What are the responsibilities and job description for the IT Security Specialist II position at GAMA-1 Technologies?
Description
GAMA-1 Technologies, LLC seeks an experienced IT Security Specialist II to strengthen program efficiency, effectiveness, and consistency through timely, high-quality security assessments for all High and Moderate systems under the Risk Management Framework (RMF) in a remote environment. The IT Security Specialist II will plan, implement, upgrade, and monitor security measures to protect networks, systems, and information assets. Key responsibilities include assessing system vulnerabilities, identifying and mitigating security risks, and ensuring appropriate controls are in place to safeguard digital assets and critical infrastructure. The role may also involve responding to security incidents, breaches, and malware threats to maintain a secure operating environment. The IT Security Specialist II operates security monitoring and scanning tools, collects and maintains security artifacts, updates compliance records in CSAM, and assists with Plans of Action and Milestones (POA&Ms) updates and retesting of evidence. This role ensures accurate documentation of Standard Operating Procedures (SOPs) and contributes to maintaining a strong security posture in alignment with federal standards such as STIGs, FISMA, and other agency requirements.
GAMA-1 Technologies, LLC seeks an experienced IT Security Specialist II to strengthen program efficiency, effectiveness, and consistency through timely, high-quality security assessments for all High and Moderate systems under the Risk Management Framework (RMF) in a remote environment. The IT Security Specialist II will plan, implement, upgrade, and monitor security measures to protect networks, systems, and information assets. Key responsibilities include assessing system vulnerabilities, identifying and mitigating security risks, and ensuring appropriate controls are in place to safeguard digital assets and critical infrastructure. The role may also involve responding to security incidents, breaches, and malware threats to maintain a secure operating environment. The IT Security Specialist II operates security monitoring and scanning tools, collects and maintains security artifacts, updates compliance records in CSAM, and assists with Plans of Action and Milestones (POA&Ms) updates and retesting of evidence. This role ensures accurate documentation of Standard Operating Procedures (SOPs) and contributes to maintaining a strong security posture in alignment with federal standards such as STIGs, FISMA, and other agency requirements.