Post job

Information security analyst jobs in Decatur, AL - 89 jobs

All
Information Security Analyst
Information Systems Security Officer
Cyber Security Analyst
Cyber Security Specialist
Cyber Security Engineer
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Aerovironment 4.6company rating

    Information security analyst job in Redstone Arsenal, AL

    AV is looking for a highly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA). Job Description: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&M). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Required: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance. DoD 8570 compliant IAM Level II certification is required (Security +) Experience with DoD's RMF and SSP processes Desired: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented Clearance Level Secret ITAR Requirement: T his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (โ€œITARโ€) and/or the Export Administration Regulations (โ€œEARโ€). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A โ€œU.S. personโ€ according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR ยง 120.15. Some positions will require current U.S. Citizenship due to contract requirements. Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************** We also encourage you to review our company website at ******************** to learn more about us. Principals only need apply. NO agencies please. Who We Are Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC. Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed. What We Do Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition. We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status. ITAR
    $61k-79k yearly est. Auto-Apply 8d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Analyst

    Bellatrix HRM

    Information security analyst job in Huntsville, AL

    Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth. Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency Title: Cyber Security Analyst Location: Onsite-Huntsville, AL Program: MDA, C3BM and C2BMC Number of Openings: 2 Immediate Direct Hire Clearance: Secret Travel: 25% Salary Range: $150,000-165,000, DOE General Overview: Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries. Responsibilities: Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process. Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment. Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG. Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG. Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG Requirements: Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program 5+ years of Related Experience Secret Clearance Familiarity with MDS cyber capabilities and policy Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts Security +, CE with a preferred certification level of CISSP Ability to work independently within a dynamic environment Apply cyber engineering and solutions to support real-world test, integration, and operations Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
    $150k-165k yearly 60d+ ago
  • Journeyman Cyber Analyst

    Ironmountain Solutions 4.2company rating

    Information security analyst job in Huntsville, AL

    501588 Journeyman Cyber Analyst Schedule: Full Time; 40 hours per week remote work not authorized IronMountain Solutions is seeing a Journeyman Cyber Analyst to provide support for a Redstone Arsenal customer. Candidates should be highly motivated, a self-starter, and able to handle multiple tasks simultaneously. Candidates must have the ability to obtain and maintain a Secret-level security clearance. Job Duties: โ€ข Process / maintain records in Enterprise Misson Assurance Support Service (eMASS) in both NIPR & SIPR environments. โ€ข Process / maintain records in Army Portfolio Management System (APMS) โ€ข Run Assured Compliance Assessment Solution (ACAS) scans and maintains standalone ACAS server. โ€ข Assist in the development, review, and maintenance of documentation for assigned information systems. System Security Plan, Software Fielding Plan, Continuous monitoring strategy, โ€ข Security Control Implementation: Support the implementation and validation of security controls (technical, administrative, and physical) as outlined in the SSP. โ€ข Vulnerability Management: Assist in vulnerability scanning and risk assessments, tracking remediation efforts, and reporting findings. โ€ข Security Incident Response: Participate in incident response activities, including initial triage, documentation, and reporting. โ€ข Configuration Management: Assist in maintaining accurate system configurations and documenting changes. โ€ข Authorization Support: Assist in preparing systems for Authorization to Operate (ATO) and maintaining system authorizations. โ€ข Compliance Monitoring: Assist in monitoring systems for compliance with security policies and procedures. โ€ข Participate in Cyber and System Engineering working group meetings with other organizations and OEMs under contract with ATE PM. โ€ข While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use tools or controls; normal physical activity (reach with hands and arms; climb stairs); and communicate effectively with all levels of employees and leadership. The employee must occasionally lift or move office products and supplies, up to 25 pounds. Basic Qualifications: โ€ข 3 - 10 years of relevant experience โ€ข BS or MS Degree required โ€ข CompTIA Security+ certification is preferred. โ€ข Other relevant certifications (e.g., Certified Ethical Hacker (CEH), A+, entry level) are a plus โ€ข Familiarity with embedded RTOS โ€ข Familiarity with protocols such as ARINC-429 & MIL-STD-1553 are a plus โ€ข Develop strong working relationships with ATE personnel and management โ€ข Ability to manage complex projects and work effectively with others โ€ข Ability to research, report and troubleshoot cyber security related issues โ€ข Have a Secret clearance. Per federal Per federal requirements, only U.S. citizens are eligible for this level of clearance. IronMountain Solutions is an Equal Opportunity Employer
    $67k-92k yearly est. Auto-Apply 13d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Information security analyst job in Huntsville, AL

    or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
    $64k-87k yearly est. Auto-Apply 60d+ ago
  • Mid-Level Cyber/Watch Floor Analyst

    Noetic Strategies Inc.

    Information security analyst job in Huntsville, AL

    Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). PREFERRED QUALIFICATIONS Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status. Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. Powered by JazzHR 6IxgcPuXI3
    $64k-87k yearly est. 17d ago
  • Cyber Security Engineer / Information Systems Security Officer (ISSO)

    Parsons Commercial Technology Group Inc.

    Information security analyst job in Huntsville, AL

    In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what's possible. Job Description: Parsons is looking for a talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Defense (GMD) Product Office under the TEAMS Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. What You'll Be Doing: * Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. * Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. * Ensure that system security artifacts are developed, reviewed, and updated as needed. * Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). * Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. * Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. * Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. * Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. * Track and monitor Plan of Action and Milestones (POA&Ms). * Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. * Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. * Track deliverables (i.e., artifacts, schedules, metrics). What Required Skills You'll Bring: * Bachelor's degree and 7+ years of related professional experience. * Active Secret clearance * DoD 8570 compliant IAM Level II certification is required (Sec +) * Experience with DoD's RMF and SSP processes What Desired Skills You'll Bring: * Experience with MDA specific RMF and SSP processes * Self-Motivated * Customer-oriented Security Clearance Requirement: An active Secret security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. Salary Range: $86,700.00 - $151,700.00 We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, Employee Stock Ownership Plan (ESOP), 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY! Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to ************************************************
    $86.7k-151.7k yearly Auto-Apply 12d ago
  • Advanced Acquisition Analyst/Cyber Security Analyst/CompTIA Certified

    Qed Analytics, Inc.

    Information security analyst job in Redstone Arsenal, AL

    Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred. Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment) Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews) Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations) Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process Requirements Prior MDA experience preferred. Advanced level - Master's degree required and/or 15 years' experience Intermediate level - Bachelor's degree required and/or 10 years' relevant experience Knowledge and experience in acquisition, procurement, and contracting highly desirable Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship SECRET or above Security Clearance required.
    $64k-87k yearly est. 60d+ ago
  • Cyber Security Compliance Specialist

    JS Solutions 4.2company rating

    Information security analyst job in Huntsville, AL

    Company: JS Solutions About Us: JS Solutions, LLC is a Huntsville-based, veteran-owned business dedicated to delivering innovative, mission-focused solutions to our government and commercial partners. Our team specializes in government acquisition support, cybersecurity compliance, and strategic business development. We are committed to helping our clients meet complex requirements with confidence and efficiency. Position Overview: JS Solutions is seeking a motivated and detail-oriented Junior Cyber Compliance Specialist to join our growing team in Huntsville, AL. This role is ideal for early-career professionals who are eager to build expertise in cybersecurity frameworks, with a focus on CMMC, NIST, and DoD compliance requirements. The successful candidate will support compliance initiatives, assist with documentation, and contribute to ensuring our clients achieve and maintain the highest standards of cybersecurity readiness. Responsibilities: Assist with the development, review, and maintenance of cybersecurity compliance documentation (policies, procedures, plans, and artifacts). Support compliance assessments against frameworks such as CMMC, NIST 800-171, DFARS, and FedRAMP. Collect and organize evidence to demonstrate compliance for audits and assessments. Track and update compliance tasks, ensuring deliverables are met on time. Conduct research on evolving federal cybersecurity requirements and provide recommendations to senior staff. Work closely with clients to understand compliance gaps and support remediation efforts. Provide administrative and technical support to senior compliance specialists. Qualifications: Bachelor's degree in Cybersecurity, Information Systems, Computer Science, or related field; or equivalent work experience. 0-2 years of professional experience in cybersecurity, compliance, or IT (internships and academic projects accepted). Familiarity with cybersecurity frameworks such as NIST 800-171, CMMC, or ISO 27001 preferred. Strong organizational skills and attention to detail. Excellent written and verbal communication skills. Ability to work independently as well as part of a team. CompTIA Security+, Certified CMMC Professional (CCP), or similar entry-level certification. Prior experience supporting DoD or government cybersecurity programs. BENEFITS Health, Supplemental Health, Vision, and Dental Insurance 401K Matching Short-term and Long-term Disability Insurance Paid Time Off (PTO) Why Join JS Solutions? Be part of a fast-growing, veteran-owned company with a mission-driven culture. Gain hands-on experience with cutting-edge cybersecurity compliance projects. Competitive compensation and benefits package. Opportunities for professional development and career advancement. JS Solutions is an Equal Opportunity Employer that does not discriminate based on actual or perceived race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other characteristic protected by applicable federal, state, or local laws and ordinances. The management team is dedicated to this policy regarding recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, access to facilities, and general treatment during employment.
    $70k-89k yearly est. 60d+ ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO) (Job ID: 4062)

    Valkyrie Enterprises 4.9company rating

    Information security analyst job in Huntsville, AL

    Cyber Security Engineer/Information Systems Security Officer (ISSO) Contingent upon prime contractor approval Purpose: Valkyrie Enterprises has need for a Cyber Security Engineer/Information Systems Security Officer (ISSO) in Huntsville, AL. In this role you will be providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. Job Description: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Qualifications: Must have a Bachelor's degree and 7+ years of related professional experience. Must have DoD 8570 compliant IAM Level II certification (Sec +). Must have experience with DoD's RMF and SSP processes. Desired Qualifications: Experience with MDA specific RMF and SSP processes, preferred. Self-Motivated Customer-oriented Security Requirements: Must have an Active DOD Secret Security clearance, and the ability to maintain clearance. Travel Requirements: Minimal Travel; 10% or less If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: **************************** Physical Requirements: Remaining in a stationary position, often standing, or sitting for prolonged periods Able to sit and work on a computer for long periods of time Moving about to accomplish tasks or moving from one worksite to another Communicating with others to exchange information Light work that includes moving objects up to 20 pounds Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO)
    $64k-84k yearly est. 10d ago
  • CYBER SECURITY ENGINEER

    Reliant Technology 3.7company rating

    Information security analyst job in Huntsville, AL

    Ignite is an ISO 9001:2015 and CMMI Services Level 3 certified, Service-Disabled Veteran-Owned Small Business (SDVOSB), headquartered in Huntsville, AL. By design, Ignite is a provider of professional services to customers in educational, federal, and commercial industries and in every action seeks to be the preeminent provider within this business space. Ignite upholds our values of competency, collaboration, innovation, reliability, and results through everything we do. Ignite is currently seeking a driven, detail-oriented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. Job Requirements Responsibilities include, but are not limited to: * Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. * Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. * Ensure that system security artifacts are developed, reviewed, and updated as needed. * Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). * Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. * Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. * Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. * Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. * Track and monitor Plan of Action and Milestones (POA&Ms). * Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. * Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. * Track deliverables (i.e., artifacts, schedules, metrics). Required Qualifications * Bachelor's degree and 7+ years of related professional experience. * Active Secret clearance * DoD 8570 compliant IAM Level II certification is required (Sec +) * Experience with DoD's RMF and SSP processes Desired Qualifications * Experience with MDA specific RMF and SSP processes * Self-Motivated * Customer-oriented Security Clearance Requirements: Must have an active Secret Security Clearance Education Requirements: * Bachelor's Degree Other Requirements: Must be a US citizen and be able to hold an active Security Clearance at the Secret Level. We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law. Accommodation Request: If you are a qualified individual with a disability or are a disabled veteran and are unable or limited in your ability to use or access our Careers sites as a result of your disability, you have the right to receive assistance in completing the application process. Please send your request to **********************
    $75k-101k yearly est. 11d ago
  • Information System Security Officer

    Teledyne 4.0company rating

    Information security analyst job in Huntsville, AL

    **Be visionary** Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research. We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins. **Job Description** **Job Summary** The Mid-Level to Senior Level Information System Security Officer (Mid-Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation. **Essential Duties and Responsibilities** may include the following. Other duties may be assigned. + You will be required to oversee the system compliance, and auditing of the information systems. + Review and revise IS system plans documentation based on analysis of the existing equipment configuration. Document any changes or special security requirements. + Oversee and manage the implementation of cybersecurity products that might include a SIEM tool, vulnerability scanner, endpoint security, DLP, and others. + Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices. + Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually. + Assist in the development of drafting procedures for the protection of the information system. + Assists in spill containment and cleanup. + Develop procedures to assist with manufacturing processes with Cybersecurity requirements in mind. + Partners and works with Government agencies, including the Department of Defense (DoD) and other relevant agencies, on information security matters + Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence. + Communicates security risks and solutions to business partners and IT staff as needed + Assists the Information Systems Security Manager (ISSM) and implements information systems security tasks, as required for safeguarding, handling, and controlling of classified materials, documents and equipment. Knowledgeable in information systems security in order to assure enforcement of company and government regulations. + Attends cybersecurity events and participates in other external cybersecurity activities to maintain current in the field + Knowledge of National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), and Risk Management Framework is required. + Responds to emergencies and remediates information security incidents. **Supervisory Responsibilities** This job has no supervisory responsibilities. **Competencies** To perform the job successfully, an individual should demonstrate the following competencies: + Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully. + Project Management - Communicates changes and progress. + Technical Skills - Pursues training and development opportunities; Strives to continuously build knowledge and skills. + Oral/Written Communication - Listens and gets clarification; Responds well to questions; Records data; Writes clearly and informatively; Able to read and interpret written information. + Teamwork - Gives and welcomes feedback; Supports everyone's efforts to succeed. + Leadership - Exhibits confidence in self and others; Inspires and motivates others to perform well; Accepts feedback from others; Gives appropriate recognition to others. + Change Management - Develops workable implementation plans; Communicates changes effectively. + Business Acumen - Understands business implications of decisions. + Ethics - Treats people with respect; + Organizational Support - Follows policies and procedures; Supports organization's goals and values. + Judgment - Includes appropriate people in decision-making process. + Motivation - Demonstrates persistence and overcomes obstacles. + Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently. + Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Accepts responsibility for own actions; Follows through on commitments. + Quality - Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality. + Quantity - Completes work in timely manner; Strives to increase productivity. + Safety and Security - Observes safety and security procedures including using Personal Protective Equipment (PPE) as required and wearing company issued badge when on company property; Reports potentially unsafe conditions ; Uses equipment and materials properly. + Adaptability - Adapts to changes in the work environment; Able to deal with frequent change, delays, or unexpected events. + Initiative - Seeks increased responsibilities; Asks for and offers help when needed. + Innovation - Generates suggestions for improving work. **Qualifications** To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. **Education and/or Experience:** Bachelor's degree (B.S.) from four-year college or university in a related field, such as: computer science, information systems, engineering, or other technical disciplines involving information systems and 5-10 years of relevant experience. **Language Skills** + Strong interpersonal skills. + Strong oral and written communication abilities with all levels of management, employees, and customers, ability to communicate and explain information efficiently. + Ability to translate security situations and postures into business objectives and outcomes **Mathematical Skills** + Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals. + Ability to compute rate, ratio, and percent. **Reasoning Ability** + Develops solutions to a variety of complex problems. = + May refer to established precedents and policies. + Demonstrates judgment and discretion in working with sensitive information and confidential matters. **Computer Skills** + Ability to learn and adapt to new technologies + Full knowledge and thorough understanding of: + Automated vulnerability scanning tools, forensic tools, Windows and other operating systems + Information security architecture, systems design, integration of systems and networking + Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.) + Knowledgeable in information systems security in order to assure enforcement of company and government regulations. **Other Essential Duties** + Follows all import/export requirements, consulting with facility import/export personnel as required. + Experience with the DCSA Assessment & Authorization Process. **Other Skills and Abilities** + Within 6 months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent. **Other Qualifications** + US Citizenship with ability to attain/maintain government security clearance. + Ability to travel (domestically/internationally) approximately _5__% \#TBE Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions. Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws. You may not realize it, but Teledyne enables many of the products and services you use every day **.** Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
    $63k-83k yearly est. 11d ago
  • Information Systems Security Officer

    Seneca Holdings

    Information security analyst job in Huntsville, AL

    Seneca Global Services, LLC is part of the Seneca Nation Group (SNG) portfolio of companies. SNG is Seneca Holdings' federal government contracting business that meets mission-critical needs of federal civilian, defense, and intelligence community customers. Our portfolio comprises multiple subsidiaries that participate in the Small Business Administration 8(a) program. To learn more about SNG, visit the website and follow us on LinkedIn. At Seneca, our team of talented individuals is what makes us successful. To support our team, we provide a balanced mix of benefits and programs. Your total rewards package includes competitive pay, benefits, and perks, flexible work-life balance, professional development opportunities, and performance and recognition programs. We offer a comprehensive benefits package that includes medical, dental, vision, life, and disability, voluntary benefit programs (critical illness, hospital, and accident), health savings and flexible spending accounts, and retirement 401K plan. One of our fundamental principles at Seneca Holdings is to offer competitive health and welfare benefits to our team members, providing coverage and care for you and your family. Full-time employees working at least 30 hours a week on a regular basis are eligible to participate in our benefits and paid leave programs. We pride ourselves on our collaborative work environment and culture, which embraces our mission of providing financial and non-financial benefits back to the members of the Seneca Nation. Seneca Global Services, LLC seeks a highly motivated Information Systems Security Officer (ISSO) to join our technical team supporting the National Cyber Range Complex (NCRC). The NCRC plays a critical role in enhancing the resilience of DoD systems and the effectiveness of U.S. cyber operations by delivering full-spectrum test and evaluation, workforce training, and mission rehearsal events. As the NCRC continues to evolve as a best-of-breed cyber range, the ISSO will contribute directly to ensuring secure facilities, tools, and expertise for some of the most demanding test, training, and mission rehearsal requirements in the Department of Defense. As a key member of the cybersecurity team, the ISSO will act as a security liaison across multiple domains-including physical, personnel, information, cyber, operations, Anti-Terrorism/Force Protection, law enforcement, communications, and technical security-while working closely with the Information Systems Security Manager (ISSM) to ensure compliance, readiness, and secure mission execution. Responsibilities include, but are not limited to: Provide direct support to the ISSM on activities such as Assessment & Authorization (A&A), execution of Continuous Monitoring Plans, and facilitation of Security Controls Assessments. Administer and monitor Risk Management Framework (RMF) steps and activities throughout the system lifecycle to maintain an appropriate security posture. Implement cybersecurity programs, policies, and procedures for assigned systems. Maintain working knowledge of current and upcoming events, system functions, policies, safeguards, and security measures. Serve as a subject matter expert in RMF core concepts and processes. Coordinate with applicable stakeholders across the enterprise to ensure security compliance and readiness. Maintain Authorization to Operate (ATO) packages for assigned systems within the designated A&A System of Record (e.g., eMASS, XACTA 360, Keystone). Review and analyze audit logs (e.g., Splunk, Windows EVTX, Linux syslogs) to detect potential anomalies or threats. Perform validation checks to ensure CM-approved software and antivirus definitions are installed on assigned systems. Conduct compliance/vulnerability scans and manual checks to identify and mitigate risks. Execute ISSO-specific tasks as outlined in program security plans. Deliver cybersecurity education, training, and awareness to system users as required by the ISSM. Basic Qualifications: Active Top Secret clearance with SCI eligibility. Bachelor's degree in Cybersecurity, Information Systems, or related discipline, and/or 8+ years of relevant experience (additional experience may substitute for degree). Minimum of 5 years of extensive experience in cybersecurity, information assurance, and RMF processes. DoDD 8140.01 IAT Level II certification or higher. At least 2 years of experience conducting IT application, system, or network reviews and providing DoD cybersecurity policy and technical guidance. Desired Skills: Certifications aligned to DoDM 8140.03 / DoD Cyberspace Workforce Framework. Familiarity or background with some of the following technologies: CISCO equipment (routing and switching technologies) Zero-trust requirements VMWare (vSphere, vCenter, NSX, ESXi) RHEL (Ansible, Kubernetes, StackRox, OpenShift) AWS / Azure cloud technologies and containerization F5 BIG-IP, Cisco networking, and distributed technologies STIG and IAVA implementation NetApp storage technologies Dell Blade Servers Equal Opportunity Statement: Seneca Holdings provides equal employment opportunities to all employees and applicants without regard to race, color, religion, sex/gender, sexual orientation, national origin, age, disability, marital status, genetic information and/or predisposing genetic characteristics, victim of domestic violence status, veteran status, or other protected class status. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation and training. The Company also prohibits retaliation against any employee who exercises his or her rights under applicable anti-discrimination laws. Notwithstanding the foregoing, the Company does give hiring preference to Seneca or Native individuals. Veterans with expertise in these areas are highly encouraged to apply.
    $61k-83k yearly est. Auto-Apply 34d ago
  • Cyber Security Engineer/ Information Systems Security Officer (ISSO)

    Banner Defense

    Information security analyst job in Huntsville, AL

    Cyber Security Engineer/Information Systems Security Officer (ISSO) Join our team! Be a part of our passionate and determined team on a mission to use our skills and experiences to make a difference in the defense and aerospace industry. Position Description: Banner Defense is looking for a Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of a federal solutions team providing Systems Project Office for the Missile Defense Agency. Responsibilities: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Required Skills/Experience: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's Risk Management Framework (RMF) and Source Selection Plan (SSP) processes Desired Skills/Experience: Experience with MDA-specific RMF and SSP processes Self-Motivated Customer-oriented APPLY TODAY!! Service-Disabled Veteran Owned Small Business Equal Employment Opportunity (EEO) employer Reasonable accommodation may be made to enable qualified individuals with disabilities to perform essential job functions.
    $61k-83k yearly est. 11d ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Mission Driven Research

    Information security analyst job in Huntsville, AL

    Job Description MDR is looking for an amazingly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. What You'll Be Doing: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). What Required Skills You'll Bring: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's RMF and SSP processes What Desired Skills You'll Bring: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented Position Requirements Clearance Required Secret Position Level Mid FT/PT Full Time Years Related Work Experience 7 Education Level Required 4-yr Mission Driven Research is an Equal Opportunity Employer, including disability/veterans. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you are interested in applying for employment with Mission Driven Research and need special assistance or an accommodation to use our website, please contact us by email (****************************) or by phone by calling **************. When contacting us, please provide your contact information and state the nature of your accessibility issue. Job Posted by ApplicantPro
    $61k-83k yearly est. 10d ago
  • Cyber Security Engineer / Information Systems Security Officer (ISSO)

    Apex Tk

    Information security analyst job in Huntsville, AL

    APEX TK is looking for an amazingly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. What You'll Be Doing: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). What Required Skills You'll Bring: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's RMF and SSP processes What Desired Skills You'll Bring: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented
    $61k-83k yearly est. Auto-Apply 11d ago
  • Information System Security Officer (ISSO)

    Spry Methods 4.3company rating

    Information security analyst job in Huntsville, AL

    Job DescriptionWho We're Looking For (Position Overview):This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.What Your Day-To-Day Looks Like (Position Responsibilities): Serve as the principal cybersecurity advisor to system owners and stakeholders. Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions. Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). Responsible for ensuring operational security is maintained for assigned information systems. Ensure systems are operated, maintained, disposed of in accordance with security policies and practices. Perform Security Incident Reporting and Response. Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process. Ensure audits and reviews are responded to with accurate information. Perform system access control responsibilities. Participate in the change management process for assigned applications. Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle. Perform continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures. Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan. Responsible for ensuring the implementation and maintenance of annual security controls assessments. Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations. Working directly with development, platform, and infrastructure teams on security problems. What You Need to Succeed (Minimum Requirements): Top Secret (TS) Clearance with SCI eligibility. 3 - 5 years of experience required. Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA. Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure. Analyze logs using Splunk and AWS tools. Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk. Work with GRC tools such as Xacta/JCAM Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP Experience using Atlassian suite tools such as JIRA/CONFLUENCE Experience with Agile Methodologies/SAFe Expertise on Information Security Principles, processes and guidelines Able to obtain and maintain an Authority to Operate (ATO) for Information Systems. Experience with scanning tools such as Tenable Nessus Ability to work on multiple projects with various timelines, at times very short deadlines. Ideally, You Also Have (Preferred Qualifications): Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security - Specialty, or other relevant certifications. Experience in a high-side or multi-enclave (U/S/TS) environment. Experience working with Agile development teams and CI/CD pipelines. Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible). Familiarity with NIST 800-53 Rev. 5 #CJ We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $63k-82k yearly est. 5d ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Aerovironment 4.6company rating

    Information security analyst job in Huntsville, AL

    AV is looking for a highly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA). Job Description: + Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. + Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. + Ensure that system security artifacts are developed, reviewed, and updated as needed. + Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). + Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. + Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. + Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. + Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. + Track and monitor Plan of Action and Milestones (POA&M). + Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. + Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. + Track deliverables (i.e., artifacts, schedules, metrics). Required: + Bachelor's degree and 7+ years of related professional experience. + Active Secret clearance. + DoD 8570 compliant IAM Level II certification is required (Security +) + Experience with DoD's RMF and SSP processes Desired: + Experience with MDA specific RMF and SSP processes + Self-Motivated + Customer-oriented **Clearance Level** Secret **ITAR Requirement:** _T_ _his position requires access to information that is subject to compliance with the International Traffic Arms Regulations ("ITAR") and/or the Export Administration Regulations ("EAR"). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A "U.S. person" according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR ยง 120.15. Some positions will require current U.S. Citizenship due to contract requirements._ **Benefits** : AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************* . We also encourage you to review our company website at ******************** to learn more about us. Principals only need apply. NO agencies please. **Who We Are** Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC. Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed. **What We Do** Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition. _We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status._ **ITAR** **About AV:** **AV isn't for everyone. We hire the curious, the relentless, the mission-obsessed. The best of the best.** We don't just build defense technology-we redefine what's possible. As the premier autonomous systems company in the U.S., AV delivers breakthrough capabilities across air, land, sea, space, and cyber. From AI-powered drones and loitering munitions to integrated autonomy and space resilience, our technologies shape the future of warfare and protect those who serve. Founded by legendary innovator Dr. Paul MacCready, AV has spent over 50 years pushing the boundaries of what unmanned systems can do. Our heritage includes seven platforms in the Smithsonian-but we're not building history, we're building what's next. **If you're ready to build technology that matters-with speed, scale, and purpose-there's no better place to do it than AV.** **Careers at AeroVironment (*****************************************
    $61k-79k yearly est. 6d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Information security analyst job in Huntsville, AL

    Job Description or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law. Powered by JazzHR CkYm1Mbb4K
    $64k-87k yearly est. 3d ago
  • Mid-Level Cyber/Watch Floor Analyst

    Noetic Strategies

    Information security analyst job in Huntsville, AL

    Job Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). PREFERRED QUALIFICATIONS Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status. Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $64k-87k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Mission Driven Research

    Information security analyst job in Huntsville, AL

    MDR is looking for an amazingly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. What You'll Be Doing: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). What Required Skills You'll Bring: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's RMF and SSP processes What Desired Skills You'll Bring: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented Position Requirements Clearance Required Secret Position Level Mid FT/PT Full Time Years Related Work Experience 7 Education Level Required 4-yr Mission Driven Research is an Equal Opportunity Employer, including disability/veterans. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you are interested in applying for employment with Mission Driven Research and need special assistance or an accommodation to use our website, please contact us by email (****************************) or by phone by calling **************. When contacting us, please provide your contact information and state the nature of your accessibility issue.
    $61k-83k yearly est. 10d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Decatur, AL?

The average information security analyst in Decatur, AL earns between $57,000 and $111,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Decatur, AL

$80,000
Job type you want
Full Time
Part Time
Internship
Temporary