Job Description
<p><strong>About the Role:</strong></p>
<p>The GRC Analyst, Federal & Customer Programs is responsible for the hands-on analysis, documentation, and operational execution of the company's security governance, risk, and compliance obligations. This role sits at the intersection of customer contracts, regulatory frameworks, and the company's security control environment — translating external requirements into clear, traceable internal commitments and evaluating how well current capabilities satisfy them. The GRC Analyst reviews incoming contractual security language, maps obligations to applicable frameworks and existing controls, produces compliance matrices and gap analyses, owns the operational risk assessment process, contributes to governance and policy lifecycle activities, and supports audit, assessment, and customer inquiry activities.</p>
<p>A meaningful portion of this role is dedicated to ongoing contract and requirements analysis as new programs are awarded and existing programs evolve. The GRC Analyst serves as the security function's primary reviewer of incoming contractual cybersecurity language and works directly with legal and sourcing on flow-down negotiation and redlines. Candidates who enjoy careful reading of contractual and regulatory text — and who want this to be a substantial part of their day-to-day work — will find this role a strong fit.</p>
<p>This is a detail-oriented, writing-intensive role requiring strong analytical judgment, fluency across multiple compliance frameworks, and the ability to work effectively with legal, sourcing, program management, engineering, and security operations stakeholders.</p>
<p><strong>Key Responsibilities:</strong></p>
<p><strong>Contract & Requirements Analysis</strong></p>
<ul>
<li>Review customer contracts, statements of work, security annexes, CDRLs, data protection addenda, and flow-down clauses to identify cybersecurity, privacy, and information handling obligations applicable to the company.</li>
<li>Extract and catalog specific security requirements from contractual language, and translate them into structured, testable statements suitable for traceability and control mapping.</li>
<li>Compare identified requirements against the company's current product scope, control environment, and certification posture to determine where compliance is already met, partially met, or requires new implementation work.</li>
<li>Produce gap analyses, compliance matrices, and Requirements Traceability Matrix (RTM) artifacts that clearly communicate the state of compliance for a given contract, program, or system.</li>
<li>Serve as the security function's primary point of contact for legal and sourcing during contract review, redline cycles, and flow-down negotiation, including review of subcontractor and supplier flow-down language.</li>
</ul>
<p><strong>Framework Mapping & Interpretation</strong></p>
<ul>
<li>Maintain working proficiency across the frameworks relevant to the company's regulatory and contractual posture, including NIST SP 800-171, NIST SP 800-53, NIST CSF, CMMC, ISO 27001, FedRAMP, and applicable European frameworks such as NIS2 and GDPR.</li>
<li>Map controls across frameworks to minimize duplicated work and enable consistent responses to overlapping requirements; contribute to a shared control inventory used by compliance, security, and program teams.</li>
<li>Interpret framework language and authoritative guidance (NIST publications, DoD guidance, regulator FAQs) in the context of specific company systems and business scenarios and escalate ambiguity for formal risk decisions when appropriate.</li>
</ul>
<p><strong>Governance, Policy & ISMS Support</strong></p>
<ul>
<li>Contribute to the maintenance of the company's Information Security Management System (ISMS) documentation set, including keeping control descriptions, evidence references, and scope statements accurate and current.</li>
<li>Support the policy and standard lifecycle, including periodic review cycles, version control, exception governance, and clarification of control owner accountability.</li>
<li>Produce compliance posture reporting and audit readiness metrics for governance forums and leadership review, including framework coverage, finding aging, and remediation progress.</li>
</ul>
<p><strong>Deliverable Writing & Artifact Contribution</strong></p>
<ul>
<li>Draft and revise compliance deliverables including System Security Plans (SSP), Plans of Action & Milestones (POA&M), policy and standard content, control narratives, customer security questionnaire responses, and audit artifacts.</li>
<li>Author clear, concise written responses to customer, auditor, and regulator inquiries, calibrated to the technical level of the audience and consistent with approved company positioning.</li>
</ul>
<p><strong>Risk Assessment & Treatment</strong></p>
<ul>
<li>Own the operational risk assessment process and the supporting risk register, including conducting periodic and event-driven risk assessments, documenting current state, identifying deficiencies, and developing risk treatment recommendations.</li>
<li>Route risk acceptance and exception decisions to the appropriate decision authority with the underlying analysis and documentation prepared for review; track decisions and ensure follow-through on conditions or expirations.</li>
<li>Track open compliance findings and remediation activities, prepare status updates, and flag aging or high-severity items for escalation.</li>
</ul>
<p><strong>Third-Party & Supply Chain Risk</strong></p>
<ul>
<li>Contribute to vendor and supplier security review activities, including evaluating vendor security questionnaires, reviewing supplier control attestations, and assessing residual risk for inclusion in procurement and program decisions.</li>
<li>Support assessment of subcontractor and supplier flow-down compliance, including coordinating with sourcing and program management on supplier security obligations and remediation.</li>
</ul>
<p><strong>Audit & Assessment Support</strong></p>
<ul>
<li>Support internal and external audit, assessment, and certification activities, including C3PAO engagements, ISO 27001 surveillance audits, customer assessments, and regulator inquiries.</li>
<li>Coordinate evidence collection with system owners and control operators; validate that evidence is accurate, complete, and appropriately scoped before submission.</li>
<li>Participate in assessor and auditor interviews as a subject matter contributor on specific controls and artifacts.</li>
</ul>
<p><strong>Cross-Functional Collaboration</strong></p>
<ul>
<li>Partner with legal and sourcing on contract review, redlines, and flow-down language; with security program management on milestones, schedules, and audit coordination; and with security engineering and IT on evidence, control implementation detail, and remediation planning.</li>
<li>Serve as a knowledgeable point of contact for internal teams seeking to understand what a given regulatory or contractual requirement means in practice.</li>
</ul>
<p><strong>What Success Looks Like in Year One</strong></p>
<ul>
<li>Established a repeatable contract review intake process with legal and sourcing, including a maintained library of standard cybersecurity flow-down clauses and review turnaround expectations.</li>
<li>Produced an end-to-end Requirements Traceability Matrix for at least one active federal program, traceable from contract clauses through framework controls to evidence sources.</li>
<li>Stood up the operational risk register and routine risk reporting cadence, with at least one full assessment cycle completed and risk treatment decisions documented.</li>
<li>Maintained the ISMS documentation set in audit-ready condition through at least one external assessment or surveillance cycle.</li>
</ul>
<p><strong>Required Qualifications:</strong></p>
<ul>
<li>Five or more years of progressive experience in cybersecurity governance, risk, and compliance; IT audit; or a closely related discipline, with substantial hands-on exposure to framework interpretation and contract requirement analysis.</li>
<li>Demonstrated working knowledge of NIST SP 800-171 and NIST SP 800-53, including control families, assessment procedures, and common implementation patterns.</li>
<li>Experience contributing to SSP and POA&M artifacts, compliance matrices, or Requirements Traceability Matrices in a regulated environment.</li>
<li>Practical experience supporting at least one formal audit, certification, or assessment cycle (for example CMMC, ISO 27001, SOC 2, FedRAMP, or comparable).</li>
<li>Strong technical writing skills, including the ability to produce accurate, concise, and audience-appropriate compliance documentation. Writing samples may be requested as part of the interview process.</li>
<li>Demonstrated comfort and interest in reading contractual and regulatory language carefully and translating it into specific, actionable internal requirements. This is a core part of the role, not an occasional task.</li>
<li>Comfort working across multiple stakeholder groups — legal, sourcing, engineering, IT, security operations, and program management — and adjusting communication style accordingly.</li>
<li>Bachelor's degree in Information Security, Information Systems, Business, a related field, or equivalent practical experience.</li>
</ul>
<p><strong>Preferred Qualifications:</strong></p>
<ul>
<li>Direct experience with CMMC 2.0 assessment preparation, including familiarity with DFARS 252.204-7012 and 48 CFR Part 204.</li>
<li>Familiarity with ISO 27001, FedRAMP, SOC 2, NIS2, GDPR data security obligations, or EU dual-use export control regimes.</li>
<li>Experience handling Controlled Unclassified Information (CUI) in accordance with NARA and DoD requirements.</li>
<li>Exposure to aerospace, defense, space, or other regulated technology environments.</li>
<li>Experience reviewing or negotiating cybersecurity flow-down language in customer or supplier contracts.</li>
<li>Working familiarity with Governance, Risk, and Compliance (GRC) tooling such as ServiceNow GRC, Archer, Hyperproof, Drata, Vanta, or equivalent.</li>
<li>Industry certifications such as CISA, CRISC, CISSP, CGRC (formerly CAP), ISO 27001 Lead Implementer / Lead Auditor, CMMC Registered Practitioner (RP), or CMMC Certified Professional / Certified Assessor (CCP / CCA).</li>
<li>Active US security clearance, or eligibility to obtain one.</li>
</ul>
<p> </p>
<p>Spire operates a hybrid work model, and this position will require you to work a minimum of three days per week in the office.</p>
<p><span class="NormalTextRun CommentHighlightClicked SCXW152905918 BCX0">Access to US export-controlled software and/or technology may be </span><span class="NormalTextRun CommentHighlightClicked SCXW152905918 BCX0">required</span><span class="NormalTextRun CommentHighlightClicked SCXW152905918 BCX0"> for this role. If needed, Spire will arrange the necessary licenses—this is not something candidates need to have before applying. <span style="color: rgb(255, 255, 255);">#LI-DC1</span></span></p><div class="content-pay-transparency"><div class="pay-input"><div class="description"><p>The anticipated base salary range for this position is listed below. Final base salary for this role will be based on the location, skills, experience and qualifications. In addition to base compensation, this role may be eligible for annual equity awards and our employee benefits program, including vacation, sick, and personal time off; optional medical, dental, vision, life, and disability coverage; a 401(K) plan; health and wellness reimbursement program; and participation in Spire’s Employee Stock Purchase Plan.<br><br></p></div><div class="title">Salary Range</div><div class="pay-range"><span>$189,000</span><span class="divider">—</span><span>$225,000 USD</span></div></div></div><div class="content-conclusion"><p><strong><br>Global Perks</strong></p>
<p>🛰️ Name Your Satellite Program (NYSP)<br>🚀 Launch Attendance<br>🌴 Generous Time Off Policy<br>🎓 Education Assistance Program<br>🥰 Employee Assistance Program (EAP)<br>📈 Employee Stock Purchase Program (ESPP)<br>👣 Family Leave<br>💪 Fitness Reimbursement<br>🧡 Employee Referral Program<br>🍉 Healthy snacks & beverages in every office</p>
<p style="text-align: center;"> </p>
<p style="text-align: left;"><strong>About Spire</strong></p>
<p style="text-align: left;"><em>We</em> <em>improve life on Earth with data from space.</em></p>
<p>Spire Global is a space-to-cloud analytics company that owns and operates the largest multi-purpose constellation of satellites. Its proprietary data and algorithms provide the most advanced maritime, aviation, and weather tracking in the world. In addition to its constellation, Spire’s data infrastructure includes a global ground station network and 24/7 operations that provide real-time global coverage of every point on Earth.<br><br></p>
<hr>
<p><em><br>Spire is Global and our success draws upon the diverse viewpoints, skills and experiences of our employees. We are proud to be an equal opportunity employer and are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital status, disability, gender identity or veteran status.</em></p>
<p><em><span class="NormalTextRun SCXW208825983 BCX0">To help </span><span class="NormalTextRun SCXW208825983 BCX0">maintain</span><span class="NormalTextRun SCXW208825983 BCX0"> a safe and secure workplace for Spire employees, all candidates who receive a conditional offer will </span><span class="NormalTextRun SCXW208825983 BCX0">be required</span> <span class="NormalTextRun SCXW208825983 BCX0">to complete a background check</span><span class="NormalTextRun SCXW208825983 BCX0">. This </span><span class="NormalTextRun SCXW208825983 BCX0">may include criminal history and employment verification.</span></em></p>
<p><em>Please take a moment to review <a href="https://spire.com/global-data-privacy-notice/">Spire's Global Data Privacy Notice for Employees, Contractors, Candidates and Visitors</a>, as well as</em><em> <a href="https://spire.com/privacy-policy/">Spire's Privacy Policy.</a><br><br></em></p>
<hr>
<p><em><br>Kindly be advised that communication regarding your application may come from @spire.com, @recruiting.spire.com, or from Candidate.fyi (our scheduling tool).<br><br><br></em></p></div>
About Spire

Spire
spire.com
LifecycleOn-site
Want AI-powered job matching?
Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.
Get Started Free