Post Job

Information Systems Specialist job description

Updated March 14, 2024
11 min read
Find Better Candidates in Less Time
Post a job on Zippia and take the best from over 7 million monthly job seekers.

Example information systems specialist requirements on a job description

Information systems specialist requirements can be divided into technical requirements and required soft skills. The lists below show the most common requirements included in information systems specialist job postings.
Sample information systems specialist requirements
  • Bachelor’s degree in Computer Science or related field.
  • 5+ years of experience in IT systems or related field.
  • Proficient in multiple programming languages.
  • Familiarity with software engineering principles.
  • Ability to troubleshoot and resolve IT problems.
Sample required information systems specialist soft skills
  • Strong written and verbal communication.
  • Excellent organizational and problem-solving skills.
  • Ability to work independently and in teams.
  • Ability to prioritize tasks and meet deadlines.
  • High attention to detail.

Information Systems Specialist job description example 1

Vencore information systems specialist job description

Responsibilities

Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.

Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.

Qualifications
  • Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree
  • IAT Level II Certification
  • Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor
  • Secret clearance
  • Minimum of two (2) years' experience in performing Risk Management Framework activities
  • Demonstrated experience with performing STIG assessments to include using SCAP benchmarks
  • Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
  • Demonstrated experience using eMASS
  • Experience in developing Plans of Actions and Milestones (POA&M) entries.
  • Experience in completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity.
  • Experience in communicating risk reduction recommendations to
    stakeholders
Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.

An Equal Opportunity Employer including Disability/Veteran.

jobs
Post A Job For Free, Promote It For A Fee

Information Systems Specialist job description example 2

Peraton information systems specialist job description

Responsibilities

Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.

Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.

Qualifications
  • Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree
  • IAT Level II Certification
  • Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor
  • Secret clearance
  • Minimum of two (2) years' experience in performing Risk Management Framework activities
  • Demonstrated experience with performing STIG assessments to include using SCAP benchmarks
  • Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
  • Demonstrated experience using eMASS
  • Experience in developing Plans of Actions and Milestones (POA&M) entries.
  • Experience in completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity.
  • Experience in communicating risk reduction recommendations to
    stakeholders
Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.

An Equal Opportunity Employer including Disability/Veteran.

jobs
Dealing With Hard-To-Fill Positions? Let Us Help.

Information Systems Specialist job description example 3

JT3 information systems specialist job description

JT4 provides engineering and technical support to multiple western test ranges for the U.S. Air Force and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. We develop and maintain realistic integrated test and training environments, and prepare our nation's war-fighting aircraft, weapon's systems and air crews for today's missions and tomorrow's global challenges.
**This position is located at China Lake and is not eligible for telework**



JOB SUMMARY - ESSENTIAL FUNCTIONS/DUTIES


This position is the on-site technical specialist for monitoring information systems and maintaining the environment of operation to include developing and updating System Security Plans, managing and controlling changes to the systems, conducting audits, providing incident response, perpetration for vulnerability assessments, and assessing the security impact of security and non-security-relevant changes.


Provides incident handling in conjunction with the FSO and ISSO/ISSM. Assists in writing and maintaining computer security processes to meet Air Force requirements of Risk Management Framework. Monitors computer system use and audits logs. Makes recommendations for future hardware / software implementations and related process improvements. This position requires skills in leadership, team building and customer service. Provides operational status as required. Uses established policies and procedures and subject matter knowledge to complete complex assignments requiring originality and ingenuity performed under minimum supervision with considerable latitude for independent contribution. Provides security training and awareness briefings. Other duties as assigned.



OTHER RESPONSIBILITIES


This position is required to implement management initiatives and to coordinate upgrades, capabilities, policy and procedures with other organizations. Each employee must read, understand, and implement the general and specific operational, safety, quality, and environmental requirements of all plans, procedures, and policies pertaining to their job.


WORKING CONDITIONS


This position involves work typical of an office environment with no unusual hazards. There is occasional lifting (up to 20 pounds), constant sitting and use of a computer terminal, constant use of sight abilities while writing, reviewing, and editing documents, constant use of speech/hearing abilities for communication, and constant mental alertness.


REQUIREMENTS - EDUCATION, TECHNICAL AND WORK EXPERIENCE


Associates or higher degree in Computer/Information Technology, or equivalent academic/technical training/certification. Possess 2-3 years of experience in computer system security and/or related areas of expertise. Must be compliant to DoD 8570.01-M levels and possess or working toward Security+ certification with a CISSP desired. Should have experience with JSIG, NIST 800 and NISPOM, Chapter 8. Must possess and apply a broad knowledge of principles, practices and procedures in computer security and information systems and working experience with Microsoft Office, Access, and Visio. Possess experience supporting various system configurations such as Stand Alone, Local Area Networks, and Wide Area Networks.

Employee must possess excellent skills in verbal and written communications, planning, and organizing, and be able to work under deadlines. Employee is expected to routinely cross fields in the completion of somewhat difficult and varied assignments. Government vehicle is used on an as-needed basis. Ability to work in a field environment at remote locations with occasional overnight assignments. Must qualify for and maintain a government security clearance and possess a valid, state issued driver's license.


A Little about Ridgecrest, California
This position is based in Ridgecrest, California, in Kern County in the southern part of the Indian Wells Valley. Residents are attracted to area for its clean air, good water, highway accessibility, easy access to multiple recreational opportunities, and proximity to major Southern California resources in Los Angeles, Bakersfield, and the Antelope Valley.

Ridgecrest is a small, patriotic, family-oriented community, where many of the residents contribute to the vital support of the Navy mission at the nearby China Lake Ranges.

Residents live minutes away from community activities and parks, shopping, and the JT4 office. Community parks cover nearly a hundred acres and include playgrounds, a skateboard park, soccer, softball, baseball, and football fields, basketball, tennis, and racquetball courts. Residents enjoy a variety of community events held throughout the year at local city and county parks and cultural centers.

Surrounded by four mountain ranges, Ridgecrest is a hub of activity for outdoor enthusiasts, where residents regularly take advantage of Ridgecrest's close proximity to all the best California has to offer in outdoor activities at nearby national forests and wilderness areas including Yosemite, Mono Lake, Sequoia, Red Rock and Owens Peak. The sunny California beach is only three hours away.

Ridgecrest is near two major highways, the 395 and 14. The Ontario and Burbank Airports are a little over a two hour drive away. The drive to the Lancaster/Palmdale area is approximately an hour and a quarter.


DISCLAIMER


The above statements are intended to describe the general nature and level of work being performed by personnel assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and skills required of persons so classified.

Tasking is in support of a Federal Government Contract that requires U. S. citizenship. Some jobs may require a candidate to be eligible for a government security clearance, state-issued driver's license, or other licenses/certifications, and the inability to obtain and maintain the required clearance, license, or certification may affect an employee's ability to maintain employment.

SCC: JCIS11; A4CLR
jobs
Start Connecting With Qualified Job Seekers

Resources for employers posting information systems specialist jobs

Average Cost Of Hiring
Recruitment Statistics
How To Write A Job Description
Examples Of Work Conditions

Information Systems Specialist job description FAQs

Ready To Start Hiring?

Updated March 14, 2024

Zippia Research Team
Zippia Team

Editorial Staff

The Zippia Research Team has spent countless hours reviewing resumes, job postings, and government data to determine what goes into getting a job in each phase of life. Professional writers and data scientists comprise the Zippia Research Team.