Skip to main content
Inversion Space logo

Senior Network / Domain Administrator & Security Operations (SOC)

Inversion Space
Full Timesenior
Playa Vista, California, United StatesPosted 2 days ago

Job Description

<div class="content-intro"><p><strong>Turning Space into a Transportation Layer for Earth</strong></p></div><h3>Who We Are:</h3> <p>Inversion builds advanced reentry systems to deliver next-generation capabilities from space.<br>&nbsp;<br>Our mission is to make Earth radically more accessible by turning Low-Earth Orbit into an on-demand logistics domain. We see space not as a destination, but as a platform — one that unlocks unprecedented speed and global reach.<br>&nbsp;<br>Our spacecraft are designed to deliver payloads anywhere on Earth in under an hour, operating through extreme reentry conditions and landing with high precision. These systems open the door to new ways of testing, delivering, and operating at hypersonic speeds.<br>&nbsp;<br>Inherently dual-use, our technology is built to meet urgent national security needs while laying the groundwork for future commercial applications. Backed by leading investors including Y Combinator, Spark Capital, and Lockheed Martin Ventures, and working with partners such as the U.S. Space Force and NASA, Inversion is pushing the boundaries of what’s possible in space-based defense and logistics.</p> <p><strong><span data-contrast="auto">What&nbsp;You’ll&nbsp;Do:</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <p><span data-contrast="auto">The Network / Domain Administrator &amp; Security Operations (SOC) role&nbsp;is responsible for&nbsp;secure administration of network infrastructure, identity systems, and continuous monitoring of security events across corporate and enclave environments. This role enforces access control, network security, logging, and incident detection/response in alignment with NIST SP 800-171, CMMC Level 2, and DFARS requirements.</span><span data-ccp-props="{}">&nbsp;</span></p> <p><span data-contrast="auto">This position serves as a primary operator for security monitoring (SOC functions) and ensures visibility, detection, and response capabilities across all systems handling CUI.</span><span data-ccp-props="{}">&nbsp;</span></p> <p><strong><span data-contrast="auto">Access Control &amp; Identity Management (AC / IA)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Administer identity systems (Microsoft Entra ID, Active Directory, GCCH tenants)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Enforce MFA, conditional access, and least privilege principles&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Manage privileged accounts and implement separation of duties&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Conduct periodic access reviews and account audits&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Network Security &amp; Boundary Protection (SC / AC)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Configure and manage network infrastructure:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Firewalls, routers, VLANs, ACLs&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Enforce segmentation between:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Corporate network&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">CUI enclave (CTMD)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">External/public access&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Manage DNS, DHCP, and IP address management&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Monitor and control inbound/outbound network traffic&nbsp;</span> &nbsp;</li> </ul> <p><strong><span data-contrast="auto">Audit &amp; Accountability / Logging (AU)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Ensure centralized logging across systems:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">SEIM and 3</span><span data-contrast="auto"><span data-fontsize="12">rd</span></span><span data-contrast="auto">&nbsp;Party SOC</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Maintain log retention&nbsp;in accordance with&nbsp;policy&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Validate log integrity and availability for audit purposes&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Generate audit reports and provide evidence for compliance reviews&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Continuous Monitoring &amp; SOC Operations (SI / IR / CA)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Monitor security alerts, events, and anomalies across all environments&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Perform triage, investigation, and escalation of security events&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Correlate logs across endpoints, network, and applications&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Maintain alert tuning and detection rules&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Support continuous monitoring strategy required by CMMC&nbsp;</span> &nbsp;</li> </ul> <p><strong><span data-contrast="auto">Incident Response (IR)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Lead or support incident detection, containment, eradication, and recovery&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Document incidents and&nbsp;maintain&nbsp;incident response records&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Coordinate with IT, application, and management teams during incidents&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Ensure proper evidence handling and chain of custody&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Configuration &amp; Change Management (CM)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Maintain secure baseline configurations for:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Network devices&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Identity systems&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Review and approve network and security-related changes&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Ensure all changes are documented and auditable&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Risk Management &amp; Vulnerability Management (RA / SI)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Perform vulnerability scanning and remediation coordination&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Identify&nbsp;risks related to network and identity systems&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Track and remediate findings (POA&amp;M support)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">System &amp; Communications Protection (SC)</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Enforce encryption and secure protocols across network communications&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Validate secure configurations for remote access and VPNs&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Ensure secure integration with enclave systems and cloud environments&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Operational Responsibilities</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Manage:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Network infrastructure (switches, routers, firewalls, VLANs)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Identity platforms (Entra ID, AD, GCCH identity)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Monitoring and SIEM platforms&nbsp;and working with 3</span><span data-contrast="auto"><span data-fontsize="12">rd</span></span><span data-contrast="auto">&nbsp;party SOC&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Maintain network diagrams and documentation (e.g.,&nbsp;NetBox)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Support secure connectivity between corporate, enclave, and cloud environments&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Assist&nbsp;with compliance audits and security assessments&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Participate in on-call rotation for incident response&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Required Qualifications</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">5–9+ years of experience in network administration and/or security operations </span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Strong knowledge of:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Networking (TCP/IP, VLANs, routing, firewalls)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Identity and access management (AD, Entra ID)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Experience with SIEM and monitoring tools&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Understanding of security principles and incident response&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Preferred Qualifications</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Experience in regulated environments (CMMC, NIST 800-171, GovCloud, GCCH)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Certifications such as:&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Security+,&nbsp;CySA+, CISSP (or equivalent)&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="auto">Audit-Relevant Expectations</span></strong><span data-ccp-props="{}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">Continuous monitoring must be&nbsp;</span><strong><span data-contrast="auto">active, documented, and reviewable</span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Logs must be&nbsp;</span><strong><span data-contrast="auto">centralized,&nbsp;retained, and protected from tampering</span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Network segmentation and access controls must be&nbsp;</span><strong><span data-contrast="auto">enforced and verifiable</span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">All privileged activity must be&nbsp;</span><strong><span data-contrast="auto">controlled, logged, and auditable</span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Incident response must be&nbsp;</span><strong><span data-contrast="auto">documented and repeatable</span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto">Full alignment with&nbsp;</span><strong><span data-contrast="auto">SSP-defined controls and CUI boundary enforcement<br></span></strong><span data-contrast="auto">&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></li> </ul> <p><strong>Our office headquarters is located in Playa Vista, CA. This position requires in office presence.</strong></p> <p>&nbsp;</p> <p><sub><em>The California annual base salary for this role is currently $110,000 - $140,000.&nbsp; Pay Grades are determined by role, level, location, and alignment with market data.&nbsp; Individual pay will be determined on a case-by-case basis and may vary based on the following considerations: interviews and an assessment of several factors that are unique to each candidate, job-related skills, relevant education and experience, certifications, abilities of the candidate and internal equity.&nbsp;</em></sub></p><div class="content-conclusion"><div style="text-align: left;"><span style="font-size: 8pt;"><strong>ITAR Compliance:</strong></span></div> <div style="text-align: left;"><span style="font-size: 8pt;">To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State. Learn more about the ITAR&nbsp;<a href="https://www.pmddtc.state.gov/?id=ddtc_kb_article_page&amp;sys_id=24d528fddbfc930044f9ff621f961987">here</a>. &nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size: 8pt;"><strong>Equal Employment Opportunity:</strong></span></div> <div><span style="font-size: 8pt;">Inversion provides equal employment opportunities to all employees and applicants without regard to race, color, religion, age, sex, gender identity, sexual orientation, national origin, veteran status, or disability.&nbsp;&nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size: 8pt;">Inversion collects and processes personal data in accordance with applicable data protection laws.&nbsp; If you are a US Job Applicant see the <a href="https://oag.ca.gov/privacy/ccpa" target="_blank">CCPA Privacy Policy Notice</a></span><span style="font-size: 8pt;"><strong>&nbsp;</strong>for further details.</span></div></div>

About Inversion Space

Inversion Space logo

Inversion Space

inversionspace.com

On-site

Want AI-powered job matching?

Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.

Get Started Free