Information Systems Security Specialist
Concurrent Technologies Corporation - Fort Meade, MD

This job posting is no longer available on sologig. Find similar jobs: Information System Security Specialist jobs - Concurrent Technologies Corporation jobs

At Concurrent Technologies Corporation (CTC), we’re committed to assisting government, industry and nonprofit organizations achieve world-class competitiveness. In carrying out that mission, we recognize that our employees are our most important asset. Our organization has been recognized continually as an exceptional place to work. Visit us online at for more information.

Are you ready to make a difference in your career and be recognized as a corporate innovator with a respected national reputation for solving complex technical challenges? Become a part of our team. CTC has an opportunity for a qualified Information Systems Security Specialist in Ft. Meade, MD.


Primary Responsibilities: This position will provide Information Systems Security support to a federal government client and their end-clients. The Information Systems Security Specialist (ISSS) will perform technical support and oversight focused on the development, operation, management and enforcement of security capabilities for systems and networks. Technical support is concentrated on the protection and defense of information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation. This includes assessing configuration changes for security impacts and assisting in the development of alternate courses of action or implementation of resultant measures. The successful candidate will perform system administration functions to include, but not limited to, documenting the security architecture, developing user security guidelines and Standard Operating Procedures (SOPs), performing functions as required in support of the Defense Information Technology Security Certification and Accreditation program (DITSCAP), DISAI 630-230-19 and ICD 503. Other job functions may include provide Information Security Controls and guidelines to nodes and network management systems, maintain network/system access and password controls, collate and analyze audit trail data, review security threats and determine/implement effective countermeasures in association with established policies / regulations / directives, analyze network or system changes / reconfigurations for security impacts (performs risk analysis/assessment) and document security measure policies.

About this company
24 reviews