Employing a Facility Security Officer (FSO) or Security Team can be expensive and frustrating when spending more time than desired on non-revenue generating activities. IsI’s team of security professionals provide the necessary support to manage small to large security programs at a fraction of the cost. IsI allows our clients to reallocate both time and money that can be dedicated to growing and maintaining the business during this time of ever-changing security requirements.

IsI Security Program Managers are well-versed in all aspects of Industrial Security & Compliance and management of day-to-day security operations. Each client is initially assigned to the IsI Compliance Team for analysis of the program for evaluation and organization. Once the requirements are established, the client is then assigned a team of people through a helpdesk to provide support by phone and/or email 24 hours a day, 7 days a week.

Policies and procedures are the backbone of a sound security compliance program. IsI has the expert knowledge and experience in security compliance needed to implement custom processes for our clients in support of any US customer worldwide. IsI ensures our client’s compliance, as well as internal requirements, are properly assessed, understood, implemented and successfully met. IsI defines solutions, identifies and correct security issues, and develops and implements corporate security policies and procedures to include Standard Practice & Procedures (SPP),  and other Security Operational Policies for client specific requirements and needs. Support compliance includes the National Industrial Security Program Operating Manual (NISPOM), Director of Central Intelligence Directives (DCID), Intelligence Community Directives (ICD), and other government and firm security policies and procedures.

IsI’s Team performs standard and specialized personnel security duties in support of NISP-related classified, Intelligence Community (IC), and Controlled Unclassified Information/agency sensitive (CUI-Public Trust) programs. We initiate, prepare and submit personnel security applications for NISP personnel clearances and Special/SCI access, and Public Trust suitability processing to include Electronic Questionnaires for Investigations Processing (eQIP), SF86, SF85P and other agency required paperwork. IsI will capture or convert and submit digital fingerprints to Office of Personnel Management (OPM) through Secure Web Fingerprint Transmission (SWFT) when necessary. IsI supports personnel security mission to include daily database interactions, including but not limited to: status checks in Joint Personnel Adjudication System (JPAS); monitoring and queries associated with ensuring our cleared personnel databases are in synchrony with current employee status; notifications to newly cleared personnel; maintaining updated personnel security and suitability records, outgoing clearance certifications for classified visits; maintaining accurate and up-to-date records. We initiate, prepare and submit required personnel security applications (initial and periodic reinvestigations) for access to National Security Information/Intel/Special Access Programs (SAP).

Our team reviews and maintains all DD Form 254s for all contracts. Two (2) self-inspections are conducted every year by our Compliance Team to continually evaluate and make necessary adjustments to maintain highly effective security program. IsI develops and provides custom security training programs including security awareness, travel briefings, counter-intelligence training, and OPSEC training annually. And we will provide on-site support for any meetings or assessments with the Defense Counterintelligence and Security Agency (DCSA).

IsI can act as the secondary Communications Security (COMSEC) custodian and quality control specialist for personnel security paperwork, ensuring all packages are properly completed and ensuring any required/associated documentation is included.

IsI can provide Government-compliant computer systems that includes an operating system configured to the contract requirements, a System Security Plan, an Information System Profile, a checklist of what actions the ISSM must perform on a weekly basis to maintain compliance, as well as a CD containing all documents required for submission to the applicable authority for system accreditation

IsI can supervise and manage construction of customized Sensitive Compartmented Information Facilities (SCIF’s), and Closed and Restricted Areas along with working with DCSA and agencies for accreditation. We assist with developing security budgets and provide guidance on staffing and security project requirements.