More jobs:
Information System Security Officer; ISSO
Job in
Huntsville, Madison County, Alabama, 35824, USA
Listed on 2026-01-02
Listing for:
Spry Methods, Inc.
Full Time
position Listed on 2026-01-02
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Information System Security Officer (ISSO)
Join to apply for the Information System Security Officer (ISSO) role at Spry Methods, Inc.
1 day ago Be among the first 25 applicants
Who We’re Looking For (Position Overview):
This role is critical in ensuring the security posture of mission‑critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.
Position Responsibilities- Serve as the principal cybersecurity advisor to system owners and stakeholders
- Design, analyze, and test information security systems, products, cloud architectures and cloud solutions
- Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re‑architecting and/or re‑design activities
- Develop, implement, and evaluate security controls, measures, and frameworks in cloud‑based systems to ensure data integrity, confidentiality, and availability
- Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments
- Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO)
- Responsible for ensuring operational security is maintained for assigned information systems
- Ensure systems are operated, maintained, disposed of in accordance with security policies and practices
- Perform Security Incident Reporting and Response
- Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process
- Ensure audits and reviews are responded to with accurate information
- Perform system access control responsibilities
- Participate in the change management process for assigned applications
- Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle
- Perform continuous system security monitoring
- Implement and manage cloud‑native and third‑party security tools for monitoring, threat detection and vulnerability management
- Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented
- Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures
- Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan
- Responsible for ensuring the implementation and maintenance of annual security controls assessments
- Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations
- Working directly with development, platform, and infrastructure teams on security problems
- Top Secret (TS) Clearance with SCI eligibility
- 3 - 5 years of experience required
- Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA
- Experience supporting cloud security in environments such as AWS Gov Cloud, C2S, SC2S, and Microsoft Azure
- Analyze logs using Splunk and AWS tools
- Hands‑on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk
- Work with GRC tools such as Xacta/JCAM
- Hold at least one of the following security certifications. Example:
Security +, CGRC, CASP, CISSP - Experience using Atlassian suite tools such as JIRA/CONFLUENCE
- Experience with Agile Methodologies/SAFe
- Expertise on Information Security Principles, processes and guidelines
- Able to…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×