Computer and Information Security Specialist II


Serves as Information Systems Security Manager (ISSM), or alternate ISSM, or Information Systems Security Officer (ISSO). Works closely with the Information Systems Security Manager (ISSM) to support the daily operations of the information security program.  May represent IDA with cognizant US Government accrediting agencies.   Ensures appropriate operational security posture is maintained for local area networks (LAN), wide area networks (WAN) and stand-alone systems.  The ISSO monitors these systems and their operational environment and must have the technical knowledge and expertise required to manage the security aspects of these systems.

Must understand requirements for physical and environmental protection of the computer systems, personnel security rules that pertain to systems, incident handling (such as classified spills or malware), and security training and awareness. The ISSO plays an active role in monitoring a system and its environment of operation to include developing and updating the system security plan (SSP), managing and controlling changes to the system, and assessing the security impact of those changes.


1.    Manages and coordinates information security monitoring, inspections and incident response.

  • Serves as Information Systems Security Officer or Information Systems Security Manager (ISSM) for IDA classified and unclassified systems.
  • Develops, implements and manages a formal information security / information systems security program.
  • Develops, reviews, maintains and oversees information systems security plans (SSPs) and Assessment/Authorization in accordance with DoD mandated polices.
  • Performs audit reviews of systems comprised of multiple operating system using security information and event management (SIEM) products to track multiple events including any signs of inappropriate or unusual activity, intrusion events, data transfers, etc.  Reports any findings to the ISSM.
  • Performs recurring self-assessments on all systems under their purview to ensure compliance with documented security requirements and to detect any system level vulnerabilities. Prepares a detailed report of the findings and ensures proper protection and / or corrective measures are taken immediately, or develops a Plan of Action and Milestones (POAM) to document planned actions.
  • Interacts directly with US Government Security Control Assessors (SCAs) during on-site assessments to demonstrate compliance with technical configuration requirements and implementation and enforcement of written security policy.
  • Continuously updates all required system documentation, including the SSP, POAM, Risk Assessment Report, and system component inventories.
  • Develops procedures for responding to security incidents and investigating and reporting security violations and incidents as appropriate.

2.    Develops, implements and enforces information security policies and procedures.

  • Performs the steps involved in the execution of the Risk Management Framework (RMF), including generation of documentation, controls compliance testing, and continuous monitoring activities for local area network and wide area network systems.
  • Develops and periodically reviews training materials and standard operating procedures covering all technical and administrative aspects of system operations.
  • Works with IT to perform an initial system assessment to ensure that required security controls are implemented and operating correctly before a system is authorized for production.
  • Works with IT to develop automated processes to assist in maintaining system compliance and documentation updates.
  • Collaborates with IT to oversee an effective change management policy and procedures for authorizing use of hardware / software on an information system.  Evaluates proposed changes against Government security requirements and recommends approval or denial based on a security impact analysis.
  • Reviews and ensures implementation of bulletins and advisories that impact the security posture of information systems covered by SSPs.

3.    Develops an information systems security, education, training, and awareness program.

  • Clearly communicates to all users including security personnel, IT staff, and managers the proper procedures for protecting classified information and the systems that process that information. Training prior to initial system access and periodically after includes proper system usage, physical security, data transfers, media protection etc.

4.    Performs other duties as assigned.


  • Bachelor’s degree in an IT-related or similar relevant field or equivalent experience.
  • Minimum two years’ experience in a similar systems security manager or officer role or two years of experience in related IT or systems security disciplines.
  • Candidate must have the following Information Assurance certifications or security training or obtain the certificates within 6 months of hire:
    •     DSS NISPOM  Risk Management Framework Courses
    •     DOD 8570.01-M certification at IAT level 2, such as Security +
  • Higher-level certifications such as CISM or CISSP strongly desired.
  • Candidate must understand the technical configurations of Windows or Linux Operating Systems (as appropriate to location) in physical and virtual environments; both preferred.
  • Candidate must have the ability to read and understand event logs from Windows and/or Linux.
  • Knowledge of tools to parse logs, scan operating systems for vulnerabilities and compliance checking preferred, and required within 6 months of hire.
  • Customer service skills, including good interpersonal skills and the ability to communicate effectively with all levels of employees.
  • Typically this position requires Top Secret with Special Compartmented Information access.
  • U.S. Citizenship is required
  • Ability to obtain and maintain a security clearance is required.
Expired, click here to search for relevant jobs

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.