Georgia Tech Research Institute
Information Cybersecurity Engineer - GTRI-ICL (Hybrid)
Georgia Tech Research Institute, Greendale, Wisconsin, United States, 53129
Information Cybersecurity Engineer - GTRI-ICL (Hybrid)
The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.Project/Unit Description
Trusted Interoperable Systems and Architectures DivisionInformation and Communications LaboratoryGeorgia Tech Research Institute
The initial assignment for the candidate chosen will be completing tasks in support of the design, development and operation of a secure cloud-based infrastructure as part of the Medicaid Enterprise System Transformation (MEST) project. MEST is a multi-year project sponsored by the Georgia Department of Community Health with the goal of developing a modular enterprise system to manage Medicaid in Georgia.Job Purpose
Requires extensive knowledge of computer operating systems, networks, log analysis and security tools. Applies engineering principles to cybersecurity challenges. Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioral analysis. Defining cybersecurity controls for different systems and networks. Creates novel cybersecurity technology components to ensure that critical systems/information are resilient to cyber exploits and attacks. Performs attendant vulnerability assessments, analysis, and software engineering and design. Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis. Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls. Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.Key Responsibilities
Helps with the validation security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements. Performs day to day analysis of security threats. Performs day to day remediation of security incidents. Provide leadership to lower-level cybersecurity and IT professionals across the enterprise.Additional Responsibilities
Conduct top-down functional analysis and translate business and security requirements into detailed design criteria for protecting sensitive data in cloud-based infrastructures.Design and build templates to assist SMEs in providing secure components for the AWS-based enterprise system.Serve in consultative role, defining security controls for different platforms based on possible threats to the secure environment.Manage security-related incident response procedures.Plan, design and enforce security controls using infrastructure as code (Terraform, ServiceNow, JSON, etc.) to protect sensitive information in the AWS enterprise system.Prepare technical reports and diagrams detailing product or system attributes.Provide subject matter expertise (SME) to internal staff and project sponsors as required.Ensure compliance with all government and industry standards and resolve deployment issues in complex environments.Required Minimum Qualifications
Experience in the design and deployment of secure architectures, including knowledge and best practices for monitoring different platforms (Unix, Linux, Cloud, etc.).Experience researching, recommending, documenting, and coordinating implementation of changes to policies, procedures, facilities, and systems to enhance security.Knowledge of Identity and Access Management concepts.Strong communication and interpersonal skills with technical and non-technical audiences.Excellent organization skills and an ability to develop and implement plans for transforming issues/requests to completion.Demonstrated ability to prioritize and manage competing demands and tasks.Ability to think and act independently, taking the initiative to create solutions to solve challenges.Preferred Qualifications
Certified Information Systems Security Professional (CISSP).Strong understanding of AWS security services (for example Transit Gateway, VPC, Route Tables).Excellent understanding/working knowledge of the public cloud infrastructure and services in AWS (IAM, VPC, KMS, CloudWatch, Systems Manager, S3, RDS, Route53, Lambda, AWS Config, etc.) is a strong plus.Excellent understanding of docker and container orchestration with Kubernetes and experience running production Kubernetes clusters in Amazon EKS.Travel Requirements
Education and Length of Experience
This position vacancy is an open-rank announcement. The final job offer will be dependent on candidate qualifications in alignment with Research Faculty Extension Professional ranks as outlined in section 3.2.1 of the Georgia Tech Faculty Handbook.2 years of related experience with a Bachelor’s degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields.0 years of related experience with a Master’s degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields.Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.Clearance Type Required
Candidates must be able to obtain and maintain an active security clearance.Benefits at GTRI
Comprehensive information on currently offered GTRI benefits, including Health & Welfare, Retirement Plans, Tuition Reimbursement, Time Off, and Professional Development, can be found through this link:
https://benefits.hr.gatech.edu/.
#J-18808-Ljbffr
The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.Project/Unit Description
Trusted Interoperable Systems and Architectures DivisionInformation and Communications LaboratoryGeorgia Tech Research Institute
The initial assignment for the candidate chosen will be completing tasks in support of the design, development and operation of a secure cloud-based infrastructure as part of the Medicaid Enterprise System Transformation (MEST) project. MEST is a multi-year project sponsored by the Georgia Department of Community Health with the goal of developing a modular enterprise system to manage Medicaid in Georgia.Job Purpose
Requires extensive knowledge of computer operating systems, networks, log analysis and security tools. Applies engineering principles to cybersecurity challenges. Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioral analysis. Defining cybersecurity controls for different systems and networks. Creates novel cybersecurity technology components to ensure that critical systems/information are resilient to cyber exploits and attacks. Performs attendant vulnerability assessments, analysis, and software engineering and design. Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis. Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls. Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.Key Responsibilities
Helps with the validation security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements. Performs day to day analysis of security threats. Performs day to day remediation of security incidents. Provide leadership to lower-level cybersecurity and IT professionals across the enterprise.Additional Responsibilities
Conduct top-down functional analysis and translate business and security requirements into detailed design criteria for protecting sensitive data in cloud-based infrastructures.Design and build templates to assist SMEs in providing secure components for the AWS-based enterprise system.Serve in consultative role, defining security controls for different platforms based on possible threats to the secure environment.Manage security-related incident response procedures.Plan, design and enforce security controls using infrastructure as code (Terraform, ServiceNow, JSON, etc.) to protect sensitive information in the AWS enterprise system.Prepare technical reports and diagrams detailing product or system attributes.Provide subject matter expertise (SME) to internal staff and project sponsors as required.Ensure compliance with all government and industry standards and resolve deployment issues in complex environments.Required Minimum Qualifications
Experience in the design and deployment of secure architectures, including knowledge and best practices for monitoring different platforms (Unix, Linux, Cloud, etc.).Experience researching, recommending, documenting, and coordinating implementation of changes to policies, procedures, facilities, and systems to enhance security.Knowledge of Identity and Access Management concepts.Strong communication and interpersonal skills with technical and non-technical audiences.Excellent organization skills and an ability to develop and implement plans for transforming issues/requests to completion.Demonstrated ability to prioritize and manage competing demands and tasks.Ability to think and act independently, taking the initiative to create solutions to solve challenges.Preferred Qualifications
Certified Information Systems Security Professional (CISSP).Strong understanding of AWS security services (for example Transit Gateway, VPC, Route Tables).Excellent understanding/working knowledge of the public cloud infrastructure and services in AWS (IAM, VPC, KMS, CloudWatch, Systems Manager, S3, RDS, Route53, Lambda, AWS Config, etc.) is a strong plus.Excellent understanding of docker and container orchestration with Kubernetes and experience running production Kubernetes clusters in Amazon EKS.Travel Requirements
Education and Length of Experience
This position vacancy is an open-rank announcement. The final job offer will be dependent on candidate qualifications in alignment with Research Faculty Extension Professional ranks as outlined in section 3.2.1 of the Georgia Tech Faculty Handbook.2 years of related experience with a Bachelor’s degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields.0 years of related experience with a Master’s degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields.Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.Clearance Type Required
Candidates must be able to obtain and maintain an active security clearance.Benefits at GTRI
Comprehensive information on currently offered GTRI benefits, including Health & Welfare, Retirement Plans, Tuition Reimbursement, Time Off, and Professional Development, can be found through this link:
https://benefits.hr.gatech.edu/.
#J-18808-Ljbffr