More jobs:
ISSO Security Clearance
Job in
Huntsville, Madison County, Alabama, 35801, USA
Listed on 2026-01-28
Listing for:
Digital Prospectors
Full Time
position Listed on 2026-01-28
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Job Description & How to Apply Below
Position: ISSO
Location:
Huntsville, AL (On-site 4 days/week)
Length: 12+ Month Contract
* Clearance:
Candidates must possess active secret clearance
* Hybrid
Schedule:
Onsite 4 days/week with one day remote in Huntsville, AL
Job Description:
Develops and maintains an IS security program and policies for an assigned area of responsibility. Develops and oversees operational IS security implementation policy and guidelines. Monitors all available resources that provide warnings of system vulnerabilities or ongoing attacks. Monitors system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Responsible for security assessments, tests, and reviews;
ensuring proper measures are taken when an IS incident or vulnerability affecting classified systems or information is discovered. Ensures the application of configuration management policies and procedures for authorizing the use of hardware/software are followed. Ensures systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the SSP. Develops and updates the SSP, manages and controls changes to the system, and assesses the security impact of those changes.
Ensures user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures. Develops and maintains POA&Ms in order to identify IS weaknesses, resources and timelines for corrective actions, and mitigate actions. Ensures all users have the requisite security clearances and authorization and are aware of their security responsibilities.
Essential Duties and Responsibilities:
• Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements)
• Work with the ISSM on compliance activities including RMF Accreditation of several complex information systems
• Assist in the security configuration and management of collateral classified systems and networks in a variety of traditional and virtual environments including Linux, Unix, Sun, Mac, and Windows
• Confirm that plans of actions and milestones (POA&M) or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
• Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
• Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
• Utilizing previous RMF experience, recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
• Act as primary author on the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy
• Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures
• Collect, analyze, and store system audit records
• Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation
• Prepare for and participate in periodic organization compliance assessments
• Ensure account management documentation is complete and updated
• Maintain configuration management documentation (change tracking, maintenance logs, etc.)
Qualifications:
• Demonstrated understanding of the following security frameworks is required:
o NIST 800-53 / Risk Management Framework (RMF)
o Joint SAP Implementation Guide (JSIG)
o Intelligence Community Directive (ICD) 503
o National Industrial Security Program Operating Manual (NISPOM) Chapter 8
o DoD Manual 5205.07 Volumes 1- 4
o Assessment and Authorization Manual (DAAPM)
• BS degree in Information Security, Computer Science, Cybersecurity, Information Technology, Computer Information Systems, or related discipline is required.
• Technical experience, skills, and course…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×