×
Register Here to Apply for Jobs or Post Jobs. X

ISSO Specialist

Job in Huntsville, Madison County, Alabama, 35824, USA
Listing for: Aquila Technology
Full Time position
Listed on 2026-01-30
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Overview

ISSO Specialist

Clearance Level: Must have a Secret Clearance or Higher to be considered. Must be US Citizen.

Aquila Technology is seeking an ISSO Specialist to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).

Responsibilities
  • Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).
  • Work with the ISSM on compliance activities including RMF Accreditation of several complex information systems
  • Assist in the security configuration and management of collateral classified systems and networks in a variety of traditional and virtual environments including Linux, Unix, Sun, Mac, and Windows
  • Confirm that plans of actions and milestones (POA&M) or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
  • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
  • Utilizing previous RMF experience, recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
  • Act as primary author on the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy
  • Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures
  • Collect, analyze, and store system audit records
  • Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation
  • Prepare for and participate in periodic organization compliance assessments
  • Ensure account management documentation is complete and updated
  • Maintain configuration management documentation (change tracking, maintenance logs, etc.)
  • Serve as a member of the Configuration Control Board (CCB) as needed
Qualifications
  • Must Have:
    Certification - Current DoD 8570 IAT Level II Certification (GSEC, Security+ CE, SSCP, CCNA-Security)
  • Must Have:
    Degree Level - Bachelor's Degree
  • Must Have:
    Clearance Level - Currently holds a Secret Clearance (OR a higher clearance)
  • Required:

    Demonstrated understanding of the following security frameworks is required:
  • NIST 800-53 / Risk Management Framework (RMF)
  • Joint SAP Implementation Guide (JSIG)
  • Intelligence Community Directive (ICD) 503
  • National Industrial Security Program Operating Manual (NISPOM) Chapter 8
  • DoD Manual 5205.07 Volumes 1- 4
  • Assessment and Authorization Manual (DAAPM)
  • BS degree in Information Security, Computer Science, Cybersecurity, Information Technology, Computer Information Systems, or related discipline is required. Technical experience, skills, and course work completed towards an Undergraduate Degree, or industry IT certifications may be considered in lieu of education or DoD security experience requirements
  • Possess a DoD 8570.01-M IAM I baseline certification (e.g. CompTIA Security+). The group will consider someone w/out this certification IF they are willing to obtain in first 6 months at supplier or candidate's expense
  • Demonstrated experience with vulnerability scanning and auditing tools and processes is required
  • Experience and familiarity with multiple operating systems such as Windows Server 2012, 2016 and 2019, Windows 7 and 10, Red Hat Enterprise Linux, Ubuntu, Mac, etc.
  • Desired: A minimum of 5 years of IT security experience in DoD Information Security is preferred
  • Technical experience securing networks and systems utilizing DISA STIGs and/or SRGs is highly desired
  • Experience with virtualization and Cloud technologies is…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary