Torch Technologies Thank you for your interest in employment with Torch Technologies. We are a 100% employee-owned, Certified Great Place To Work and named Best Places to Work in Huntsville/Madison County, headquartered in Huntsville, AL. Our team provides superior research, development, and engineering services to the Federal Government and Department of War. As one of the nation’s top 100 defense companies, the services we provide directly support the men and women who serve our country. Our corporate mission sums up the pride our employee-owners take in the work we do: “Lighting the Pathway of Freedom”. And, as a Certified Evergreen ESOP, we have made the commitment to grow and sustain our company for the next 100 years! Come grow with us! Torch Technologies is seeking a Cyber Information Assurance Analyst 2 (ISSO) to join a team Involved in the assessment and compliance of systems and networks within a networking environment or enclave. This position supports the Air Force Research Lab (AFRL). As a Cyber Information Assurance Analyst 2 (ISSO) your duties will include the following, but are not limited to: Responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. Implements and enforce all AF cybersecurity policies, procedures, and countermeasures. Completes and maintains required cybersecurity certification: IAW AFMAN, JSIG, DJSIG. Ensure all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to systems according to AFMAN 17-1301. Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System. Ensures software, hardware, and firmware comply with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides. Ensure proper configuration management procedures are followed prior to implementation and contingent upon necessary approval. Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office. Initiate protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. Reports security incidents or vulnerabilities to the system-level ISSM Initiates exceptions, deviations, or waivers to cybersecurity requirements.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level