WHAT DOES AN INFORMATION SECURITY SPECIALIST DO?

Published: Sep 12, 2025 - The Information Security Specialist provides guidance to customers, partners, and subcontractors while embedding IT security requirements into system architecture and managing security-classified materials in compliance with legal standards. This role involves establishing and improving security guidelines, leading incident response efforts, and collaborating with Federal clients and the CISO team to mitigate risks and strengthen the Information Security Management System (ISMS). The Specialist also develops security objectives, strategies, and metrics to drive continuous improvement and ensure compliance with cybersecurity and regulatory requirements.

A Review of Professional Skills and Functions for Information Security Specialist

1. Information Security Specialist Key Accountabilities

  • Project Support: Support the project process to ensure information security aspects are considered from the outset and throughout the project lifecycle.
  • Product Security: Take responsibility for the security of tested products within the project context.
  • Code Review: Conduct manual and automated source code reviews.
  • Testing Methodologies: Contribute to and utilize security testing methodologies, creating and updating technical documentation.
  • Vulnerability Assessment: Perform security vulnerability analyses and assessments, and actively participate in external audits.
  • Business Understanding: Develop a strong understanding of the wider business context.
  • Team Collaboration: Collaborate with software development teams to ensure security is embedded throughout the development lifecycle.
  • Flaw Management: Identify security flaws in business software and manage them appropriately, including liaison with external bodies.
  • Tool Development: Research, identify, and develop new tools to improve the security testing process.
  • Threat Awareness: Stay current with emerging threats and evolving security practices.

2. Information Security Specialist General Responsibilities

  • Incident Management: Investigate and document security incidents reported through monitoring tools or the service desk.
  • Audit Coordination: Serve as the primary point of contact for annual security audits.
  • Patch Management: Coordinate operating system patching schedules across all endpoint devices.
  • Access Review: Perform quarterly access reviews for all in-scope applications to validate appropriate access levels.
  • Security Oversight: Define, prioritize, and oversee the execution of security initiatives.
  • Architecture Review: Review application architectures and configurations to ensure compliance with security best practices.
  • Disaster Recovery Testing: Conduct annual disaster recovery tests and confirm that all applications maintain current DR plans.
  • Access Control: Monitor internal control systems to enforce appropriate access to information.
  • Disaster Recovery Planning: Develop, test, and implement the organization’s annual disaster recovery plan.
  • Security Training: Provide staff training sessions on network and information security procedures.

3. Information Security Specialist Role Purpose

  • Event Monitoring: Monitor events, reports, incidents, and vulnerabilities identified by security systems such as DLP, FIM, SIEM, or the security operations center.
  • ISMS Management: Perform and coordinate key ISMS processes and activities, including asset management, risk assessments, and internal/external audits.
  • Policy Management: Create, update, and maintain information security policies and documentation.
  • Audit Coordination: Conduct and coordinate PCI DSS internal and external audits, security penetration tests, and related follow-ups.
  • Remediation Tracking: Track and resolve audit nonconformities, remediation plans, and vulnerabilities identified in penetration tests or corrective actions.
  • Security Consultancy: Provide security consultancy to projects, defining information security requirements in alignment with standards and regulations.
  • Awareness Program: Maintain a global user awareness program that incorporates recent security trends and emerging threats.
  • Recovery Oversight: Oversee IT disaster recovery tests and business continuity plans.
  • Data Compliance: Follow up on personal data anonymization processes to ensure compliance with applicable regulations.

4. Information Security Specialist Essential Functions

  • Vulnerability Management: Manage day-to-day operations of vulnerability management tools.
  • Security Scanning: Ensure that all environments for customers have adequate scans and assessments performed.
  • Issue Remediation: Work with technology owners and platform leads to ensure vulnerabilities and issues are patched and remediated in a timely manner.
  • Technology Research: Research and recommend emerging security technologies and tools to address current and future threats relevant to the environment.
  • Incident Response: Participate in the security incident response process.
  • Reporting Framework: Develop a vulnerability reporting framework to communicate key data points vertically and horizontally.
  • Customer Reporting: Provide a single point of contact to the account management and delivery teams for all operational security-related reporting for the customer account.
  • Operational Oversight: Oversee the implementation and management of operational security reporting activities.
  • Team Coordination: Meet with the account team weekly to review security reports, status, risks, issues, incidents, and outstanding activities.
  • Security Education: Provide security-related education to ensure security awareness and knowledge of customer-applicable security policies and processes to internal teams.
  • Policy Support: Answer questions and concerns regarding customer-applicable security policies and processes.

5. Information Security Specialist Additional Details

  • Budget Management: Lead the creation and execution of budgets to ensure alignment with organizational goals.
  • Fraud Prevention: Deliver high-quality anti-fraud services by effectively leveraging resources across the group and local markets.
  • Cross-Functional Collaboration: Collaborate with cross-functional teams to share best practices and operational knowledge.
  • Business Expansion: Identify opportunities for business expansion and establish a foundation for sustainable growth.
  • Stakeholder Relations: Build and maintain strong relationships with group and local market stakeholders.
  • Process Innovation: Propose and implement innovative methods to improve efficiency and enhance service delivery.
  • Security Reporting: Collect and prepare key materials, including system metrics, risk assessments, and remediation reports, to support security reporting.
  • Staff Support: Provide guidance and support to staff on the effective use of security technologies and programs.
  • Mission Alignment: Consistently apply the organization’s mission, vision, and values in all activities.
  • Service Excellence: Contribute to initiatives with professionalism, teamwork, and a strong commitment to service excellence.

6. Information Security Specialist Roles

  • Strategy Implementation: Support the implementation of the group's information security strategy and digital objectives within the country.
  • Security Expertise: Serve as the local subject matter expert, providing specialized IT security knowledge to protect organizational information assets.
  • Stakeholder Education: Educate and guide stakeholders through the Security by Design process.
  • Incident Management: Assist in managing information security and data privacy incidents by providing expert input.
  • Third-Party Oversight: Oversee third-party management activities, including pre-assessments, contract requirements, and ongoing evaluations.
  • Threat Awareness: Stay informed on emerging threats, tools, trends, and methodologies to ensure up-to-date expertise.
  • Risk Management: Apply the risk management process to help identify, assess, and mitigate security risks.
  • Program Oversight: Maintain and oversee the incident response program, disaster recovery plan, and contingency planning efforts.
  • Reporting Management: Create and update dashboards and management reports tracking the confidentiality, integrity, and availability of systems and assets.
  • Business Continuity: Collaborate with functional teams to ensure business continuity plans remain current and consistent across the enterprise.

7. Information Security Specialist Tasks

  • ISMS Management: Operate and continuously enhance the ISO 27001-certified Information Security Management System (ISMS).
  • Security Analysis: Present analysis and recommendations, including technology and policy changes, to senior management.
  • Operations Coordination: Coordinate with internal stakeholders to ensure all system security operations and maintenance activities are properly documented and updated.
  • Risk Reviews: Lead regular risk management reviews in line with the risk management framework, including conducting workshops.
  • Audit Management: Liaise with and manage both internal and external audits.
  • Project Participation: Participate in ad hoc information security projects.
  • Client Support: Collaborate with sales and customer service teams to respond to information security requirements in RFPs, questionnaires, client calls, and audit requests from global clients.
  • Response Library: Develop and maintain a library of standard information security responses to improve efficiency and consistency in client communications.
  • Software Evaluation: Support the evaluation and acquisition of security software and equipment.
  • Standards Compliance: Ensure departments fulfill their security responsibilities in line with organizational standards.

8. Information Security Specialist Details and Accountabilities

  • Incident Investigation: Perform investigations of security violations and infrastructure issues, documenting findings and implementing corrective actions.
  • Design Review: Review new system designs and major modifications for security implications during design and implementation phases.
  • ISMS Maintenance: Maintain Information Security Management System (ISMS) processes, policies, and related documentation.
  • Policy Enforcement: Develop, update, and enforce technical and operational security policies, standards, and procedures for end users.
  • Compliance Reporting: Report to the Information Security Manager on compliance with policies and standards across operating systems, networks, hardware, software, and business applications.
  • Issue Reporting: Provide periodic reporting on information security issues, identifying and escalating violations.
  • Risk Management: Support the development and maintenance of the Security and Risk Management program, including risk analysis processes.
  • Access Control: Assist in creating and maintaining access control rules within security software to ensure controlled access based on defined information requirements.
  • Audit Oversight: Ensure that security audits of systems and procedures are conducted and report findings to senior information security leadership.
  • Tool Integration: Contribute to the integration of automated security tools for detecting and preventing incidents.
  • Employee Training: Assist in training employees on information security issues and best practices.

9. Information Security Specialist Overview

  • Cybersecurity Maturity: Contribute to organizational cybersecurity maturity by aligning information security program activities with industry standards.
  • Incident Response: Support the development and enhancement of the incident response program, including escalation handling from SOC, incident investigation, tracking, and reporting.
  • Risk Reviews: Conduct industry-standard security risk reviews and validate, test, and report on the effectiveness of security controls.
  • Technical Testing: Perform technical testing such as infrastructure, system, and application vulnerability assessments and penetration testing, delivering clear reports on vulnerabilities and risks.
  • Vulnerability Management: Lead or contribute to the vulnerability management program.
  • Stakeholder Communication: Communicate effectively with stakeholders regarding key security initiatives.
  • Awareness Training: Lead security awareness training programs, including phishing simulations.
  • Tool Administration: Administer and manage security tools operated by the Information Security Group.
  • Risk Reporting: Produce reports for management and stakeholders on security risks and program effectiveness.
  • Threat Awareness: Stay current on industry trends and the evolving threat landscape.

10. Senior Information Security Specialist Job Description

  • Policy Implementation: Ensure information security policies, standards, processes, and procedures are properly implemented and managed.
  • Project Management: Manage and execute delegated information security projects, major activities, and requirements.
  • Regulatory Compliance: Identify, interpret, and implement information security requirements to ensure compliance with applicable laws and regulations (e.g., NIST standards).
  • Process Protection: Focus on the protection of business processes, applications, and IT systems.
  • Data Safeguarding: Safeguard sensitive information from disclosure to unauthorized individuals.
  • Incident Leadership: Lead the Information Security Response Team during major security incidents.
  • Ethical Hacking: Organize and conduct ethical hacking tests of existing security solutions, supporting IT teams in understanding, mitigating, and resolving identified vulnerabilities.
  • Security Consulting: Provide advanced security consulting and architecture support, including data protection and business continuity requirements.
  • Vulnerability Assessment: Conduct vulnerability assessments to identify weaknesses, analyze control effectiveness, and recommend remedial actions.
  • Risk Reporting: Report residual risks, security exposures, vulnerabilities, noncompliance, and misuse of information assets to IT security management.

11. Information Security Specialist Functions

  • Security Architecture: Support the design of security architecture to ensure products are secure from inception.
  • Stakeholder Liaison: Liaise with system accreditors and stakeholders to align expectations and reduce security risks to acceptable levels.
  • Security Principles: Establish and promote security principles to guide project solutions.
  • Documentation Development: Produce key documentation, including product security architecture and Risk Management & Accreditation Document Sets (RMADS).
  • Proposal Support: Collaborate with bid proposal teams by providing input on security-related requirements.
  • Department Contribution: Contribute to the Product Security Department through awareness sessions, presentations, and process improvements.
  • System Maintenance: Install, configure, troubleshoot, and maintain server hardware and security software to ensure confidentiality, integrity, and availability.
  • Compliance Measures: Apply Department of Defense information assurance compliance measures and implement security changes across environments.
  • Vulnerability Remediation: Work closely with network and systems administration teams to identify and remediate vulnerabilities.
  • Customer Support: Travel to customer sites to support system delivery schedules.

12. Information Security Specialist Accountabilities

  • Incident Identification: Review multiple sources to identify actual or potential incidents affecting the organization, its customers, and vendors.
  • Incident Response: Respond to security incidents and perform detailed analysis using advanced security tools to determine the root cause.
  • Technical Expertise: Apply expertise across networking, servers, cloud, and related domains to identify malicious actor tactics, techniques, and procedures, enabling effective response and mitigation.
  • Fraud Monitoring: Monitor digital channels for potential fraud using online fraud monitoring tools.
  • Inquiry Handling: Respond to inquiries and reports submitted to the Information Security mailbox.
  • SIEM Analysis: Conduct incident response for suspicious, malicious, or unauthorized activity through the Security Information and Event Management (SIEM) system.
  • Case Management: Leverage case management and ticketing technologies to track and manage incidents.
  • Malware Awareness: Stay current on malware trends, particularly within the financial industry, and adjust assessments to reflect new developments.
  • Wireless Security: Maintain awareness of wireless network technologies and encryption methodologies.
  • Threat Review: Continuously review emerging hacking techniques and update assessments to address evolving threats.

13. Information Security Specialist Job Summary

  • Data Transfer: Perform responsibilities as a Data Transfer Officer (DTO) and support colleagues in completing secure data transfers.
  • Metrics Management: Maintain DTO metrics in a centralized database and publish reports following established procedures.
  • Policy Review: Review and update DTO-related policies, including SOPs, work instructions, MOAs, and CONOPS, ensuring official versions are issued annually.
  • Access Approval: Approve media and equipment pass requests for items requiring facility access.
  • Virus Scanning: Conduct virus scans on removable storage media before allowing entry into facilities.
  • Compliance Reporting: Prepare and submit monthly compliance reports to relevant stakeholders.
  • Process Training: Deliver training on new DTO processes and procedures to the DTO community.
  • Security Liaison: Act as a liaison between the central information security team and business units.
  • Security Measures: Identify, prioritize, and implement security measures and processes to strengthen organizational defenses.
  • Solution Evaluation: Evaluate IT and security solutions in partnership with business units to ensure alignment with operational needs.

14. Information Security Specialist Responsibilities

  • Security Strategy: Contribute to the development, implementation, and assurance of technical security strategies while working independently within established frameworks.
  • Subject Expertise: Serve as a subject matter expert on IT security, providing in-depth knowledge and guidance across the enterprise.
  • Mechanism Assurance: Ensure information security mechanisms and services are effectively implemented and maintained throughout the organization.
  • Team Collaboration: Collaborate with cross-functional teams to address technology challenges and provide direction on security standards, planning, and strategy.
  • Initiative Implementation: Implement advanced security initiatives and define global security parameters based on enterprise risk levels across IT platforms and infrastructure.
  • Security Consulting: Provide consulting, analysis, and security reviews to support project teams and business units in designing secure solutions that align with business objectives.
  • Policy Development: Stay informed on emerging threats and proactively contribute to the creation or refinement of security policies.
  • Security Assessments: Conduct network, application, and device assessments to identify vulnerabilities and validate compliance with security and access control requirements.
  • Posture Improvement: Identify opportunities to strengthen the organization’s security posture and recommend improvements.
  • Executive Reporting: Deliver executive-level presentations to account and client leadership, ensuring senior management is updated on critical security concerns and developments.

15. Information Security Specialist Details

  • Policy Management: Design, implement, and maintain information security policies, standards, and procedures.
  • Compliance Oversight: Oversee information security compliance across the organization.
  • Continuous Improvement: Drive continuous improvement initiatives in information security.
  • Security Controls: Plan, implement, and manage security controls on information systems.
  • Vulnerability Management: Monitor, report, and resolve information security vulnerabilities and incidents.
  • Risk Tracking: Track and evaluate information security risks and controls.
  • Security Reporting: Develop and deliver reports on information security activities and status.
  • Awareness Promotion: Promote information security awareness across the organization.
  • Incident Management: Guide the management of security incidents.
  • Security Requirements: Define security requirements and participate in the analysis, design, and implementation of projects in alignment with security principles.
  • System Implementation: Contribute to the analysis, design, implementation, and management of information security systems and applications.
  • Security Assessments: Participate in internal and critical information security assessments.

16. Information Security Specialist Duties

  • System Oversight: Oversee the operation and management of IT security systems to ensure effective protection across the organization.
  • Vulnerability Management: Administer vulnerability management platforms and coordinate remediation activities.
  • Regulatory Compliance: Ensure IT systems remain compliant with security standards and regulatory requirements.
  • Security Projects: Deliver projects aimed at strengthening the company’s overall IT security posture.
  • Threat Monitoring: Monitor emerging security threats and work with IT teams to coordinate appropriate responses.
  • Cybersecurity Strategy: Contribute to the development and execution of the company’s enterprise-wide cybersecurity strategy.
  • Incident Reporting: Provide regular reporting on security incidents and maintain visibility into new and evolving vulnerabilities.
  • Vendor Management: Collaborate with outsourced service providers, managing budgets and overseeing contract performance to meet company needs.
  • Operational Efficiency: Recommend and implement plans to enhance the overall efficiency and effectiveness of security operations.
  • Project Support: Support the execution and project management of cybersecurity-focused business initiatives.

17. Information Security Specialist Roles and Details

  • Policy Development: Define and refine security policies based on requests from internal stakeholders and clients, while raising awareness of the impact of security and non-compliance.
  • Policy Maintenance: Maintain a comprehensive set of security policies aligned with industry standards such as ISO 27001 and NIST.
  • Policy Audits: Conduct regular audits of security policies, develop remediation plans for non-compliance, and lead implementation.
  • Contract Review: Review client engagement letters for technical security considerations to ensure agreements minimize organizational risk.
  • Audit Response: Respond to client-driven external audits and provide required documentation or evidence.
  • Process Management: Implement and manage core security processes, including training, penetration testing, incident response, and policy updates.
  • Tool Deployment: Collaborate with IT teams to deploy and manage security tools such as firewalls, training platforms, penetration testing solutions, and SIEM systems.
  • Vendor Evaluation: Evaluate and approve projects and third-party vendors from an information security perspective.
  • Security Projects: Lead or participate in security-related projects to enhance the organization’s overall security posture.
  • Awareness Programs: Deliver consulting, coaching, and awareness programs to employees, departments, and managers through the Learning Network and related initiatives.

18. Information Security Specialist Responsibilities and Key Tasks

  • Cybersecurity Solutions: Design, implement, and document advanced cybersecurity solutions in collaboration with vendors and consultants.
  • Endpoint Management: Manage advanced endpoint policies, definitions, and administration.
  • Vendor Audits: Conduct vendor security risk audits and assessments.
  • Vulnerability Scanning: Perform vulnerability scans to identify and address potential risks.
  • Incident Management: Handle incident reporting and management activities.
  • Regulatory Compliance: Advise on compliance and regulatory security changes.
  • Breach Response: Respond urgently to breaches and security incidents.
  • Email Monitoring: Monitor email domains for potential exposures and act on suspected breaches.
  • Practice Development: Develop, enhance, and maintain practices within the cybersecurity discipline.
  • Client Consultation: Provide IT consultation to clients to strengthen infrastructure and security posture.
  • Project Collaboration: Work with project managers on both internal and external IT projects.
  • Team Mentorship: Mentor team members on technical issues and best practices.
  • Vendor Liaison: Liaise with IT vendors and other personnel to resolve complex issues.
  • Problem Solving: Collaborate closely with team members to solve critical problems and maintain aggressive SLAs.

19. Information Security Specialist Duties and Roles

  • Intrusion Analysis: Perform first-level and follow-on intrusion incident analysis.
  • Incident Prioritization: Determine, escalate, and prioritize incidents, events, and mission impacts.
  • Incident Tracking: Enter data into incident management and tracking systems.
  • Customer Coordination: Coordinate incident and event feedback to customers.
  • Customer Support: Provide customer support desk operations for security-related issues.
  • IA Support: Support Information Assurance (IA) operations reviews, assessments, exercises, and operational surges.
  • Root Cause Analysis: Correlate incidents, events, and network outages for root cause identification.
  • Antivirus Support: Provide antivirus software support, including assistance with downloads, setup, and configuration errors.
  • Team Coordination: Coordinate with Theater Computer Network Defense (CND) teams, other Computer Emergency Response Teams (CERT), Global/Joint/Theater Command and Control Centers, and Service Theater CERTs.
  • Proposal Support: Assist in proposal development.

20. Information Security Specialist Roles and Responsibilities

  • Vulnerability Assessment: Provide vulnerability assessment support, including risk analysis of vulnerabilities, threats, and the mission impact of system capability loss.
  • Risk Mitigation: Recommend security countermeasures or risk mitigation strategies, implement approved countermeasures, and perform periodic reviews.
  • RMF Documentation: Utilize Department of Defense (DoD) applications and tools, such as Enterprise Mission Assurance Support Service (eMASS), to document Risk Management Framework (RMF) activities.
  • Security Controls: Implement applicable security controls in alignment with NIST SP 800-53 and CNSSI 1253.
  • Assessment Procedures: Apply assessment procedures and Control Correlation Indicators (CCIs) in accordance with DoDI 8510.01.
  • System Configuration: Support the Government Capability Manager/Information System Owner (ISO) in configuring information systems in compliance with DISA STIGs, security patches, and other cybersecurity requirements.
  • Artifact Review: Collect and review required artifacts, providing recommendations for Assess Only Packets or Certificates of Networthiness (CoN) requests for installation activities.
  • Compliance Monitoring: Monitor and report quarterly on Approval to Connect (ATC) and Authority to Operate (ATO) expiration dates, ensuring milestones comply with DoD regulations and policies to avoid disconnection.
  • Defense-in-Depth: Operate and maintain a Defense-in-Depth security architecture for networks and enclaves in compliance with DoD policies and published regulations.
  • Work Accuracy: Maintain responsibility for the completion and accuracy of work products.

21. Information Security Specialist Key Accountabilities

  • Security Equipment: Work with information network security equipment.
  • Threat Knowledge: Understand information network threats such as viruses, malware, and other cyber risks.
  • System Testing: Test and operate firewalls, intrusion detection systems, enterprise antivirus platforms, and software deployment tools.
  • Network Protection: Safeguard networks against unauthorized infiltration, modification, destruction, or disclosure of information.
  • Security Evaluation: Research, evaluate, test, recommend, and implement new security software or devices, while communicating findings to stakeholders.
  • Policy Development: Develop, enforce, and communicate security policies and plans for data, applications, hardware, and telecommunications.
  • Risk Assessment: Provide management with assessments of the risks and potential negative impacts caused by theft, destruction, alteration, or denial of access to information.
  • IA Recommendations: Offer recommendations on information assurance engineering standards, implementation requirements, and emerging information assurance technologies.
  • COTS Tools: Work with commercial off-the-shelf (COTS) cybersecurity tools, including at least one of the following: HBSS (endpoint security suite), ACAS (Tenable/Nessus), SIEM technologies, RSA Archer, Redseal, or FireEye host/network security solutions.

22. Information Security Specialist General Responsibilities

  • RMF Documentation: Develop, maintain, and submit Risk Management Framework (RMF) security documentation packages to obtain Authorization to Operate (ATO) and Authorization to Connect (ATC) certifications as required by government standards.
  • Stakeholder Coordination: Request, gather, and formalize RMF documentation from stakeholders, such as Information System Security Managers, Program Managers, System Managers, System Administrators, Functional Managers, Certification and Accreditation teams, Auditors, Code Reviewers, and Network Engineers.
  • Test Reporting: Author Security Control Test Results, identifying compliance status and required supporting artifacts.
  • eMASS Management: Enter all Security Control data into the Enterprise Mission Assurance Support Service (eMASS), upload documentation artifacts, and assign them to correlated controls.
  • POA&M Tracking: Maintain the Plan of Action and Milestones (POA&M) to track and resolve findings.
  • Documentation Monitoring: Continuously monitor the currency and accuracy of all RMF security documentation and package requirements.
  • Plan Exercises: Ensure Contingency Plan exercises, Incident Response Plan exercises, and Annual Reviews are completed.
  • Problem Solving: Participate in team problem-solving efforts and offer ideas to solve client issues.
  • Research and Analysis: Conduct relevant research, data analysis, and create reports.

23. Information Security Specialist Role Purpose

  • Access Control: Define access privileges, controls, and resources.
  • Account Reporting: Provide quarterly reporting on Active Directory account de-provisioning.
  • Group Reporting: Provide quarterly reporting on security and distribution group membership.
  • Record Maintenance: Maintain detailed records of each position’s security and distribution group default assignments.
  • Network Support: Work closely with the Network Engineer and act as the secondary resource in their absence.
  • Equipment Management: Monitor, maintain, and configure network equipment under the direction of the Network Engineer.
  • Violation Reporting: Identify abnormalities and report security violations.
  • Security Assessments: Collaborate with security vendors and auditors to perform security assessments, audits, penetration tests, and information gathering.
  • Weakness Remediation: Work with other teams to identify and remediate security weaknesses in workstations, networks, and servers.
  • Compliance Framework: Establish and maintain an IT compliance and information security framework, including policies, standards, and guidelines for risk management.
  • Policy Enforcement: Adhere to and enforce system security policies while following all organizational standards.
  • Regulatory Compliance: Ensure compliance with applicable laws and regulations, including banking laws, PCI/PHI, and HIPAA requirements.

24. Information Security Specialist Essential Functions

  • Policy Development: Develop, publish, and monitor information security policies, procedures, standards, and guidelines based on NIST 800-53, ISO 27001/27002, and specific compliance requirements.
  • ISMS Management: Develop and manage the Information Security Management System (ISMS) program, including risk assessment surveys, identification of key risks, mitigation strategies, and control gap analysis.
  • Control Analysis: Perform analysis of existing controls and benchmark them against standards such as ISO, NIST, COBIT, and PCI.
  • Management Reporting: Prepare reports for senior management, audit committees, and boards of directors.
  • Audit Support: Provide support for external and regulatory IT audits.
  • Security Advisory: Monitor and advise on information security issues related to internal systems and workflows to ensure security controls are appropriate and effective.
  • Risk Assessment: Assist business units in identifying security requirements through risk-based and business impact assessments.
  • Vulnerability Management: Collaborate with internal partners to manage security vulnerabilities.
  • Third-Party Assessment: Conduct third-party risk assessments.
  • Program Metrics: Generate metrics and reports to demonstrate the effectiveness of the ISMS program.

25. Information Security Specialist Additional Details

  • Knowledge Management: Develop and maintain a knowledge base on evolving regulations, threats, and technologies to continuously refine security policies and ensure compliance.
  • Continuous Monitoring: Perform continuous monitoring to secure and sustain system authorizations to operate for specific systems and applications.
  • Vulnerability Testing: Conduct vulnerability assessments, penetration testing, and other approved activities to evaluate the effectiveness of cybersecurity controls.
  • Risk Assessment: Support cybersecurity risk assessment initiatives by recommending and applying methodologies to analyze threats, vulnerabilities, and operating environments.
  • Technology Research: Research and assess emerging security technologies to enhance the cybersecurity posture.
  • Documentation Development: Draft detailed cybersecurity work instructions, manuals, and procedures for operational clarity.
  • Security Audits: Perform audits, system security reviews, vulnerability analyses, and risk assessments to identify and mitigate potential weaknesses.
  • User Training: Train users and raise awareness on security best practices to protect systems and optimize server and network performance.
  • Tool Evaluation: Assist in testing, evaluating, and certifying vulnerability management tools in alignment with corporate standards.
  • Technical Documentation: Contribute to the creation of documentation such as standard builds, releases, architecture diagrams, and requirements, ensuring accessibility via internal platforms.

26. Information Security Specialist Roles

  • Security Compliance: Develop, implement, and manage all aspects of commercial security, including ISO 27001 audits, ISAE 3402 customer audits, and customer-specific compliance engagements.
  • Certification Support: Support the ongoing maintenance and renewal of ISO 27001, ND 1643, and ISAE 3402 certifications.
  • Sales Support: Assist sales teams by addressing security-related requirements in customer proposals and bids.
  • Regulatory Liaison: Serve as the primary point of contact for security matters raised by regulatory bodies and relevant authorities.
  • Compliance Strategy: Collaborate with internal stakeholders to define and implement a localized compliance strategy aligned with external regulatory expectations.
  • Policy Maintenance: Contribute to the creation and maintenance of security policies, rules, and processes to ensure compliance with legal and regulatory frameworks.
  • ISMS Management: Support the continual improvement and upkeep of the Information Security Management System (ISMS).
  • Project Leadership: Manage and lead various projects and services related to information security across the organization.
  • Risk Assessment: Identify, assess, and document information security risks to inform risk management initiatives.
  • Best Practices: Stay current with evolving best practices in information security and recommend relevant training and development opportunities for the organization.

27. Information Security Specialist Tasks

  • Team Collaboration: Collaborate with IT services, cloud engineering, API, enterprise architecture, and other support teams to represent business interests effectively.
  • Authentication Integration: Ensure the integration of advanced authentication methods, such as tokenization, aligns with risk mitigation goals and overall strategic direction.
  • MFA Development: Support the development, configuration, and implementation of multifactor authentication (MFA) use cases, leveraging PingFed as the core federation service.
  • Cloud Federation: Work closely with cloud teams to deliver seamless cross-cloud mobile experiences, ensuring federation services integrate with both cloud and on-premise systems.
  • API Security: Contribute to the microservices strategy by partnering with API teams to secure access for internal and external clients using tools such as API Gateway and AWS.
  • Subject Expertise: Act as a subject matter expert to assist in business validation and functional testing across desktop, online, and mobile platforms.
  • Policy Enforcement: Design and enforce technical policies that uphold governance standards and incorporate monitoring capabilities.
  • Control Deployment: Develop and deploy security-focused controls and policies to strengthen system resilience.
  • Security Guidance: Provide expert advice and ongoing guidance to teams on security-related matters.
  • Awareness Promotion: Promote awareness of information security risks and best practices throughout the organization.

28. Information Security Specialist Details and Accountabilities

  • Policy Compliance: Monitor and enforce compliance with IT security policies, standards, and procedures in alignment with ISO 27001.
  • Infrastructure Management: Manage, maintain, and configure the organization’s security infrastructure to ensure a strong security posture.
  • Server and Firewall Oversight: Oversee the configuration and upkeep of security settings on servers and firewalls, including regular assessments.
  • Access Control: Implement controls to maintain appropriate access privileges and security clearances for systems and applications.
  • Incident Response: Respond promptly and effectively to security incidents and user-raised security requests across the organization.
  • Stakeholder Collaboration: Collaborate with stakeholders at all levels to provide expert guidance on security matters impacting the business.
  • Threat Monitoring: Support the operation and maintenance of security monitoring tools to detect and address potential threats.
  • Technical Support: Provide technical support for various back-office information security products and solutions.
  • Tool Administration: Administer and configure internal tools and solutions specific to the security team’s operations.
  • SOC Operations: Participate in 24/7 SOC operations with the flexibility to work within shift-based schedules.

29. Information Security Specialist Overview

  • Certification Support: Support the maintenance of ISO 27001:2013 certification and assist in managing the Information Security Management System (ISMS) across global locations.
  • Compliance Reporting: Assist in reporting information security compliance and risk metrics to key business stakeholders.
  • Incident Management: Support the management and remediation of information security incidents on a global scale.
  • Pre-Sales Support: Contribute to the pre-sales and RFP process by reviewing client security questionnaires and maintaining security documentation for both clients and internal teams.
  • Contract Review: Participate in reviewing information security requirements during the contract negotiation process.
  • Penetration Testing: Assist in the coordination and execution of application and infrastructure penetration testing activities.
  • Team Collaboration: Collaborate with development, infrastructure, architecture, and product teams to address security threats, identify vulnerabilities, and recommend mitigations.
  • Awareness Training: Help maintain a global security awareness and training program to educate staff on cybersecurity best practices.
  • Breach Response: Identify and respond to security breaches, taking action to contain threats and prevent recurrence.
  • Access Monitoring: Monitor identity and access management systems to detect misuse or abuse of privileges by authorized users.
  • Operations Coordination: Work closely with operations teams to assign appropriate ownership and accountability for security events.

30. Information Security Specialist Job Description

  • Strategic Involvement: Report to the Information Security Officer (ISO) and be strategically involved in key security decision-making, including security exceptions for the assigned area.
  • Local Contact: Act as the key local security contact for the assigned area.
  • Escalation Handling: Serve as the local escalation contact for security risks, issues, and developments.
  • Security Guidance: Work with internal technology teams to provide security guidance.
  • Risk Advisory: Gain a clear understanding of the business data lifecycle and initiatives, and proactively advise management and personnel about potential risks that may materially impact business performance.
  • Customer Arbitration: Arbitrate customer requirements to ensure expeditious issue resolution.
  • Audit Management: Facilitate and manage customer security audits and requests.
  • Remediation Management: Coordinate and manage remediation efforts.
  • Project Support: Provide security guidance for new projects and innovations to ensure best practices are implemented and risks are minimized.
  • Compliance Monitoring: Conduct compliance monitoring and reviews, and lead security process enhancement efforts.
  • Risk Communication: Communicate security risks in business terms that are clearly understood at all organizational levels.
  • Event Investigation: Provide expertise and be directly involved in investigating and resolving security events, and assist with disciplinary and legal matters associated with such events.

31. Information Security Specialist Functions

  • Audit Execution: Audit major components of business units, including critical technology functions, cloud-based infrastructure, cybersecurity, risk management, applications, and third-party services, while leading small to medium-sized audits.
  • Control Testing: Design and execute internal control testing for operations of varying complexity.
  • Security Knowledge: Apply in-depth knowledge of all aspects of information security across the entire IT landscape.
  • Best Practices: Implement best practices of the information security domain.
  • Process Assessment: Initiate assessments of deployed processes and ensure closure of identified gaps.
  • Risk Analysis: Analyze risks associated with implemented technology products, processes, or applications and ensure mitigation of identified risks.
  • Process Improvement: Review process documents and implement improvements to close gaps.
  • Application Security: Perform application security checks and apply knowledge of VAPT.
  • Linux Expertise: Apply knowledge and hands-on experience with Linux platforms.
  • Cybersecurity Support: Support digital and cybersecurity initiatives for enterprises.
  • Data Protection: Apply fluency and experience in personal data protection law.

32. Information Security Specialist Accountabilities

  • Program Coordination: Coordinate and monitor highly sensitive aspects of government and industrial security programs, ensuring compliance with applicable policies and procedures.
  • Classified Protection: Safeguard classified information and deliver security awareness training for cleared personnel.
  • Security Briefings: Conduct and deliver highly sensitive security briefings.
  • System Analysis: Review and analyze system architecture diagrams and networks to identify risks and improvements.
  • Strategy Development: Assess security system needs and provide corrective actions as part of a coherent security strategy.
  • A&A Packages: Develop and maintain Authorization & Accreditation (A&A) packages and information systems in alignment with customer policy and guidance.
  • Accreditation Support: Facilitate development, maintenance, and provide security guidance throughout all phases of the system accreditation process and/or Risk Management Framework (RMF).
  • IA Testing: Perform information assurance testing, including monthly, quarterly, and annual reviews.
  • Vulnerability Mitigation: Research and identify security vulnerabilities, providing mitigation strategies for systems undergoing the A&A process.
  • Data Spill Response: Investigate and remediate data spills to protect sensitive information.
  • Security Solutions: Design and deliver security-focused solutions to address technically complex systems and challenges.
  • Data Transfer: Support data transfer operations across multiple computer systems and monitor operational computer networks.

33. Information Security Specialist Job Summary

  • Technology Awareness: Keep up to date with the latest security and technology developments.
  • Policy Improvement: Support the identification of improvements to information security policies, standards, and procedures by incorporating best practices and organizational experience, and assist with tailoring them to business needs.
  • Control Review: Review the effectiveness of IT security controls in line with established policies and standards.
  • Compliance Support: Support a comprehensive and robust compliance regime across the organization with respect to all information security policies.
  • Incident Lessons: Identify lessons learned from incidents, share findings, and support the implementation of improvements across the organization.
  • Awareness Training: Provide information security awareness and training to staff.
  • Log Monitoring: Proactively review and monitor system and network logs to support acceptable use of ICT systems, HR disciplinary cases, and incident investigations, in line with relevant legislation.
  • System Maintenance: Take responsibility for the development and maintenance of Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) solutions.
  • Service Adoption: Develop, promote, and expand the adoption of information security services within the organization.
  • Advisory Collaboration: Collaborate with group leaders, service operations teams, and architects during service development to provide authoritative advice and direction on information security.
  • Incident Resolution: Ensure resolution of information security incidents and report lessons learned.
  • Trusted Advisory: Support teams across the organization by acting as a trusted advisor on security-related matters.

34. Information Security Specialist Responsibilities

  • Customer Support: Provide guidance, support, and manage relationships with customers, partners, and subcontractors throughout the project life cycle to ensure security goals are achieved.
  • Guideline Preparation: Prepare and establish security guidelines, train project teams, and continually improve security measures for ongoing and future projects.
  • Architecture Integration: Embed IT security into IT system architecture by analyzing solution needs and integrating security requirements accordingly.
  • Material Management: Manage all security-classified materials received or generated, including approved copies, and guarantee secure erasure or destruction in compliance with legal requirements.
  • Objective Setting: Set weekly, monthly, annual, and long-term security and compliance objectives, define strategies, metrics, and reporting, and create maturity models with a roadmap for continuous improvement.
  • Incident Oversight: Stay updated on security incidents and serve as the main control point during significant information security events.
  • SIRT Leadership: Convene and lead a Security Incident Response Team (SIRT) to investigate and resolve incidents.
  • Client Collaboration: Collaborate with Federal clients to identify, mitigate, and manage cyber risks and threats effectively.
  • Process Innovation: Identify opportunities for efficiency and innovation in work processes to enhance overall security practices.
  • ISMS Support: Work alongside the CISO team to strengthen and implement the ISMS, and to develop and review security guidelines and directives.
  • Compliance Response: Handle and respond to requests from partners regarding compliance and cybersecurity matters.

35. Information Security Specialist Details

  • ASRA Governance: Govern the application security assessment (ASRA) process for new and existing applications by partnering with RSMs.
  • Gap Management: Ensure timely completion, reviewing responses, making recommendations, identifying gaps, developing action plans, and overseeing completion.
  • Dashboard Support: Assist leadership in preparing and managing dashboards for technology modernization projects handled by senior team members.
  • Secure Solutions: Support the business unit in executing secure solutions or remediating gaps identified in legacy technology.
  • Tech Initiatives: Contribute to the implementation of information security technology initiatives originating from IT ORM, ITOR, or core ISO.
  • BISO Support: Support BISOs with information security technical initiatives or consult on less complex solutions and remediation plans related to audit action items, risk mitigation, or new business efforts aligned with business strategy.
  • Audit Coordination: Partner with ITOR and Internal Audit to assist with the execution of action plans.
  • Due Diligence: Provide backup support for team members conducting third-party due diligence reviews.
  • Compliance Awareness: Maintain awareness of existing and emerging information security compliance frameworks (e.g., ISO 2700x, NIST), and applicable state and federal regulations.
  • Project Leadership: Lead or support projects within the Information Security Technical Team to streamline processes and maximize efficiencies through technology solutions that enable effective operations.
  • Cross-Functional Support: Work cross-functionally across business units to provide consultative assistance on security-related issues.
  • SOP Development: Develop and maintain Standard Operating Procedures (SOPs) that support Information Security Technology team processes.

36. Information Security Specialist Duties

  • BCP Management: Create and maintain business continuity plans.
  • Contract Analysis: Analyze contracts to evaluate business continuity obligations and ensure plans meet required commitments.
  • Customer Response: Respond to customer requests for information regarding continuity and resilience.
  • Risk Assessment: Conduct business continuity threat and risk assessments.
  • BIA Execution: Execute business impact analyses (BIA).
  • Plan Alignment: Ensure business continuity plans (BCP) are aligned with disaster recovery plans (DRP).
  • Gap Analysis: Analyze existing BCP plans and processes, identify gaps, and recommend improvements or future development programs.
  • Crisis Leadership: Lead real-time business continuity activations during disasters and emergencies.
  • Awareness Programs: Develop, implement, and maintain programs to educate and raise business continuity awareness among employees.
  • BCM Expertise: Serve as a local source of knowledge for business continuity management (BCM).

37. Information Security Specialist Roles and Details

  • BCM Training: Conduct annual BCM training for relevant personnel.
  • Drill Management: Manage and facilitate BCP drills and exercises.
  • Audit Preparation: Prepare sites for ISO 22301 audits.
  • Audit Support: Support internal and external audit activities.
  • Customer Liaison: Serve as a liaison with internal and external customers, as well as business continuity groups, to ensure effective communication and alignment.
  • Best Practices: Engage with professional networks and business continuity groups to identify and implement best practices.
  • Status Reporting: Provide status reports to account management and global BCM leadership.
  • Program Development: Design and evolve BCM programs to integrate into daily operations and adapt to evolving business needs using tools, procedures, and collaborative practices.
  • Documentation Review: Coordinate schedules for annual business continuity documentation reviews, maintenance, and updates.
  • Professional Development: Actively expand consulting skills and professional development through training courses, mentoring, and daily interaction with clients.

38. Information Security Specialist Responsibilities and Key Tasks

  • Security Consultation: Provide strategic and tactical direction and consultation on information security and compliance.
  • Security Planning: Participate in security planning and analysis activities.
  • Project Integration: Work with IT leadership to ensure security is fully integrated into projects.
  • Best Practices: Maintain an up-to-date understanding of industry best practices.
  • Policy Development: Develop, refine, and implement enterprise-wide security policies, procedures, and standards to meet compliance requirements.
  • Regulatory Monitoring: Monitor the legal and regulatory environment for changes that impact security obligations.
  • Compliance Oversight: Oversee compliance with IT policies, standards, and procedures, recommending updates.
  • SLA Support: Support service-level agreements (SLAs) to ensure security controls are properly managed and maintained.
  • Legal Compliance: Ensure compliance with applicable legal and regulatory standards.
  • Governance Processes: Develop processes and procedures for the information security governance program, including control document reviews, assessment preparation, meeting coordination, remediation planning, tracking, reporting, and escalation.

39. Information Security Specialist Duties and Roles

  • Project Engagement: Engage with business units to understand project scope and requirements.
  • Security Guidance: Provide security guidance on business processes, applications, and infrastructure design.
  • Control Implementation: Collaborate with IT and development teams to implement protective and mitigating security controls.
  • Risk Management: Facilitate risk analysis and management processes with customers, third parties, and internal stakeholders to identify acceptable levels of residual risk.
  • Risk Framework: Contribute to the development and maintenance of a global risk framework that reflects the organization’s overall risk profile and tolerance.
  • Risk Repository: Capture, monitor, and maintain information security risks in a central repository.
  • Data Classification: Advise clients on data classification for their resources.
  • Threat Assessment: Assess threats and vulnerabilities related to information assets and recommend appropriate controls and safeguards.
  • Security Controls: Define, recommend, and manage security controls for information systems.
  • Documentation Maintenance: Maintain project documentation such as compliance records, security plans, risk assessments, and corrective action plans.

40. Information Security Specialist Roles and Responsibilities

  • Report Analysis: Analyze security reports and provide recommendations for management decisions.
  • Monitoring Support: Perform monitoring and reporting activities, analyze alerts, and escalate issues to support teams.
  • Project Security: Provide security support for application and infrastructure projects throughout the project life cycle.
  • Configuration Standards: Define security configuration and operational standards for systems and applications, including compliance tools, network appliances, and host-based security solutions.
  • Baseline Validation: Establish and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
  • Issue Resolution: Identify and coordinate the resolution of information security recovery issues.
  • Responsive Support: Provide responsive support for security issues identified during and outside of normal working hours.
  • Incident Response: Lead and respond to security incidents and investigations, including targeted reviews of suspect areas.
  • Team Collaboration: Collaborate with teams to resolve issues identified by internal and third-party monitoring tools, focusing on root cause resolution.
  • Awareness Training: Develop and deliver security awareness and compliance training programs.
  • Knowledge Transfer: Conduct knowledge transfer sessions with the security operations team following new technology implementations.