More jobs:
Senior Security Manager, Generation Programs
Job in
Cincinnati, Hamilton County, Ohio, 45208, USA
Listed on 2026-02-28
Listing for:
GE Aerospace
Full Time
position Listed on 2026-02-28
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Job Description Summary
Leads Advanced Programs Security for highly complex, Next Generation classified program within the Edison Works business. Serves as the primary CSSO, accountable for all aspects of program security across personnel, facilities, information systems, and operations security. Integrates cross-functional security disciplines (Industrial Security, SAP/SAR, SCI as applicable, Physical/Technical Security, Cybersecurity, Insider Threat, OPSEC, and Export/ITAR) to ensure compliance, mission readiness, and competitive advantage.
Partners with government security counterparts and executive stakeholders to shape strategy, mitigate risk, and enable secure program execution.
- Serve as the primary CSSO for Next Generation programs, providing authoritative guidance on NISPOM/32 CFR Part 117, DoDM 5205.07 series, ICDs, and customer‑specific security requirements.
- Define and own the end‑to‑end security architecture and governance for assigned programs, aligning security with program milestones, customer deliverables, and risk posture.
- Establish and lead program Security Working Groups; brief senior leadership and government customers on security posture, risks, and mitigations.
- Oversee clearance processing, eligibility determinations, visit authorizations, and need‑to‑know validation; manage JPAS/DISS and associated personnel security systems.
- Implement continuous evaluation/continuous vetting practices; lead insider threat awareness and referral processes in partnership with the Facility Security Officer (FSO) and Insider Threat Program Senior Official (ITPSO).
- Lead accreditation, construction, and maintenance of secure areas (SAPFs/SCIFs as applicable) in accordance with ICD 705 and sponsor guidelines.
- Manage access control, badging, intrusion detection systems, TEMPEST/technical security controls as required, and maintenance of Fixed Facility Checklists.
- Partner with ISSM/ISSO to ensure classified IS compliance with RMF, NIST SP 800‑53 controls, JSIG, and customer ATO requirements.
- Oversee media control, data transfer, audit, and incident response for classified networks; ensure configuration management and vulnerability remediation align with program timelines.
- Develop and enforce Program Security Guides (PSGs), SOPs, and OPSEC plans; conduct Critical Program Information (CPI) identification and protection planning.
- Lead derivative classification, marking, and safeguarding practices; perform self‑inspections and corrective action plans.
- Lead reporting, investigations, corrective actions, and closure for security incidents, spillage, and adverse information per contractual and regulatory timelines.
- Drive continuous improvement through metrics, root cause analysis, and preventive actions that enhance security effectiveness without impeding delivery.
- Serve as the primary security interface with DoW/IC security offices, Program Managers, Engineering, IT, Supply Chain, and Quality.
- Support proposals, DD254 development/flow‑downs, subcontractor oversight, and security inputs to Statements of Work and IMS.
- Develop and deliver targeted security training and awareness for program personnel and suppliers; maintain records and compliance evidence.
- Prepare for and lead government assessments, Management Reviews, and internal audits; maintain authoritative, audit‑ready documentation.
- Assess and monitor subcontractor security compliance, including DD254 execution, secure communications, and classified visit control.
- Coordinate classified shipments, secure logistics, and international considerations (e.g., export control/ITAR/EAR, foreign travel/contacts).
- Anticipate emerging threats and policy changes; advise program leadership on security‑driven schedule/cost/technical trade‑offs.
- Implement risk‑based, scalable controls that protect critical technology while enabling…
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×