Develops and administers information security procedures for systems in support of government agencies in the performance of classified programs and projects. Performs self-inspections and ensures compliance with applicable government security policies and procedures. Investigates information system security violations and implements corrective actions. Develops and implements information system security education and awareness programs. Serves and liaison to and interacts with government agencies to ensure compliance with policies and regulations. Acts as a technical expert on program security. Performs work requiring advanced technical knowledge, often involving multiple phases and significant collaboration. Applies in-depth technical knowledge to independently and innovatively solve a full range of complex and sometimes unusual problems that impact organizational success. Brings industry-level expertise to function and recommends changes to remain up-to-date or competitive. Establishes processes and procedures to ensure the effective and efficient operation of a complex function. Has authority to take whatever action deemed advisable or necessary, subject only to organizational and departmental policies and processes. May provide work direction for less senior employees. Responsibilities Develops and administers information security procedures for information systems in support of government agencies in the performance of classified programs and projects. Develops and executes an IT program detailed security policies, plans, and procedures that exceeds customer expectations and minimizes security risks. Serves as management official and point-of-contact for all information system issues involving sensitive and classified information. Manages security controls to ensure confidentiality, integrity, and availability of information and information systems; builds security into the development process and defines security specifications to support the acquisition of new systems, reviews all secure systems procurements to ensure that security has been considered and included. Provides strategic guidance and advice on secure meetings and state-of-the-art conference room technologies. Serves as liaison with program staff and other customers and can respond to short-notice tasks and provides security engineering and integration services to staff and other customers. Investigates information system security violations and prepares reports specifying corrective actions for the current situation and preventative actions to be taken in the future. Proactively coordinates the establishment of system security controls to protect sensitive government and institution information using authentication techniques, encryption, firewalls, and access controls. Maintain systems in accordance with the security plan and Authorization to Operate (ATO). Audits, monitors, and performs self-inspections of applications, systems, and security logs for security threats, vulnerabilities, and suspicious activities. Implement measures to protect data from physical destruction or theft. Ensure that back-up procedures are in place for data recovery. Conducts risk assessments of all systems and mitigates vulnerabilities wherever feasible. Develops and implements information system security training, education, and awareness programs for all system users. Interacts with government agencies to obtain rulings, interpretations, and acceptable deviations for compliance with Chapter 8 of NISPOM and other regulations. Ensures compliance with the National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), Department of Defense (DoD) regulations, Intelligence Community Directives (ICDs) and Security Technical Implementation Guides (STIGs). Prepares documentation, including Information Security Plans, outlining regulations, and establishing information security policy. Ensures all users have the requisite security clearances, authorization, and Need-to-Know (NTK). Complete required ISSM training within 6 months of hire. Maintains appropriate standard of confidentiality. When handling secure, privileged, sensitive, or confidential information and matters, maintains strict confidence and exercises care to prevent disclosure to others. Accesses confidential information for work-related reasons only, following the policies and procedures of the organization. Ensures that any privileged, sensitive, or confidential information is securely stored, disposed of, and transmitted according to the Institutional guidance. NONESSENTIAL JOB DUTIES Related duties and special projects as assigned.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level