ISSO - TS/SCI with poly required

Clearance Level
Top Secret SCI + Polygraph
Information Security
Cape Canaveral, Florida

REQ#: RQ68548 ISSO - TS/SCI with poly required (Open)

Travel Required: None
Requisition Type: Regular
Job Description

Job Description

Analyzes internal and external IT/IM customer needs. Analyzes science, engineering, business, and all other data processing problems for application to electronic data processing systems.

Analyzes user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software.

Performs process and data modeling in support of the IT/IM planning and analysis efforts using both manual and automated tools. Applies reverse engineering and re-engineering disciplines to develop strategic and planning documents. Provides group facilitation, interviewing, training, and provides additional forms of knowledge transfer. Constructs sound, logical business improvement opportunities consistent with corporate Information Management guiding principles, cost savings, and system architecture objectives. Key coordinator between multiple project teams to ensure enterprise-wide integration of reengineering efforts.

  • Advise system owner regarding security considerations in applications systems procurement or development, implementation, operation, and maintenance, and disposal activities
  • Assist in determination of an appropriate level of security commensurate with the impact level
  • Assist in development and maintenance of system security plans and contingency plans for all systems under their responsibility
  • Participate in risk assessments to periodically re-evaluate sensitivity of the system, risks, and mitigation strategies
  • Participate in self-assessment of system safeguards and program elements and in certification and accreditation of the system
  • Notify the government of any suspected incidents in a timely manner, and assist in the investigation of incidents as necessary
  • Control, label, virus scan and appropriately transfer data ( upload/download) between information systems at varying classification levels
  • Conduct research and analysis on the impacts on system modifications, technological advances, and malicious codes
  • Review and recommend software through research and due diligence based on threat profile and/or vulnerabilities
  • Participate in Information Security Continuous Monitoring (ISCM) to maintain ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions

Security+ Certification required.


  • Analyze new hardware and software to determine their need or application in the existing or proposed system
  • Advise on new techniques and estimated costs associated with new or revised programs and utilities - taking into consideration personnel, time, and hardware requirements and makes trade-off analyses
  • Review documentation, describing system specifications and operating instructions, and revise existing processes and procedures to correct deficiencies and maintain more effective data handling, conversion, input/output requirements and storage.
  • Test, maintain, and monitor computer programs and systems, including coordinating the installation of computer programs and systems.
  • Confer with clients regarding the nature of the information processing or computation needs a computer program is to address.
  • Coordinate and link the computer systems within an organization to increase compatibility and so information can be shared.
  • Consult with management to ensure agreement on system principles.
  • Expand or modify system to serve new purposes or improve workflow.
  • Interview or survey workers, observe job performance or perform the job to determine what information is processed and how it is processed.
  • Determine computer software or hardware needed to set up or alter system.
  • Train staff and users to work with computer systems and programs.
  • Analyze information processing or computation needs and plan and design computer systems, using techniques such as structured analysis, data modeling and information engineering.
  • Assess the usefulness of pre-developed application packages and adapt them to a user environment.
  • Define the goals of the system and devise flow charts and diagrams describing logical operational steps of programs.
  • Develop, document and revise system design procedures, test procedures, and quality standards.
  • Review and analyze computer printouts and performance indicators.
  • Recommend new equipment or software packages.
  • Read manuals, periodicals, and technical reports to learn how to develop programs that meet staff and user requirements.
  • Supervise computer programmers or other systems analysts or serve as project leaders for particular systems projects.
  • Prepare cost-benefit and return-on-investment analyses to aid in decisions on system implementation.
  • Specify inputs accessed by the system and plan the distribution and use of the results.

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.