BETA Technologies is creating an electric transportation ecosystem that’s safe, reliable and sustainable. A relentlessly focused team is building an extensive charging infrastructure and ALIA, the world’s most technologically advanced electric vertical aircraft (EVA).
BETA’s platform and products are strikingly simple. Prioritization of safety and a pragmatic approach to certification drive elegant redundancy, appropriate diversity of implementation and simplicity of control. ALIA’s fixed-pitch propellers and centrally located batteries make it an inherently stable aircraft that is safe to fly and easy to maneuver.
At BETA Technologies, we apply our intellectual curiosity, passion for aviation, and commitment to sustainability toward a shared mission of revolutionizing electric aviation. Regardless of the position one holds, each team member brings their talent and desire to positively impact the environment and lives of others in a refreshing, vibrant, and inclusive culture.
The Cybersecurity GRC Analyst strengthens BETA’s cybersecurity posture by taking a prominent role in the company’s approach to cybersecurity governance, risk, and compliance. While sensitivity to the particulars of cybersecurity as a discipline is important, this analyst’s ability to organize and track requirements and risk information broadly will be their chief contribution to BETA’s success.
Build electric airplanes with us!
We encourage all driven candidates to apply, even if they do not meet every listed qualification.
We are an equal opportunity employer. Employment decisions are based on merit, competence and qualifications and will not be influenced in any manner on race, color, religion, age, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, disability, veteran or military status, genetic information, pregnancy, or any other protected characteristic under federal, state, or local law. BETA complies with all applicable federal, state and local non-discrimination laws and does not tolerate discrimination of any kind in our workplace.
Employment offers are contingent upon the successful completion of a background check. BETA Technologies participates in E-Verify.
How you will contribute to revolutionizing electric aviation:
Inventory, understand, and cross-reference multiple suites of cybersecurity controls and requirements to support BETA’s compliance with applicable regulations and contractual obligationsCollaborate with teammates from Digital Infrastructure, Legal, and other teams to articulate and catalog cyber risks throughout the organizationMaintain BETA’s cyber Risk Register (initial documentation, aging/reassessment, sunset)Lead internal- and coordinate BETA’s response to external cybersecurity audits, tracking disposition of findingsCollaborate with teammates from around the organization to develop- and maintain cybersecurity policiesDevelop- and continuously improve resources (e.g., procedural documentation) and training in support of governance, risk, and compliance initiativesParticipate in cybersecurity governance committees as a subject-matter expertContribute reporting to inform periodic (monthly, annual, etc.) enterprise security posture reviewsMinimum Qualifications:
Demonstrated ability to understand- and optimize the presentation of multiple collections of overlapping information for action by operational teamsDemonstrated ability to develop- and operate processes for tracking information change over timeStrong teamwork orientationAptitude for training othersExcellent written and verbal communicationStrong sense of initiativeAbove and Beyond Qualifications:
Experience leading cyber compliance efforts at organizations >100 employees/membersExperience implementing, monitoring, and auditing programs handling USG export-controlled information (EAR, ITAR)Experience leading USG Cybersecurity Maturity Model Certification (CMMC) and/or National Industrial Security Program (NISP) effortsUS Department of Defense Information Systems Security Officer (ISSO) certificationExperience implementing and tracking compliance with two or more cybersecurity control frameworks originating from different organizations/authoritiesExperience developing policy with enterprise reachGIAC GCCC, GLEG, GSTRT, GCPM certification or similarPhysical Demands and Work Environment:
This role consists primarily of computer work and presentations to groups in an office environment