Secure Computing Engineer (Junior/Mid Level) - HAC - Open Rank ( with Security Clearance
Company: The Georgia Tech Research Institute
Location: San Diego
Posted on: May 6, 2024
|
|
Job Description:
Overview: The Georgia Tech Research Institute (GTRI) is the
nonprofit, applied research division of the Georgia Institute of
Technology (Georgia Tech).Founded in 1934 as the Engineering
Experiment Station, GTRI has grown to more than 2,900 employees,
supporting eight laboratories in over 20 locations around the
country and performing more than $940 million of problem-solving
research annually for government and industry.GTRI's renowned
researchers combine science, engineering, economics, policy, and
technical expertise to solve complex problems for the U.Sfederal
government, state, and industryGeorgia Tech's Mission and Values:
Georgia Tech's mission is to develop leaders who advance technology
and improve the human conditionThe Institute has nine key values
that are foundational to everything we do:--- Students are our top
priority.--- We strive for excellence.--- We thrive on
diversity.--- We celebrate collaboration.--- We champion
innovation.--- We safeguard freedom of inquiry and expression.---
We nurture the wellbeing of our community.--- We act ethically.---
We are responsible stewardsOver the next decade, Georgia Tech will
become an example of inclusive innovation, a leading technological
research university of unmatched scale, relentlessly committed to
serving the public good; breaking new ground in addressing the
biggest local, national, and global challenges and opportunities of
our time; making technology broadly accessible; and developing
exceptional, principled leaders from all backgrounds ready to
produce novel ideas and create solutions with real human
impactLocation San Diego, CA Project/Unit Description The Secure
Computing Engineer will lead projects and people in addressing IT
and cyber solutions for the San Diego Field Office; Conducting IT
risk analysis and assessments; Interpreting cybersecurity standards
and ensuring they are established and maintained for classified IT
systems and operations; Ensuring cybersecurity requirements are
defined, systems are hardened, systems are analyzed, and test and
evaluation of changes are conducted to ensure changes do not impact
risk levelJob Purpose The purpose of this job is to architect,
design, implement, and maintain classified computer
systems/networks and cyber security solutions for classified
networks including government enclavesThis includes identifying and
defining new cybersecurity objectives and controls as well as
developing and maintaining automated security validation
toolsetsConducts system, network or software risk
assessmentsPerforms vulnerability analysis of open source
softwareIntegrates new architectural features into existing
infrastructures, create cybersecurity architectural artifacts,
provides architectural analysis of cybersecurity features and
relates existing system to future needs and trends, leverages
advanced forensic tools and techniques for Incident response,
provides engineering recommendations, and resolves integration and
testing issuesServe in consultative role, on GTRI systems and
projectsDefining cybersecurity controls for different systems and
networksUses defined threats of what the controls are trying to
mitigate or that an analyst in a SOC would monitor for, responding
to alerts with the system or networksInteract, advise, and counsel
on a regular basis with internal staff as well as project directors
and other internal/external stakeholdersEnsures cybersecurity needs
established and maintained for operations, security requirements
definition, security risk assessment, information systems analysis,
information systems design, certification and accreditation,
information systems hardening, configuration and maintenance of
other security boundary devices (IDS/IPS, Firewalls, perimeter
routing) and vulnerability scanning, incident response, disaster
recovery, and operations continuity planning and provides
analytical support for security policy development and
analysisEngineers, implements, and maintains Information Technology
Infrastructure and associated cybersecurity controlsIncluding but
not limited to supporting and maintaining virtual infrastructure,
servers, workstations, storage fabrics, heterogeneous operating
systems, and networking infrastructureMaintaining backups and
managing disaster recovery and business continuity plans is a core
function of this role as well, along with performing routine
maintenance, upgrades, and deploying new classified information
systems to enhance the capabilities of GTRIKey Responsibilities---
System Architecture design (compute, hardware/virtual, OS, storage,
networking, security).--- Translate researcher IT needs into robust
and scalable IT Solutions/Infrastructure.--- Contributor to the
development of Continuous Integration and Continuous Development
(CICD) processes using DevOps and DevSecOps principles.--- Cross
Domain Data Exchange and Systems Integration Implementer of
Infrastructure as Code.--- Virtual machine management.--- Deploy
security control configuration to systems using configuration
management toolsRequired Minimum Qualifications--- Proficiency in
Microsoft Windows operating systems and infrastructure technologies
including Active Directory, DHCP, DNS, Group Policy, Hyper-V, WDS,
and WSUS.--- Account Management and working knowledge of LAN and
WAN network environments.--- Maintain and utilize SCD Hyper-V Test
Environment to include patching, configuration management, and
software evaluation.--- Ability to secure operating systems and
applications in a STIG environment.--- Ability to work in a
mixed-OS environment; working knowledge of Networking and Linux.---
Ability to work in within an accredited DoD closed area.--- Ability
to learn and manage security tools such as McAfee ePO, McAfee ENS,
ACAS/Nessus, SCAP Compliance Checker, Splunk, STIG Viewer, and
other related products.--- Ability to interpret ACAS/Nessus scan
results to remediate vulnerabilities.--- Ability to configure and
troubleshoot security infrastructure OS, applications, and
devices.--- Ability to obtain DoD required certification(s).---
Ability to perform other duties as assignedPreferred
Qualifications--- Active Secret Clearance.--- Active participation
in professional organizations and development.--- PowerShell
scripting.--- Securing Red Hat systems.--- DoD encryption.---
Familiarity with Cisco equipment.--- Excellent oral and written
communication skills.--- Excellent customer service skills.---
Excellent troubleshooting and problem solving skillsTravel
Requirements Education and Length of Experience This position
vacancy is an open-rank announcementThe final job offer will be
dependent on candidate qualifications in alignment with Research
Faculty Extension Professional ranks as outlined in section 3.2.1
of the Georgia Tech Faculty Handbook--- 2 years of related
experience with a Bachelor's degree in Information Technology,
Computer Science, Computer Engineering, Cybersecurity, or related
field.--- 0 years of related experience with a Masters' degree in
Information Technology, Computer Science, Computer Engineering,
Cybersecurity, or related fieldU.SCitizenship Requirements Due to
our research contracts with the U.Sfederal government, candidates
for this position must be U.SCitizensClearance Type Required
Candidates must be able to obtain and maintain an active security
clearanceBenefits at GTRI Comprehensive information on currently
offered GTRI benefits, including Health & Welfare, Retirement
Plans, Tuition Reimbursement, Time Off, and Professional
Development, can be found through this link:
https://hr.gatech.edu/benefits Equal Employment Opportunity The
Georgia Institute of Technology (Georgia Tech) is an Equal
Employment Opportunity EmployerThe University is committed to
maintaining a fair and respectful environment for allTo that end,
and in accordance with federal and state law, Board of Regents
policy, and University policy, Georgia Tech provides equal
opportunity to all faculty, staff, students, and all other members
of the Georgia Tech community, including applicants for admission
and/or employment, contractors, volunteers, and participants in
institutional programs, activities, or servicesGeorgia Tech
complies with all applicable laws and regulations governing equal
opportunity in the workplace and in educational activitiesGeorgia
Tech prohibits discrimination, including discriminatory harassment,
on the basis of race, ethnicity, ancestry, color, religion, sex
(including pregnancy), sexual orientation, gender identity, gender
expression, national origin, age, disability, genetics, or veteran
status in its programs, activities, employment, and admissionsThis
prohibition applies to faculty, staff, students, and all other
members of the Georgia Tech community, including affiliates,
invitees, and guestsFurther, Georgia Tech prohibits citizenship
status, immigration status, and national origin discrimination in
hiring, firing, and recruitment, except where such restrictions are
required in order to comply with law, regulation, executive order,
or Attorney General directive, or where they are required by
Federal, State, or local government contractAll members of the USG
community must adhere to the USG Statement of Core Values, which
consists of Integrity, Excellence, Accountability, and RespectThese
values shape and fundamentally support our University's
workAdditionally, all faculty, staff, and administrators must also
be aware of and comply with the Board of Regents and Georgia
Institute of Technology's policies on Freedom of Expression and
Academic FreedomMore information on these policies can be found
here: Board of Regents Policy Manual - University System of Georgia
(usg.edu)Posted: 12/19/2023 Closes: 05/31/2024 Back
Keywords: The Georgia Tech Research Institute, Temecula , Secure Computing Engineer (Junior/Mid Level) - HAC - Open Rank ( with Security Clearance, Engineering , San Diego, California
Click
here to apply!
|