Information Cybersecurity Engineer - GTRI-ICL (Hybrid)

Atlanta, GA

Applications have closed

Overview:

The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.   

Georgia Tech's Mission and Values

Georgia Tech's mission is to develop leaders who advance technology and improve the human condition. The Institute has nine key values that are foundational to everything we do: 

1. Students are our top priority.
2. We strive for excellence.
3. We thrive on diversity.
4. We celebrate collaboration.
5. We champion innovation.
6. We safeguard freedom of inquiry and expression.
7. We nurture the wellbeing of our community.
8. We act ethically.
9. We are responsible stewards.

Over the next decade, Georgia Tech will become an example of inclusive innovation, a leading technological research university of unmatched scale, relentlessly committed to serving the public good; breaking new ground in addressing the biggest local, national, and global challenges and opportunities of our time; making technology broadly accessible; and developing exceptional, principled leaders from all backgrounds ready to produce novel ideas and create solutions with real human impact.

Project/Unit Description

Trusted Interoperable Systems and Architectures Division
Information and Communications Laboratory
Georgia Tech Research Institute

The initial assignment for the candidate chosen will be completing tasks in support of the design, development and operation of a secure cloud-based infrastructure as part of the Medicaid Enterprise System Transformation (MEST) project. MEST is a multi-year project sponsored by the Georgia Department of Community Health with the
goal of developing a modular enterprise system to manage Medicaid in Georgia.

Job Purpose

Requires extensive knowledge of computer operating systems, networks, log analysis and security tools. Applies engineering principles to cybersecurity challenges. Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event coorlation, anomoloy detection, and behavorial analysis. Defining cybersecurity controls for different systems and networks. Creates novel cyber security technology components to ensure that critical systems/information are resilient to cyber exploits and attacks. Performs attendant vulnerability assessments, analysis, and software engineering and design. Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis. Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls. Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.

Key Responsibilities

Helps with the validation security control configuration on systems, ensure all systems are configured to to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements Performs day to day analysis of security threats. Performs day to day remediation of security incidents. Provide leadership to lower-level cybersecurity and IT professionals across the enterprise

Additional Responsibilities

  • Conduct top-down functional analysis and translate business and security requirements into detailed design criteria for protecting sensistive data in cloud-based infrastructures
  • Design and build templates to assist SMEs in providing secure components for the AWS-based enterprise system
  • Serve in consultative role, defining security controls for different platforms based on possible threats to the secure environment
  • Manage security-related incident response procedures
  • Plan, design and enforce security controls using infrastructure as code (Terraform, ServiceNow, JSON, etc.) to protect sensitive information in the AWS enterprise system
  • Prepare technical reports and diagrams detailing product or system attributes
  • Provide subject matter expertise (SME) to internal staff and project sponsors as required
  • Ensure compliance with all government and industry standards and resolve deployment issues in complex environments

Required Minimum Qualifications

  • Experience in the design and deployment of secure architectures, including knowledge and best practices for monitoring different platforms (Unix, Linux, Cloud, etc.).
  • Experience researching, recommending, documenting, and coordinating implementation of changes to policies, procedures, facilities, and systems to enhance security
  • Knowledge of Identity and Access Management concepts
  • Strong communication and interpersonal skills with technical and non-technical audiences
  • Excellent organization skills and an ability to develop and implement plans for transforming issues / requests to completion
  • Demonstrated ability to prioritize and manage competing demands and tasks
  • Ability to think and act independently, taking the initiative to create solutions to solve challenges

Preferred Qualifications

  • Certified Information Systems Security Professional (CISSP)
  • Strong understanding of AWS security services (for example Transit Gateway, VPC, Route Tables)
  • Excellent understanding/working knowledge of the public cloud infrastructure and services in AWS (IAM, VPC, KMS, CloudWatch, Systems Manager, S3, RDS, Route53, Lambda, AWS Config, etc.) is a strong plus.
  • Excellent understanding of docker and container orchestration with kubernetes and experience running production kubernetes clusters in Amazon EKS

Travel Requirements

<10% travel

Education and Length of Experience

This position vacancy is an open-rank announcement. The final job offer will be dependent on candidate qualifications in alignment with Research Faculty Extension Professional ranks as outlined in section 3.2.1 of the Georgia Tech Faculty Handbook

  • 2 years of related experience with a Bachelor’s degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields
  • 0 years of related experience with a Masters’ degree in Cybersecurity, computer science, data analytics, information technology, or closely related fields

U.S. Citizenship Requirements

Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.

Clearance Type Required

Candidates must be able to obtain and maintain an active security clearance.

Benefits at GTRI

Comprehensive information on currently offered GTRI benefits, including Health & Welfare, Retirement Plans, Tuition Reimbursement, Time Off, and Professional Development, can be found through this link: https://benefits.hr.gatech.edu/.

Equal Employment Opportunity

The Georgia Institute of Technology (Georgia Tech) is an Equal Employment Opportunity Employer. The University is committed to maintaining a fair and respectful environment for all. To that end, and in accordance with federal and state law, Board of Regents policy, and University policy, Georgia Tech provides equal opportunity to all faculty, staff, students, and all other members of the Georgia Tech community, including applicants for admission and/or employment, contractors, volunteers, and participants in institutional programs, activities, or services.  Georgia Tech complies with all applicable laws and regulations governing equal opportunity in the workplace and in educational activities.

Georgia Tech prohibits discrimination, including discriminatory harassment, on the basis of race, ethnicity, ancestry, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, national origin, age, disability, genetics, or veteran status in its programs, activities, employment, and admissions.  This prohibition applies to faculty, staff, students, and all other members of the Georgia Tech community, including affiliates, invitees, and guests. Further, Georgia Tech prohibits citizenship status, immigration status, and national origin discrimination in hiring, firing, and recruitment, except where such restrictions are required in order to comply with law, regulation, executive order, or Attorney General directive, or where they are required by Federal, State, or local government contract.

USG Core Values Statement

The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at https://www.usg.edu/policymanual/section8/C224/#p8.2.18_personnel_conduct.

Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at https://www.usg.edu/policymanual/section6/C2653.

 


* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: Analytics Audits AWS CISSP Clearance Cloud CMMC Compliance Computer Science Data Analytics DFARS Docker Exploits Firewalls IAM IDS Incident response IPS JSON Kubernetes Lambda Linux Log analysis Monitoring NIST Nonprofit Risk assessment S3 Security Clearance Terraform UNIX

Perks/benefits: Career development Health care

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.