity through the monitoring, analysis, and forecasting of risk and threat trends. Manage ULA Access Control, support ULA Legal and the Office of Internal Governance with investigations. Manage cyber incidents & vulnerabilities to resolution resulting from vulnerability scanning and Advanced Persistent Threat notifications.
Project Management of IT Security and related projects. Utilize project management consistently across projects for Perfect Product Delivery of IT services. Practice change management and issues management processes. Assess organizational impacts and develop risk mitigation strategies. Incorporate organizational change initiatives into plans to increase acceptance and improve results. Utilize approval processes to validate the investment value for IT projects. Drive Enhanced Security Initiative projects to closure.
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. May prepare security reports to regulatory agencies.
External Additional Requirements
Bachelors Degree in Computer Science, Information Technology, MIS, Engineering or Business
10 years Information Technology experience plus 5 years managing or leading teams for a total of 15 years.
7 years professional experience working in Information Security management.
3 years of significant leadership experience over an information security organization.
Secret Clearance
This position requires use of information which is subject to the International Traffic in Arms
Regulations (ITAR) information. All applicants must be U.S. persons within the meaning of ITAR.
ITAR defines a U.S. person as a natural person who is a lawful permanent resident as defined in 8 U.S.C 1101(a)(20) or who is a protected individual as defined by 8 U.S.C 1324b(a)(3).
External Preferred Qualifications
Masters degree in Computer Science, Information Technology, MIS, Engineering or Business
10 years experience leading Information Security organization for a multi-site, Aerospace and Defense Company in an NIST or ISO 27000 environment.
Experience developing and executing company policy, performing IT audits, investigations, reporting, and risk management in the aerospace and defense industry.
Experience with managing outsourced service providers.
Experience performing in or managing an Advance Persistent Threat computer incident response team.
CISSP Certification
Top Secret Clearance
This position requires use of information which is subject to the International Traffic In Arms Regulations (ITAR). Therefore, all applicants must be U.S. Persons as defined in ITAR 120.15 (e.g., U.S. Citizen or Permanent Resident (Green Card holder) or protected individual. Also see 8 U.S.C. 1101(a)(20) and 8 U.S.C. 1324b(a)(3) for additional information.)
ULA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, national origin, disability, protected veteran status or any other categories protected by law.
Apply online at:
https://sjobs.brassring.com/TGWEbHost/jobdetails.aspx?partnerid=25628&siteid=5080&Areq=72BR

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Computer System Security Analyst_COMSEC
Colorado Springs, CO Lockheed Martin Corporation
Computer Systems Analyst
Littleton, CO Lockheed Martin Corporation
Computer Systems Architect
Littleton, CO ISYS Technologies
Information System Security Officer (ISSO)
Colorado Springs, CO Lockheed Martin
Senior Computer Systems Specialist
Denver, CO WSP USA
Computer Systems Coordinator II
Denver, CO WSP USA