Job Locations US-AL-Huntsville
Business Unit
Secret Clearance Preferred
Location : Location


ISSO develops Risk Management Framework (RMF) Assess and Authorization documentation, standard operating procedures, policies andsecurity instructions for both networked and stand-alone computer systems and provides oversight and guidance for multiple systems.


Responsible for supporting the Cyber Security Program to include but not limited to Cyber Security policy, procedures and regulations toassist with identifying potential Cyber Security issues. Will monitor, evaluate, and maintain systems and procedures to safeguardinformation systems, networks and databases. Implements, enforces, communicates and develops security policies or plans for data,software applications, hardware, telecommunications and information systems security education/ awareness programs. Establishes andsatisfies system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands.Candidate will be responsible for serving as an Information Systems Security Officer (ISSO) for systems assigned. Responsibilities of an ISSOinclude (but are not limited to) maintenance of authorization packages, account management, security auditing and configurationmanagement reporting. Other duties as assigned. Position requires good communication skills with users and co-workers and ability toadapt to a dynamic customer-oriented environment.



  • Bachelor’s degree in related field.
  • Minimum of 9 years related experience.
  • Active or the ability to obtain a DoD 8570 Information Assurance IAM-I level certification (Security+).
  • Experience determining and assessing vulnerabilities including planning, testing, and documenting (DoD) accreditation packagesfor Information Technology (IT) systems and networks, specifically within RMF.
  • Working knowledge of eMASS, ACAS, HBSS, DISA STIGS and STIG-Tools.
  • Ability to obtain and maintain DoD SECRET Security Clearance required.

Desired Qualifications:

  • Experience applying DISA STIGS, conducting vulnerability audits, security configuration checks, and system configuration scans tomeet Cyber Security requirements.
  • Experience deploying and configuring HBSS components.
  • Knowledge of Information Security and Auditing.
  • Ability to achieve Certified Information Security Professional (CISSP) or equivalent desired.
  • Knowledge of Federal and DoD Guidance DoDD 8500.1, DoDI 8500.2, DoDI 8510.01 SP 800-57, SP 800-53, CNSSI 1253.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.