Keys to writing an information systems specialist job description. Zippia analyzed thousands of information systems specialist job descriptions to identify key pieces of information you want to include. Using a machine learning data analysis, we determined the following key facts about information systems specialist job descriptions:

  • The average information systems specialist job description intro is about 196 words
  • The responsibilities section contains an average of 13 bullets points
  • The requirements section contains an average of 13 bullets points

Find Better Talent in Less Time
Post a Job on Zippia and take the best from over 7 million monthly job seekers.

Information Systems Specialist Duties

  • Implement internal SOX controls and achieve compliance for internal and external audits.
  • Manage user security access to SharePoint and Intranet.
  • Implement and manage all organizational security measures, cryptographic equipment and DoD communications security (COMSEC) keying material.
  • Gain knowledge of Linux and Macintosh server and desktop systems.
  • Configure and maintain all routers, switches and firewalls using TCP/IP.
Check All Information Systems Specialist Duties

Information Systems Specialist Requirements

Information systems specialist requirements can be divided into basic requirements and required soft skills. The lists below show the most common requirements included in information systems specialist job postings.

Requirements
  • Bachelor’s degree in Computer Science or related field.
  • 5+ years of experience in IT systems or related field.
  • Proficient in multiple programming languages.
  • Familiarity with software engineering principles.
  • Ability to troubleshoot and resolve IT problems.
Required Soft Skills
  • Strong written and verbal communication.
  • Excellent organizational and problem-solving skills.
  • Ability to work independently and in teams.
  • Ability to prioritize tasks and meet deadlines.
  • High attention to detail.

Information Systems Specialist Description Example 1

Full Job Description

Responsibilities

Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.

Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.

Qualifications
  • Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree
  • IAT Level II Certification
  • Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor
  • Secret clearance
  • Minimum of two (2) years' experience in performing Risk Management Framework activities
  • Demonstrated experience with performing STIG assessments to include using SCAP benchmarks
  • Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
  • Demonstrated experience using eMASS
  • Experience in developing Plans of Actions and Milestones (POA&M) entries.
  • Experience in completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity.
  • Experience in communicating risk reduction recommendations to
    stakeholders
Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.

An Equal Opportunity Employer including Disability/Veteran.

jobs
Post A Job For Free, Promote It For A Fee

Information Systems Specialist Description Example 2

Full Job Description

Responsibilities

Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.

Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.

Qualifications
  • Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree
  • IAT Level II Certification
  • Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor
  • Secret clearance
  • Minimum of two (2) years' experience in performing Risk Management Framework activities
  • Demonstrated experience with performing STIG assessments to include using SCAP benchmarks
  • Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
  • Demonstrated experience using eMASS
  • Experience in developing Plans of Actions and Milestones (POA&M) entries.
  • Experience in completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity.
  • Experience in communicating risk reduction recommendations to
    stakeholders
Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.

An Equal Opportunity Employer including Disability/Veteran.

jobs
Dealing With Hard-To-Fill Positions? Let Us Help.

Information Systems Specialist Description Example 3

Full Job Description

JT4 provides engineering and technical support to multiple western test ranges for the U.S. Air Force and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. We develop and maintain realistic integrated test and training environments, and prepare our nation's war-fighting aircraft, weapon's systems and air crews for today's missions and tomorrow's global challenges.
**This position is located at China Lake and is not eligible for telework**



JOB SUMMARY - ESSENTIAL FUNCTIONS/DUTIES


This position is the on-site technical specialist for monitoring information systems and maintaining the environment of operation to include developing and updating System Security Plans, managing and controlling changes to the systems, conducting audits, providing incident response, perpetration for vulnerability assessments, and assessing the security impact of security and non-security-relevant changes.


Provides incident handling in conjunction with the FSO and ISSO/ISSM. Assists in writing and maintaining computer security processes to meet Air Force requirements of Risk Management Framework. Monitors computer system use and audits logs. Makes recommendations for future hardware / software implementations and related process improvements. This position requires skills in leadership, team building and customer service. Provides operational status as required. Uses established policies and procedures and subject matter knowledge to complete complex assignments requiring originality and ingenuity performed under minimum supervision with considerable latitude for independent contribution. Provides security training and awareness briefings. Other duties as assigned.



OTHER RESPONSIBILITIES


This position is required to implement management initiatives and to coordinate upgrades, capabilities, policy and procedures with other organizations. Each employee must read, understand, and implement the general and specific operational, safety, quality, and environmental requirements of all plans, procedures, and policies pertaining to their job.


WORKING CONDITIONS


This position involves work typical of an office environment with no unusual hazards. There is occasional lifting (up to 20 pounds), constant sitting and use of a computer terminal, constant use of sight abilities while writing, reviewing, and editing documents, constant use of speech/hearing abilities for communication, and constant mental alertness.


REQUIREMENTS - EDUCATION, TECHNICAL AND WORK EXPERIENCE


Associates or higher degree in Computer/Information Technology, or equivalent academic/technical training/certification. Possess 2-3 years of experience in computer system security and/or related areas of expertise. Must be compliant to DoD 8570.01-M levels and possess or working toward Security+ certification with a CISSP desired. Should have experience with JSIG, NIST 800 and NISPOM, Chapter 8. Must possess and apply a broad knowledge of principles, practices and procedures in computer security and information systems and working experience with Microsoft Office, Access, and Visio. Possess experience supporting various system configurations such as Stand Alone, Local Area Networks, and Wide Area Networks.

Employee must possess excellent skills in verbal and written communications, planning, and organizing, and be able to work under deadlines. Employee is expected to routinely cross fields in the completion of somewhat difficult and varied assignments. Government vehicle is used on an as-needed basis. Ability to work in a field environment at remote locations with occasional overnight assignments. Must qualify for and maintain a government security clearance and possess a valid, state issued driver's license.


A Little about Ridgecrest, California
This position is based in Ridgecrest, California, in Kern County in the southern part of the Indian Wells Valley. Residents are attracted to area for its clean air, good water, highway accessibility, easy access to multiple recreational opportunities, and proximity to major Southern California resources in Los Angeles, Bakersfield, and the Antelope Valley.

Ridgecrest is a small, patriotic, family-oriented community, where many of the residents contribute to the vital support of the Navy mission at the nearby China Lake Ranges.

Residents live minutes away from community activities and parks, shopping, and the JT4 office. Community parks cover nearly a hundred acres and include playgrounds, a skateboard park, soccer, softball, baseball, and football fields, basketball, tennis, and racquetball courts. Residents enjoy a variety of community events held throughout the year at local city and county parks and cultural centers.

Surrounded by four mountain ranges, Ridgecrest is a hub of activity for outdoor enthusiasts, where residents regularly take advantage of Ridgecrest's close proximity to all the best California has to offer in outdoor activities at nearby national forests and wilderness areas including Yosemite, Mono Lake, Sequoia, Red Rock and Owens Peak. The sunny California beach is only three hours away.

Ridgecrest is near two major highways, the 395 and 14. The Ontario and Burbank Airports are a little over a two hour drive away. The drive to the Lancaster/Palmdale area is approximately an hour and a quarter.


DISCLAIMER


The above statements are intended to describe the general nature and level of work being performed by personnel assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and skills required of persons so classified.

Tasking is in support of a Federal Government Contract that requires U. S. citizenship. Some jobs may require a candidate to be eligible for a government security clearance, state-issued driver's license, or other licenses/certifications, and the inability to obtain and maintain the required clearance, license, or certification may affect an employee's ability to maintain employment.

SCC: JCIS11; A4CLR
jobs
Start Connecting With Qualified Job Seekers

Information Systems Specialist Job Description Faqs

What Are The Most Common Skills On A Job Description For An Information Systems Specialist?

The most common skills on a job description for an information systems specialist are Customer Service, Data Analysis, and Data Entry.

What Does An Information Systems Specialist Do?

An Information Systems Specialist is responsible for supporting and developing the database system of an organization. They are responsible for designing and implementing information systems, developing prototypes, and maintaining hardware and software operations. They build information security to protect the computer system against a threat. Information System Specialists must have good communication and analytical skills to adapt to different organizational needs.
Ready To Start Hiring?