Senior IT Risk and Compliance Specialist Senior
Listed on 2026-03-09
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Req : RQ210009
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: None
Public Trust/Other
Required:
None
Job Family: Cyber and IT Risk Management
Skills: GRC Tools, NIST 800-53, Risk Management Framework
Experience: 3 + years of related experience
Job Description:Transform technology into opportunity as an IT Risk and Compliance Senior Specialist with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
GDIT's Technology Shared Services (TSS), Governance, Risk, and Compliance (GRC) team is seeking an experienced IT Risk and Compliance Senior Specialist with experience as an Information System Security Officer (ISSO). Our team provides services across GDIT programs to ensure the confidentiality, integrity, and availability of information systems while supporting compliance with relevant regulations and standards.
This role requires a highly knowledgeable self-starter to independently develop key artifacts based on NIST 800-171. The ideal candidate will operate in a dynamic, high-tempo environment, applying expertise in risk management and regulatory compliance to protect critical information assets.
HOW THE IT RISK AND COMPLIANCE SPECIALIST WILL MAKE AN IMPACT:Manage and/or maintain the security posture and authorization lifecycle for multiple cloud and on-premises information systems.
Collaborate with stakeholders to attain information necessary for continuous monitoring activities, including vulnerability scan analysis, audit log reviews, and supporting the SCA/ISSM during security control assessments.
Develop, maintain, and update security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POAMs), network architectures
Collaborate with stakeholders in order to develop program/project cyber policies .
Familiarization with NIST 800 series documentation, ( NIST 800-171, GD and GDIT Cybersecurity policies), hardening guidance from vendors and US Government clients.
Posses the ability to interpret vulnerability scan reports and coordinate with program stakeholders in order to remediate actions to closure and develop presentations and brief findings as needed.
Support incident response, contingency planning, and disaster recovery efforts as needed by program and stakeholders.
Serve as the program ISSO and represent the interests of the system owners, developers, and administrators.
The ISSO will Interface with auditors and assessors during security control assessments and authorization events.
Facilitate and collaborate with data owners, system owners, authorizing officials, and technical teams to prepare, implement, and monitor privacy and security controls in accordance with organizational risk policy.
Ensure compliance with applicable GDIT requirements and policies
maintain cyber compliance processes, procedures, and standards
Collaborate stakeholders to design and implement security controls for new and existing systems and lab environments
Maintain and update security documentation, including System Security Plans (SSPs, Architecture Diagrams, , Plan of Action and Milestones (POA&Ms), and other AO/AODR required documents, etc.
Support security assessments and audits as a key stakeholder during the SCA/ISSMs evaluation of the security controls,
Review vulnerability and compliance scan reports, and other relevant security reports and alerts for assigned systems
Support incident response activities, including investigation, containment, and recovery efforts and annual incident response testing
Technical Training, Certification(s) or Degree
Minimum of 3+ years of experience serving as an ISSO for either Corporate or program levels with a basic understanding of ISSO duties and responsibilities and awareness of GRC tools (eMASS or XACTA)
Experience supporting security projects as well as delivering and supporting customer security requirements
Comprehension of change and configuration management and security impact analysis
Excellent problem-solving, analytical, and communication skills
Ability to effectively collaborate across multi-functional teams
Possesses experience with communicating and presenting technical solutions and status to executives, key stakeholders and decision makers
Familiarity with security tools and technologies (e.g., Firewalls, VPNs, SIEM, End Point Protection, Vulnerability & Compliance Scanning, Identity & Access Management)
Ability to develop network architectures or follow templated examples in order to properly document a network architecture.
Knowledge of IT risk management frameworks and regulatory requirements (e.g., NIST 800-171, ISO 27001)
Knowledge of Security and privacy controls (e.g., CIS Level 2, DISA STIG)
Knowledge of DoD security authorization process
Knowledge of Security auditing practices and procedures and associated processes
Proven track record of…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).