Post job

Information security analyst jobs in Huntsville, AL

- 54 jobs
All
Information Security Analyst
Information Systems Security Officer
Cyber Security Analyst
Information Technology Analyst
Senior Information Assurance Analyst
Information Assurance Engineer
Senior Security Specialist
Cyber Security Specialist
Senior Systems Security Engineer
  • Senior Information System Security Officer

    Mantech 4.5company rating

    Information security analyst job in Huntsville, AL

    MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Provide liaison support between the system owner and other IS security personnel Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes Minimum Qualifications: Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience. Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $53k-71k yearly est. 1d ago
  • Information Systems Security Officer

    Catapult Federal Services

    Information security analyst job in Huntsville, AL

    Clearance Required: Top Secret/SCI We are seeking an experienced Information Systems Security Officer (ISSO) to support classified environments and mission-critical programs and initiatives. This role provides day-to-day cybersecurity, accreditation, and compliance support for Collateral and SCI systems within secure areas. The ISSO will play a key role in maintaining the security posture of classified information systems, ensuring compliance with DoD, Intelligence Community directives, and the Risk Management Framework (RMF). Key Responsibilities Security & Policy Support Apply knowledge of security policies, ICDs, DoD manuals, JAFANs, and related guidance. Work effectively across a dynamic environment with DoD personnel, military/civilian stakeholders, and industry partners. Operate with minimal supervision while demonstrating initiative, independence, and strong problem-solving capabilities. RMF Responsibilities Review, prepare, update, and maintain RMF accreditation packages. Perform RMF self-inspections and support compliance reviews. Track changes affecting system accreditation and notify appropriate stakeholders. Identify vulnerabilities and recommend/implement mitigation strategies. Conduct security surveys and coordinate documentation for accreditation packages. Prepare and track RMF inspections, findings, and corrective action responses. Maintain RMF security documentation and system records. System Operations & Continuous Monitoring Ensure all authorized systems are operated, maintained, and disposed of in accordance with RMF and security policies. Assist with Cyber Test & Evaluation (CT&E) activities for government partners. Collect, review, and analyze security scans, audit logs, and system alerts. Perform vulnerability management and apply continuous monitoring processes for classified systems. Customer & Mission Support Support both internal and external customers as part of ISSO duties. Maintain strong communication and coordination with stakeholders regarding system security posture. Required Qualifications 5-9 years of related ISSO, cybersecurity, or information assurance experience. ACAS (Assured Compliance Assessment Solution) Splunk Background in Systems Administration. Strong understanding of RMF processes, documentation, and compliance requirements. Education Bachelor's degree or an additional 4 years of relevant experience in lieu of a degree. Certifications Must meet DoD 8570.01-M requirements Must posess/obtain IAT Level II certification within 6 months of hire (e.g., Security+ CE, CCNA Security, CySA+, etc.). Security Clearance Active Top Secret/SCI required.
    $61k-83k yearly est. 2d ago
  • Cyber Security Analyst

    Bellatrix HRM

    Information security analyst job in Huntsville, AL

    Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth. Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency Title: Cyber Security Analyst Location: Onsite-Huntsville, AL Program: MDA, C3BM and C2BMC Number of Openings: 2 Immediate Direct Hire Clearance: Secret Travel: 25% Salary Range: $150,000-165,000, DOE General Overview: Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries. Responsibilities: Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process. Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment. Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG. Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG. Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG Requirements: Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program 5+ years of Related Experience Secret Clearance Familiarity with MDS cyber capabilities and policy Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts Security +, CE with a preferred certification level of CISSP Ability to work independently within a dynamic environment Apply cyber engineering and solutions to support real-world test, integration, and operations Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
    $150k-165k yearly 60d+ ago
  • Sentinel Sr. Principal STPA-Systems Security Engineer 14309

    Northrop Grumman 4.7company rating

    Information security analyst job in Huntsville, AL

    RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. The Sentinel Mission Defense Team (MDT) is seeking a highly motivated and qualified system engineer to serve as a System-Theoretic Process Analysis for Security (STPA-Sec) Engineer, Level 4. You will be combining traditional Systems Engineering skills, with a holistic system analyses approach in order to uncover any potential security, safety, or availability features using the existing STPA handbook guidelines, industry security frameworks (NIST, ISO, NISPOM), and Model Based Systems Engineering (MBSE) workspace. You will be generating structured requirements, decomposition strategies, and mitigations within STPA principles. This position will be located in Huntsville, Alabama and may offer a competitive relocation package. Additional Responsibilities include: Execute combined traditional Systems Engineering principles, with a holistic system analyses approach in order to uncover any potential safety, security, or availability features using the existing STPA handbook guidelines, and Model Based Systems Engineering (MBSE) workspace Ability to understand and decompose systems to identify causal scenarios; aptitude to construct control structures and identify unsafe control actions Assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components Lead and execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments Lead in a variety of working groups and customer meetings; ensure communication of risk environment with stakeholders Self-starters compelled to take action in the workplace without requiring prompting from supervisors Support MDT with other duties as assigned Basic Qualifications: Must be a US Citizen with an active DoD Secret Clearance with an investigation date within the last 6 years Must be able to be successfully screened for Enhanced Security Clearances, within a reasonable amount of time as determined by the company to meet its business needs Bachelor's degree in a STEM (Science, Technology, Engineering or Mathematics) discipline from an accredited university and 8 years of related experience, or a Master's degree in a STEM discipline and 6 years of related experience, or a PhD in a STEM discipline and 4 year of related experience. Minimum 2 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense Programs. Minimum 2 years' experience demonstrating the ability to communicate effectively and clearly present technical approaches and findings. Minimum 2 years' experience in applying safety thinking to a complex system in a rapidly changing product or technology. Minimum 2 years' experience in applying analytical methodologies to raw data in order to determine and present clear and precise findings and recommendations. Minimum 2 years' experience performing against schedule. Preferred Qualifications: Active Top-Secret clearance with SAP Access. Direct experience with ICBM Systems Experience applying Program Protection principles to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI) Experience developing Systems Security Engineering requirements for hardware and software assurance Experience with Risk Management (identification and development of risks) and driving risk mitigations to closure. Experience with assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components. Direct experience with Model-based Systems Engineering (MBSE) concepts and tools (CAMEO, DOORS). Position Benefits: As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including Medical, Dental & Vision coverage Educational Assistance Life Insurance Employee Assistance Programs & Work/Life Solutions Paid Time Off Health & Wellness Resources Employee Discounts This positions standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off. This role may offer a competitive relocation assistance package. #Sentinelsystems Primary Level Salary Range: $118,600.00 - $178,000.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $118.6k-178k yearly Auto-Apply 60d+ ago
  • Mid-Level Cyber/Watch Floor Analyst

    Noetic Strategies

    Information security analyst job in Huntsville, AL

    Job Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). PREFERRED QUALIFICATIONS Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status. Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $64k-87k yearly est. Auto-Apply 60d+ ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Information security analyst job in Huntsville, AL

    or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
    $64k-87k yearly est. Auto-Apply 33d ago
  • Cyber Assurance Analyst Senior Principal - Kwajalein Atoll -3801

    Range Generation Next

    Information security analyst job in Huntsville, AL

    Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities. This position is located on Kwajalein Atoll, Republic of the Marshall Islands. Essential Functions Support the Reagan Test Site (RTS) Operations Center as Cyber Assurance Analyst Senior Principal in Kwajalein Atoll, Marshall Islands. Serve as the Senior Principal Cyber Assurance Analyst for the RETS Cybersecurity organization. Performs as the team lead for the Cyber Operations team located in both Kwajalein Atoll, Marshall Islands and Huntsville, AL. Directs strategic technical security compliance, leads all Cyber Operations functions, and communicates to RETS Cybersecurity leadership on RMF implementation and operational assurance across the RTS enterprise. Lead the investigatory efforts of all potential security violations, determining policy breaches, and directing the execution of the organization's Incident Response Plan to ensure timely and effective mitigation. Direct the Cyber Operation team's efforts in supporting, monitoring, assessing, validation, and verification of technical security compliance of all hardware and software security controls, ensuring resilience and continuous cybersecurity assurance of the network environment. Own, manage, and report technical compliance with applicable critical security notices from SMDC, NETCOM, C5ISR, and RETS Cybersecurity leadership. Provide direct technical leadership, mentorship, training, and workflow management for the Cyber Operations team, establishing best practices and ensuring consistent, high-quality execution of all defensive operations. Required Skills Exceptional coaching, mentorship, and team lead skills required to direct the Cyber Operations team and effectively articulate complex security risks to direct leadership. Direct information dissemination, task delegation, and workflow management for the Cyber Operations team. Expert ability to research, develop, and implement advanced technical security solutions for complex hardware and network infrastructures with high reliability and availability requirements. Proven technical writing proficiency in authoring high-level artifacts, including SOPs, technical reports, and essential RMF documentation. Highly proficient in the analysis, usage, remediation, and reporting of SIEM, IDS/IPS, and endpoint protection solutions (e.g., Trellix/Defender) for security effectiveness. Demonstrated expertise in the effective application and validation of DISA STIGs, STIG Checklists, and SRGs to establish and enforce security configuration baselines. Mastery in utilizing Tenable ACAS/Nessus for comprehensive vulnerability scanning, compliance reporting, and assessing cyber operations effectiveness. Comprehensive working knowledge of Army Regulation 25-1/2, DoD, DISA, and RMF requirements and guidance to ensure strategic program alignment and compliance. Required Experience Bachelor's Degree in Computer Science, Cybersecurity or related field. Ten (10) or more years related experience in Information Assurance, System Administration, or technical support of an Enterprise environment. Proven experience leading technical teams, including active mentorship and the ability to upskill staff through hands-on training and coaching. Proficient at communicating security concerns and issues to non-technical audiences. Must currently have and maintain one of the following DoD 8140, IAM Level III, certifications: Certified Chief Information Security Officer (C-CISO), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), or GIAC Security Leadership (GSLC). Additional Eligibility Qualifications Must be able to relocate to the United States Army Garrison, Kwajalein Atoll, Marshall Islands. Must be able to obtain and maintain a DoD Secret security clearance which requires U.S. Citizenship. Must be able to obtain and maintain a U.S. passport The flexibility to work occasional non-duty hours or on weekends to support specific project or mission requirements. Benefits of Working at RGNext RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment. Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate. RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
    $74k-99k yearly est. Auto-Apply 13d ago
  • SENIOR SECURITY SPECIALIST/ISSO

    Quantum Research International 4.5company rating

    Information security analyst job in Huntsville, AL

    Quantum Research International, Inc. (Quantum) provides our national defense and federal civilian and industry customers with services and products in the following main areas: 1) Cybersecurity and Information Operations; 2) Space Operations and Control; 3) Aviation Systems; 4) Ground, Air and Missile Defense, and Fires Support Systems; 5) Intelligence Programs Support; 6) Experimentation and Test; 7) Program Management; and (8) Audio/Visual Technology Applications. Quantum's Corporate Office is located in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen, MD; Colorado Springs, CO; Crestview, FL; Orlando , FL and Tupelo, MS. Mission: Quantum Research is currently seeking an experienced individual for our Senior Security Specialist / Information System Security Officer opening. Ideal candidate for Senior Security Specialist/ ISSO will be responsible for the overall security posture of the of the Compute Architecture Operations Center (CAOC) platform for information security IAW DoD/NIST RMF requirements. The candidate will be responsible for hosting the change board control meetings, representing RMF requirements in the review of all system change request. Candidate will maintain expert knowledge and oversight of configuration management, security scans and remediation, own the Plan of Action and Milestones (POAM). In this role, you will work with the CAOC team on security measures, explain potential threats, implement security measures in order to meet or exceed all DoD/NIST RMF requirements. Responsibilities: * Serve as a principal advisor/subject matter expert (SME), to the program on all matters, technical and otherwise, involving the security requirements of an Information System (IS) based on the applicable NIST standards. * Maintain responsibility for the day-to-day security operations of the system. * Security Control Validation Visits * Secure Configuration and Change management * Event Management * Account Management * Vulnerability Management * Security Incident Management * POAM Management * Initial Authorization, Reauthorization, and Decommissioning Collaborate with the System Owner to maintain Approval to Operate (ATO), including the resolution of any POAM documents issued by the DAO. * Maintain and validate account and vulnerability management * Develop and provide update System security Plans (SSPs) and supporting documentation (e.g. SECONOPs, diagrams, Privileged User's Guide) * Prepare Security Impact Assessments (SIAs) for all System Change Requests (SCRs) for Configuration Control Board (CCB) review. * Provide security design guidance and analysis to the project team throughout the RMF process * Collaborate with the Program System Engineer in the design, build, and self-test of systems * Perform reviews of technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommended mitigation strategies * Joint Management Network (JMN) experience for establishing requirements and achieving approval to operate on the network. Minimum Qualifications: * Minimum of a Bachelor of Science (BS) degree in Computer Science, Information Systems, Mathematics, Engineering, or five (5) years of comparable work experience. Progressive and demonstrated enterprise security engineering and security management experience. * ISSO with 3+ years of verifiable experience * Certified information Systems Security Professional (CISSP) and possess acute knowledge and practical experience of DoD 8510 and NIST 800-53 Risk Management Framework, respectively. ISSO must be DoD 8570 compliant at IA Technical (IAT)/IA management (IAM) Level 3 * Enterprise Mission Assurance Support Service (eMASS) training/experience * Analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues. * Ability to obtain a Secret Security Clearance. Equal Opportunity Employer/Affirmative Action Employer M/F/D/V: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. *Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. #LI-JL1 #LI-Onsite
    $92k-122k yearly est. 26d ago
  • Information System Security Officer (ISSO)

    Spry Methods 4.3company rating

    Information security analyst job in Huntsville, AL

    Job DescriptionWho We're Looking For (Position Overview):This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.What Your Day-To-Day Looks Like (Position Responsibilities): Serve as the principal cybersecurity advisor to system owners and stakeholders. Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions. Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). Responsible for ensuring operational security is maintained for assigned information systems. Ensure systems are operated, maintained, disposed of in accordance with security policies and practices. Perform Security Incident Reporting and Response. Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process. Ensure audits and reviews are responded to with accurate information. Perform system access control responsibilities. Participate in the change management process for assigned applications. Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle. Perform continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures. Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan. Responsible for ensuring the implementation and maintenance of annual security controls assessments. Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations. Working directly with development, platform, and infrastructure teams on security problems. What You Need to Succeed (Minimum Requirements): Top Secret (TS) Clearance with SCI eligibility. 3 - 5 years of experience required. Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA. Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure. Analyze logs using Splunk and AWS tools. Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk. Work with GRC tools such as Xacta/JCAM Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP Experience using Atlassian suite tools such as JIRA/CONFLUENCE Experience with Agile Methodologies/SAFe Expertise on Information Security Principles, processes and guidelines Able to obtain and maintain an Authority to Operate (ATO) for Information Systems. Experience with scanning tools such as Tenable Nessus Ability to work on multiple projects with various timelines, at times very short deadlines. Ideally, You Also Have (Preferred Qualifications): Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security - Specialty, or other relevant certifications. Experience in a high-side or multi-enclave (U/S/TS) environment. Experience working with Agile development teams and CI/CD pipelines. Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible). Familiarity with NIST 800-53 Rev. 5 #CJ We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $63k-82k yearly est. 7d ago
  • Information Systems Security Officer

    Seneca Holdings

    Information security analyst job in Huntsville, AL

    Seneca Global Services, LLC is part of the Seneca Nation Group (SNG) portfolio of companies. SNG is Seneca Holdings' federal government contracting business that meets mission-critical needs of federal civilian, defense, and intelligence community customers. Our portfolio comprises multiple subsidiaries that participate in the Small Business Administration 8(a) program. To learn more about SNG, visit the website and follow us on LinkedIn. At Seneca, our team of talented individuals is what makes us successful. To support our team, we provide a balanced mix of benefits and programs. Your total rewards package includes competitive pay, benefits, and perks, flexible work-life balance, professional development opportunities, and performance and recognition programs. We offer a comprehensive benefits package that includes medical, dental, vision, life, and disability, voluntary benefit programs (critical illness, hospital, and accident), health savings and flexible spending accounts, and retirement 401K plan. One of our fundamental principles at Seneca Holdings is to offer competitive health and welfare benefits to our team members, providing coverage and care for you and your family. Full-time employees working at least 30 hours a week on a regular basis are eligible to participate in our benefits and paid leave programs. We pride ourselves on our collaborative work environment and culture, which embraces our mission of providing financial and non-financial benefits back to the members of the Seneca Nation. Seneca Global Services, LLC seeks a highly motivated Information Systems Security Officer (ISSO) to join our technical team supporting the National Cyber Range Complex (NCRC). The NCRC plays a critical role in enhancing the resilience of DoD systems and the effectiveness of U.S. cyber operations by delivering full-spectrum test and evaluation, workforce training, and mission rehearsal events. As the NCRC continues to evolve as a best-of-breed cyber range, the ISSO will contribute directly to ensuring secure facilities, tools, and expertise for some of the most demanding test, training, and mission rehearsal requirements in the Department of Defense. As a key member of the cybersecurity team, the ISSO will act as a security liaison across multiple domains-including physical, personnel, information, cyber, operations, Anti-Terrorism/Force Protection, law enforcement, communications, and technical security-while working closely with the Information Systems Security Manager (ISSM) to ensure compliance, readiness, and secure mission execution. Responsibilities include, but are not limited to: Provide direct support to the ISSM on activities such as Assessment & Authorization (A&A), execution of Continuous Monitoring Plans, and facilitation of Security Controls Assessments. Administer and monitor Risk Management Framework (RMF) steps and activities throughout the system lifecycle to maintain an appropriate security posture. Implement cybersecurity programs, policies, and procedures for assigned systems. Maintain working knowledge of current and upcoming events, system functions, policies, safeguards, and security measures. Serve as a subject matter expert in RMF core concepts and processes. Coordinate with applicable stakeholders across the enterprise to ensure security compliance and readiness. Maintain Authorization to Operate (ATO) packages for assigned systems within the designated A&A System of Record (e.g., eMASS, XACTA 360, Keystone). Review and analyze audit logs (e.g., Splunk, Windows EVTX, Linux syslogs) to detect potential anomalies or threats. Perform validation checks to ensure CM-approved software and antivirus definitions are installed on assigned systems. Conduct compliance/vulnerability scans and manual checks to identify and mitigate risks. Execute ISSO-specific tasks as outlined in program security plans. Deliver cybersecurity education, training, and awareness to system users as required by the ISSM. Basic Qualifications: Active Top Secret clearance with SCI eligibility. Bachelor's degree in Cybersecurity, Information Systems, or related discipline, and/or 8+ years of relevant experience (additional experience may substitute for degree). Minimum of 5 years of extensive experience in cybersecurity, information assurance, and RMF processes. DoDD 8140.01 IAT Level II certification or higher. At least 2 years of experience conducting IT application, system, or network reviews and providing DoD cybersecurity policy and technical guidance. Desired Skills: Certifications aligned to DoDM 8140.03 / DoD Cyberspace Workforce Framework. Familiarity or background with some of the following technologies: CISCO equipment (routing and switching technologies) Zero-trust requirements VMWare (vSphere, vCenter, NSX, ESXi) RHEL (Ansible, Kubernetes, StackRox, OpenShift) AWS / Azure cloud technologies and containerization F5 BIG-IP, Cisco networking, and distributed technologies STIG and IAVA implementation NetApp storage technologies Dell Blade Servers Equal Opportunity Statement: Seneca Holdings provides equal employment opportunities to all employees and applicants without regard to race, color, religion, sex/gender, sexual orientation, national origin, age, disability, marital status, genetic information and/or predisposing genetic characteristics, victim of domestic violence status, veteran status, or other protected class status. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation and training. The Company also prohibits retaliation against any employee who exercises his or her rights under applicable anti-discrimination laws. Notwithstanding the foregoing, the Company does give hiring preference to Seneca or Native individuals. Veterans with expertise in these areas are highly encouraged to apply.
    $61k-83k yearly est. Auto-Apply 6d ago
  • Cyber Security Compliance Specialist

    JS Solutions 4.2company rating

    Information security analyst job in Huntsville, AL

    Company: JS Solutions About Us: JS Solutions, LLC is a Huntsville-based, veteran-owned business dedicated to delivering innovative, mission-focused solutions to our government and commercial partners. Our team specializes in government acquisition support, cybersecurity compliance, and strategic business development. We are committed to helping our clients meet complex requirements with confidence and efficiency. Position Overview: JS Solutions is seeking a motivated and detail-oriented Junior Cyber Compliance Specialist to join our growing team in Huntsville, AL. This role is ideal for early-career professionals who are eager to build expertise in cybersecurity frameworks, with a focus on CMMC, NIST, and DoD compliance requirements. The successful candidate will support compliance initiatives, assist with documentation, and contribute to ensuring our clients achieve and maintain the highest standards of cybersecurity readiness. Responsibilities: Assist with the development, review, and maintenance of cybersecurity compliance documentation (policies, procedures, plans, and artifacts). Support compliance assessments against frameworks such as CMMC, NIST 800-171, DFARS, and FedRAMP. Collect and organize evidence to demonstrate compliance for audits and assessments. Track and update compliance tasks, ensuring deliverables are met on time. Conduct research on evolving federal cybersecurity requirements and provide recommendations to senior staff. Work closely with clients to understand compliance gaps and support remediation efforts. Provide administrative and technical support to senior compliance specialists. Qualifications: Bachelor's degree in Cybersecurity, Information Systems, Computer Science, or related field; or equivalent work experience. 0-2 years of professional experience in cybersecurity, compliance, or IT (internships and academic projects accepted). Familiarity with cybersecurity frameworks such as NIST 800-171, CMMC, or ISO 27001 preferred. Strong organizational skills and attention to detail. Excellent written and verbal communication skills. Ability to work independently as well as part of a team. CompTIA Security+, Certified CMMC Professional (CCP), or similar entry-level certification. Prior experience supporting DoD or government cybersecurity programs. BENEFITS Health, Supplemental Health, Vision, and Dental Insurance 401K Matching Short-term and Long-term Disability Insurance Paid Time Off (PTO) Why Join JS Solutions? Be part of a fast-growing, veteran-owned company with a mission-driven culture. Gain hands-on experience with cutting-edge cybersecurity compliance projects. Competitive compensation and benefits package. Opportunities for professional development and career advancement. JS Solutions is an Equal Opportunity Employer that does not discriminate based on actual or perceived race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other characteristic protected by applicable federal, state, or local laws and ordinances. The management team is dedicated to this policy regarding recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, access to facilities, and general treatment during employment.
    $70k-89k yearly est. 60d+ ago
  • ACC ITSS Information Assurance Engineer

    Exeter Government Servi 4.1company rating

    Information security analyst job in Huntsville, AL

    ACC ITSS Information Assurance Engineer (Senior) Required Clearance: Secret (Top Secret Eligibility) Required Certification(s): DoD 8570.1M IAM-III Required Education: Bachelor's Degree in an IT, Engineering, or Technical discipline Required Experience: 8+ years Position Description: Exeter Information Technology Services is seeking an IA Engineer Sr. to support our staffing efforts for the US Army Contracting Command (ACC) Chief Information Officer\G6 Headquarters (HQ), located at 4505 Martin Road, Redstone Arsenal (RSA), AL 35898-5000, provides contracting policy oversight to 100 different contracting offices and subordinate commands located world-wide. The ACC enterprise consists of over 6,200 military and civilian contracting professionals located at contracting offices across the contiguous United States (CONUS) and outside the contiguous United States (OCONUS). Information Technology (IT) services supports ACC's global contracting mission to the warfighters through the full spectrum of military operations. The HQ ACC's Chief Information Officer (CIO) and G6 staff provides critical mission support services designed to enable the workforce with applicable secure technology solutions that will reduce and ultimately eliminate manual business processing and generate resource cost savings and efficiencies for the ACC enterprise. Primary Responsibilities: Improve the effectiveness of command owned information system-related cybersecurity risks management and reporting (contained in highly diverse environments of complex and sophisticated cyber threats, with ever-increasing system vulnerabilities, and rapidly changing missions) Lead the Exeter Cyber Team providing priorities, direction and expertise to enhance the knowledge of the Team and support the Customer Serve as the System Information System Security Officer (ISSO) Possess an understanding of Risk Management Framework (RMF) Previous experience in Assured Compliance Assessment Solutions, Security Control Assessor (SCA), Enterprise Mission Support Services (eMASS) Leverage the information/data findings and reports from the service provider, system owner, ISSM and the accreditation data repository; the regulatory guidelines in the cybersecurity regulatory documentation; and recent threat briefings; perform a detailed Risk Assessment Analysis that is not limited to: Update eMASS with the risk assessment information as applicable based on security classification levels Maintain the eMASS record of each command owned information system or software System-level artifacts (e.g. Continuous Monitoring Strategy (CONMON), Continuity of Operations Plan, Interconnection Agreements, Hardware and Software Lists) analysis of cybersecurity controls compliance Maintain System ISSM/ISSO established POA&Ms Maintain legacy system accreditation documentation Perform Continuous Monitoring of the system controls processes Review and provide ISSM, SO and SCA with recommendations on new/updated system Security Plan details: system, system boundaries, identification, controls identification and selection, subsystems details, and external services Provide leadership for the day to day operations of the Cyber Contractor team through continuous communication and oversite. Collaboration with Team Leaders, Government personnel and external customers to ensure service delivery for the organization. Required Qualifications: Top Secret security clearance (SCI Eligible) DoD 8570.1M IAM Level III Certification 8+ years of professional experience in Cybersecurity or IT programs Bachelor's degree in an IT, engineering, or technical discipline (or equivalent work experience) Preferred Qualifications: Cyber Operations Center experience in operational measures and management. NIST 800-53 and CNSSI 1253 knowledge and application experience Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #Clearancejobs
    $61k-79k yearly est. Auto-Apply 60d+ ago
  • Information Systems Security Officer (ISSO)

    DESE Research, Inc. 4.4company rating

    Information security analyst job in Huntsville, AL

    Job Description DESE Research, Inc. is excited for the opportunity to add an Information Systems Security Officer to our existing team. If you feel like you have the skills and qualifications for this position, please apply now! Job Details: The successful candidate will oversee day-to-day information system security operations including auditing hardware, software implementations, and risk assessments. The candidate will upkeep, monitor, analyze, and respond to network and security events. The candidate will ensure configuration management for security relevant IS software, hardware, and firmware are maintained and documented. The candidate will implement Risk Management Framework (RMF) security controls utilizing DISA Security Technical Implementation Guides (STIGs). Required Qualifications: An active DOD Secret clearance 5-10 years of experience in cyber security engineering/analysis, supply chain risk management, logistics, product management, program protection planning, or system security engineering Experience with IS auditing and investigations Knowledgeable of operating system security requirements Hands-on experience with industry-standard Information Assurance tools Security+ Certification CompTIA CySA+ certification Required Education Qualifications: Bachelor's Degree in Cyber Security, an Engineering Discipline, Logistics, or Supply Chain Desired Qualifications: Overall knowledge of Information Systems Security and ISSO duties Working knowledge of system administration and network administration Working knowledge of classified defense contracts DoD 8570 IAM Level II Certification Why employee's love working for DESE: At DESE, we are committed to creating a company that is known for its respect and care for employee's. We understand that happy employees are what keeps our business going and we strive to provide the best opportunities for each individual working on our team! Here are a few reasons you will love working here: Competitive salaries Annual performance bonuses Robust 401k profit sharing plan Competitive health, dental & vision insurance with affordable premiums Flexible work schedules Two different flexible spending account options Company paid life insurance & Accidental Death & Dismemberment Education reimbursement program Personal leave for approved philanthropic activities Vacation, Sick & Holiday leave Opportunities for internal promotions Employee referral incentive program Rewards and gifts for service anniversaries Disability Accommodation for Applicants - DESE Research, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following alternative email address or phone number to contact us about your interest in employment with us: ********************** or ************x123. Job Posted by ApplicantPro
    $61k-81k yearly est. Easy Apply 16d ago
  • IT Data Analyst

    Aviagen 4.7company rating

    Information security analyst job in Huntsville, AL

    Aviagen stands at the forefront of poultry genetics, pioneering research, and innovation on a global scale. Our broiler breeder brands are among the most recognized and respected in the industry, and each has a proven record of success in addition to a large and loyal global customer base. We seek a qualified IT Data Analyst to use analytical skills and experience to develop enterprise reporting solutions that deliver actionable insights to our global customers. You will work closely with internal stakeholders to understand their questions and needs and then explore their needs for integrated business intelligence. Key tasks will include developing ETL processes, data visualizations, algorithms, and systems, and using your skills to turn disparate datasets into objective answers that help our stakeholders make informed decisions. At the end of the day, you will help our users better understand their data and how it can be used to drive day-to-day business decisions. This position is on-site at our corporate offices in Huntsville, Alabama. Job Description: Responsibilities: Design and develop ETL and data models utilizing multiple sources. Create Qlik dashboards with front-end visualizations that effectively communicate complex data. Use Python to integrate with Qlik Sense through server-side extensions Provide ad hoc analytical support for and participate in solution design sessions with sales, production, logistics, quality, veterinary, and finance teams. Create and maintain documentation of data and reporting sources, process, structure, and metric definition. Job Qualifications: 2+ years of experience with data exploration, data cleaning, data analysis, data visualization 2+ years of experience analyzing structured data sources 2+ years of experience using SQL and analytics software or BI platforms (Qlik, Power BI, Tableau, etc.) Experience debugging, performing data validation, and troubleshooting issues Effective time management and communication skills Capable of holding sessions with stakeholders and team members to solve complex problems Bachelor's degree in a relevant field Experience with SCRUM, leveraging Python, and/or T-SQL (SQL Server) a plus Experience with Qlik Sense QVD architecture and/or managing Qlik Sense QMC task reload chains a plus Poultry or agriculture industry knowledge a plus Master's degree in Data Science, Computer Science, or other Science, Technology, Engineering, or Mathematics field a plus. Work Authorization: Applicants must be a U.S. citizen or currently authorized to work in the U.S. at the time of hire and must maintain authorization to work in the U.S. throughout their employment with our company. EEOC Statement: We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
    $72k-97k yearly est. Auto-Apply 55d ago
  • IT Tech II/Cybersecurity Analyst

    Science and Engineering Services

    Information security analyst job in Huntsville, AL

    The IT Tech II Cybersecurity Analyst provides an advanced level of support to keep SES sensitive, proprietary, and personal information safe from threats onsite and offsite. Responsibilities Analyzes network vulnerabilities, determines root cause and ensures breaches are promptly handled Makes recommendations to improve overall security to include the creation of training programs Conducts security assessments through vulnerability testing and risk analysis, develops and implements scans to effectively detect malicious software/hardware Monitors security access, verifies access rights Reviews and validates policies and procedures, continuously provides updates for the company's incident response and disaster recovery plans Provides statistical reports as needed Other duties as assigned Qualifications Education: Associate Degree in computer related field Experience: 3-7 years cybersecurity/IT support experience Any combination of education/experience may be substituted for job requirements at the recommendation of the hiring manager and approval of the COO and CEO. Works in well-lit, climate-controlled office. Must be able to see with corrective eye wear and hear clearly with assistance. While performing the duties of this job, the employee is occasionally required to stand, walk, reach with hands and arms, climb or balance, or crouch. The employee must occasionally lift and/or move up to 50 pounds. Some travel may be required.
    $62k-87k yearly est. Auto-Apply 60d+ ago
  • IT Project and Operations Analyst (MSIC)

    Colsa Corporation 4.8company rating

    Information security analyst job in Huntsville, AL

    Join our team as an IT Project and Operations Analyst , supporting the Missile and Space Intelligence Center (MSIC), where you provide project management and operational support for a broad-scoped IT environment. This position blends excellent Microsoft Office, communications, and documentation skills. We are looking for an innovative professional who can bridge the gap between our technical team and operations in support of mission-critical projects. Responsibilities Document and maintain project information, including budgets, schedules, tasks, procurement activity, risks, and deliverables. Coordinate resourcing actions to ensure timely project execution. Track and follow through on assigned tasks, milestones, and project dependencies Support senior project management with critical operational actions in a fast-paced environment Prepare clear and timely reports, presentations, and status updates for leadership and stakeholders. Communicate professionally and effectively with stakeholders at all levels, including senior leadership. Work independently to problem-solve, prioritize, and move tasks to completion with minimal oversight. At COLSA, people are our most valuable resource and centered at our core value. We invite you to unite your talents with opportunity and be a part of our “Family of Professionals!” Learn about our employee-centric culture and benefits here.
    $58k-78k yearly est. 5d ago
  • IT Operations Analyst

    Lakeland Industries 3.4company rating

    Information security analyst job in Huntsville, AL

    Lakeland Industries, Inc. is seeking an IT Analyst At Lakeland Industries, we're more than just a leader in the PPE sector-we're a team of innovators, collaborators, and problem-solvers committed to protecting people around the world. Our mission is to deliver exceptional products and services that elevate safety and customer experience. If you're looking for a workplace that values creativity, teamwork, and purpose, you've found it. Scope Our IT Operations Analyst is a key player in ensuring smooth day-to-day technology operations across the organization. This role is ideal for a detail-oriented and service-driven professional who thrives in a fast-paced environment and enjoys solving problems that keep our business running efficiently. The IT Operations Analyst is responsible for managing and resolving IT service tickets, monitoring system performance, and supporting users across various platforms. They serve as the first line of defense for technical issues, working closely with internal teams to ensure timely and effective resolution. This role requires strong communication skills, a proactive mindset, and a commitment to delivering excellent internal customer service. If you're passionate about keeping systems running smoothly and helping teams stay productive, we'd love to have you on board. Primary Responsibilities Monitor and manage incoming IT service tickets, ensuring prompt response and resolution. Troubleshoot hardware, software, and network issues across the organization. Escalate complex issues to appropriate technical teams and follow through to resolution. Maintain documentation of incidents, solutions, and system changes. Support onboarding and offboarding processes, including account setup and access management. Collaborate with cross-functional teams to identify recurring issues and recommend process improvements. Assist in system updates, patches, and routine maintenance tasks. Provide proactive I.T. support and problem solving to Lakeland worldwide to ensure proper and efficient setup, configuration, operation, and maintenance of all I.T. systems and networks. Responsible for Active Directory administration; including OU and account management, group policy and security groups. Azure and M365 account management and email administration; including providing SharePoint administration, Teams support to users, and license management as needed. VMware administration, including implementation and maintenance of Virtual Servers, system updates, and managing backups. Network management and troubleshooting, physical and virtual security applications, and Cyber Security software management. Provide end user support for all personnel and infrastructure. Will work with resources for desktop support, network and system administrators, and vendors. The scope of this position includes: local user and datacenter support, remote office connectivity to the Lakeland corporate office, as well as I.T. support and system administration in remote locations. Qualifications IT Degree or like Business Degree Experience with virtual server and OS management, as well as network troubleshooting. Technical skills needed: 5-10 years of System Administrator experience. Active Directory administration, including Security Groups and Group Policy SharePoint configuration and management experience. Azure, M365 and Exchange administration. VMWare and vCenter experience. Veeam backup, and SAN storage experience. Windows server and desktop operating systems. Firewall and switch configuration, including VPN configuration. Experience setting up and managing disaster recovery sites. Experience with perimeter hardening and monitoring. Cyber Security experience, including managing multiple security applications.
    $69k-96k yearly est. Auto-Apply 60d+ ago
  • Mid-Level Cyber/Watch Floor Analyst

    Noetic Strategies Inc.

    Information security analyst job in Huntsville, AL

    Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). PREFERRED QUALIFICATIONS Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status. Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. Powered by JazzHR 6IxgcPuXI3
    $64k-87k yearly est. 19d ago
  • Cyber Assurance Analyst Senior Principal - Kwajalein Atoll -3801

    Range Generation Next LLC

    Information security analyst job in Huntsville, AL

    Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities. This position is located on Kwajalein Atoll, Republic of the Marshall Islands. Essential Functions Support the Reagan Test Site (RTS) Operations Center as Cyber Assurance Analyst Senior Principal in Kwajalein Atoll, Marshall Islands. Serve as the Senior Principal Cyber Assurance Analyst for the RETS Cybersecurity organization. Performs as the team lead for the Cyber Operations team located in both Kwajalein Atoll, Marshall Islands and Huntsville, AL. Directs strategic technical security compliance, leads all Cyber Operations functions, and communicates to RETS Cybersecurity leadership on RMF implementation and operational assurance across the RTS enterprise. Lead the investigatory efforts of all potential security violations, determining policy breaches, and directing the execution of the organization's Incident Response Plan to ensure timely and effective mitigation. Direct the Cyber Operation team's efforts in supporting, monitoring, assessing, validation, and verification of technical security compliance of all hardware and software security controls, ensuring resilience and continuous cybersecurity assurance of the network environment. Own, manage, and report technical compliance with applicable critical security notices from SMDC, NETCOM, C5ISR, and RETS Cybersecurity leadership. Provide direct technical leadership, mentorship, training, and workflow management for the Cyber Operations team, establishing best practices and ensuring consistent, high-quality execution of all defensive operations. Required Skills Exceptional coaching, mentorship, and team lead skills required to direct the Cyber Operations team and effectively articulate complex security risks to direct leadership. Direct information dissemination, task delegation, and workflow management for the Cyber Operations team. Expert ability to research, develop, and implement advanced technical security solutions for complex hardware and network infrastructures with high reliability and availability requirements. Proven technical writing proficiency in authoring high-level artifacts, including SOPs, technical reports, and essential RMF documentation. Highly proficient in the analysis, usage, remediation, and reporting of SIEM, IDS/IPS, and endpoint protection solutions (e.g., Trellix/Defender) for security effectiveness. Demonstrated expertise in the effective application and validation of DISA STIGs, STIG Checklists, and SRGs to establish and enforce security configuration baselines. Mastery in utilizing Tenable ACAS/Nessus for comprehensive vulnerability scanning, compliance reporting, and assessing cyber operations effectiveness. Comprehensive working knowledge of Army Regulation 25-1/2, DoD, DISA, and RMF requirements and guidance to ensure strategic program alignment and compliance. Required Experience Bachelor's Degree in Computer Science, Cybersecurity or related field. Ten (10) or more years related experience in Information Assurance, System Administration, or technical support of an Enterprise environment. Proven experience leading technical teams, including active mentorship and the ability to upskill staff through hands-on training and coaching. Proficient at communicating security concerns and issues to non-technical audiences. Must currently have and maintain one of the following DoD 8140, IAM Level III, certifications: Certified Chief Information Security Officer (C-CISO), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), or GIAC Security Leadership (GSLC). Additional Eligibility Qualifications Must be able to relocate to the United States Army Garrison, Kwajalein Atoll, Marshall Islands. Must be able to obtain and maintain a DoD Secret security clearance which requires U.S. Citizenship. Must be able to obtain and maintain a U.S. passport The flexibility to work occasional non-duty hours or on weekends to support specific project or mission requirements. Benefits of Working at RGNext RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment. Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate. RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
    $74k-99k yearly est. Auto-Apply 13d ago
  • Information Systems Security Officer (ISSO)

    DESE Research, Inc. 4.4company rating

    Information security analyst job in Huntsville, AL

    DESE Research, Inc. is excited for the opportunity to add an Information Systems Security Officer to our existing team. If you feel like you have the skills and qualifications for this position, please apply now! Job Details: The successful candidate will oversee day-to-day information system security operations including auditing hardware, software implementations, and risk assessments. The candidate will upkeep, monitor, analyze, and respond to network and security events. The candidate will ensure configuration management for security relevant IS software, hardware, and firmware are maintained and documented. The candidate will implement Risk Management Framework (RMF) security controls utilizing DISA Security Technical Implementation Guides (STIGs). Required Qualifications: * An active DOD Secret clearance * 5-10 years of experience in cyber security engineering/analysis, supply chain risk management, logistics, product management, program protection planning, or system security engineering * Experience with IS auditing and investigations * Knowledgeable of operating system security requirements * Hands-on experience with industry-standard Information Assurance tools * Security+ Certification * CompTIA CySA+ certification Required Education Qualifications: Bachelor's Degree in Cyber Security, an Engineering Discipline, Logistics, or Supply Chain Desired Qualifications: * Overall knowledge of Information Systems Security and ISSO duties * Working knowledge of system administration and network administration * Working knowledge of classified defense contracts * DoD 8570 IAM Level II Certification Why employee's love working for DESE: At DESE, we are committed to creating a company that is known for its respect and care for employee's. We understand that happy employees are what keeps our business going and we strive to provide the best opportunities for each individual working on our team! Here are a few reasons you will love working here: * Competitive salaries * Annual performance bonuses * Robust 401k profit sharing plan * Competitive health, dental & vision insurance with affordable premiums * Flexible work schedules * Two different flexible spending account options * Company paid life insurance & Accidental Death & Dismemberment * Education reimbursement program * Personal leave for approved philanthropic activities * Vacation, Sick & Holiday leave * Opportunities for internal promotions * Employee referral incentive program * Rewards and gifts for service anniversaries Disability Accommodation for Applicants - DESE Research, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following alternative email address or phone number to contact us about your interest in employment with us: ********************** or ************x123.
    $61k-81k yearly est. Easy Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Huntsville, AL?

The average information security analyst in Huntsville, AL earns between $57,000 and $111,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Huntsville, AL

$80,000
Job type you want
Full Time
Part Time
Internship
Temporary