No more applications are being accepted for this job
- Students are our top priority.
- We strive for excellence.
- We thrive on diversity.
- We celebrate collaboration.
- We champion innovation.
- We safeguard freedom of inquiry and expression.
- We nurture the wellbeing of our community.
- We act ethically.
- We are responsible stewards
- System Architecture design (compute, hardware/virtual, OS, storage, networking, security).
- Translate researcher IT needs into robust and scalable IT Solutions/Infrastructure.
- Contributor to the development of Continuous Integration and Continuous Development (CICD) processes using DevOps and DevSecOps principles.
- Cross Domain Data Exchange and Systems Integration Implementer of Infrastructure as Code.
- Virtual machine management.
- Deploy security control configuration to systems using configuration management tools
- Proficiency in Microsoft Windows operating systems and infrastructure technologies including Active Directory, DHCP, DNS, Group Policy, Hyper-V, WDS, and WSUS.
- Account Management and working knowledge of LAN and WAN network environments.
- Maintain and utilize SCD Hyper-V Test Environment to include patching, configuration management, and software evaluation.
- Ability to secure operating systems and applications in a STIG environment.
- Ability to work in a mixed-OS environment; working knowledge of Networking and Linux.
- Ability to work in within an accredited DoD closed area.
- Ability to learn and manage security tools such as McAfee ePO, McAfee ENS, ACAS/Nessus, SCAP Compliance Checker, Splunk, STIG Viewer, and other related products.
- Ability to interpret ACAS/Nessus scan results to remediate vulnerabilities.
- Ability to configure and troubleshoot security infrastructure OS, applications, and devices.
- Ability to obtain DoD required certification(s).
- Ability to perform other duties as assigned
- Active Secret Clearance.
- Active participation in professional organizations and development.
- PowerShell scripting.
- Securing Red Hat systems.
- DoD encryption.
- Familiarity with Cisco equipment.
- Excellent oral and written communication skills.
- Excellent customer service skills.
- Excellent troubleshooting and problem solving skills
- 2 years of related experience with a Bachelor's degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field.
- 0 years of related experience with a Masters' degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field
Secure Computing Engineer - San Diego, CA, United States - The Georgia Tech Research Institute
Description
Overview:
The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech).Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry.
GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.Sfederal government, state, and industry
Georgia Tech's Mission and Values:
Georgia Tech's mission is to develop leaders who advance technology and improve the human condition
The Institute has nine key values that are foundational to everything we do:
Location San Diego, CA Project/Unit Description The Secure Computing Engineer will lead projects and people in addressing IT and cyber solutions for the San Diego Field Office; Conducting IT risk analysis and assessments; Interpreting cybersecurity standards and ensuring they are established and maintained for classified IT systems and operations; Ensuring cybersecurity requirements are defined, systems are hardened, systems are analyzed, and test and evaluation of changes are conducted to ensure changes do not impact risk level
Job Purpose The purpose of this job is to architect, design, implement, and maintain classified computer systems/networks and cyber security solutions for classified networks including government enclaves
This includes identifying and defining new cybersecurity objectives and controls as well as developing and maintaining automated security validation toolsets
Conducts system, network or software risk assessments
Performs vulnerability analysis of open source software
Integrates new architectural features into existing infrastructures, create cybersecurity architectural artifacts, provides architectural analysis of cybersecurity features and relates existing system to future needs and trends, leverages advanced forensic tools and techniques for Incident response, provides engineering recommendations, and resolves integration and testing issues
Serve in consultative role, on GTRI systems and projects
Defining cybersecurity controls for different systems and networks
Uses defined threats of what the controls are trying to mitigate or that an analyst in a SOC would monitor for, responding to alerts with the system or networks
Interact, advise, and counsel on a regular basis with internal staff as well as project directors and other internal/external stakeholders
Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, certification and accreditation, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis
Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls
Including but not limited to supporting and maintaining virtual infrastructure, servers, workstations, storage fabrics, heterogeneous operating systems, and networking infrastructure
Maintaining backups and managing disaster recovery and business continuity plans is a core function of this role as well, along with performing routine maintenance, upgrades, and deploying new classified information systems to enhance the capabilities of GTRI
Key Responsibilities
The final job offer will be dependent on candidate qualifications in alignment with Research Faculty Extension Professional ranks as outlined in section 3.2.
1 of the Georgia Tech Faculty HandbookCitizenship Requirements Due to our research contracts with the U.S
federal government, candidates for this position must be U.S
Citizens
Clearance Type Required Candidates must be able to obtain and maintain an active security clearance
Benefits at GTRI Comprehensive information on currently offered GTRI benefits, including Health & Welfare, Retirement Plans, Tuition Reimbursement, Time Off, and Professional Development, can be found through this link: Equal Employment Opportunity The Georgia Institute of Technology (Georgia Tech) is an Equal Employment Opportunity Employer
The University is committed to maintaining a fair and respectful environment for all
To that end, and in accordance with federal and state law, Board of Regents policy, and University policy, Georgia Tech provides equal opportunity to all faculty, staff, students, and all other members of the Georgia Tech community, including applicants for admission and/or employment, contractors, volunteers, and participants in institutional programs, activities, or services
Georgia Tech complies with all applicable laws and regulations governing equal opportunity in the workplace and in educational activities
Georgia Tech prohibits discrimination, including discriminatory harassment, on the basis of race, ethnicity, ancestry, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, national origin, age, disability, genetics, or veteran status in its programs, activities, employment, and admissions
This prohibition applies to faculty, staff, students, and all other members of the Georgia Tech community, including affiliates, invitees, and guests
Further, Georgia Tech prohibits citizenship status, immigration status, and national origin discrimination in hiring, firing, and recruitment, except where such restrictions are required in order to comply with law, regulation, executive order, or Attorney General directive, or where they are required by Federal, State, or local government contract
All members of the USG community must adhere to the USG Statement of Core Values, which consists of Integrity, Excellence, Accountability, and Respect
These values shape and fundamentally support our University's work
Additionally, all faculty, staff, and administrators must also be aware of and comply with the Board of Regents and Georgia Institute of Technology's policies on Freedom of Expression and Academic Freedom
More information on these policies can be found here: Board of Regents Policy Manual | University System of Georgia )
Posted: 12/19/2023 Closes: 05/31/2024 Back