Submit Resume ID: 500021
Type: Researchers
Location: Atlanta, GA
Categories: System Architecture, Cybersecurity, Information Technology, System Engineering
Overview
The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.
Project/Unit Description
This position is for a Secure Computing Engineer in the ELSYS Information Technology (IT) department under our Secure Computing Team (SCT). This department and team provides critical IT infrastructure for both operations and sponsored research. The ELSYS IT department designs, builds, and maintains secure systems used to conduct sponsored research.
Job Purpose
The purpose of this job is to architect, design, implement, and maintain classified computer systems/networks and cybersecurity solutions for classified networks including government enclaves. This includes identifying and defining new cybersecurity objectives and controls as well as developing and maintaining automated security validation toolsets. Conducts system, network or software risk assessments. Performs vulnerability analysis of open source software. Integrates new architectural features into existing infrastructures, creates cybersecurity architectural artifacts, provides architectural analysis of cybersecurity features and relates existing systems to future needs and trends, leverages advanced forensic tools and techniques for incident response, provides engineering recommendations, and resolves integration and testing issues. Serve in a consultative role on GTRI systems and projects. Defining cybersecurity controls for different systems and networks. Uses defined threats of what the controls are trying to mitigate or that an analyst in a SOC would monitor for, responding to alerts with the system or networks. Interact, advise, and counsel on a regular basis with internal staff as well as project directors and other internal/external stakeholders. Ensures cybersecurity needs are established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, certification and accreditation, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis. Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls, including but not limited to supporting and maintaining virtual infrastructure, servers, workstations, storage fabrics, heterogeneous operating systems, and networking infrastructure. Maintaining backups and managing disaster recovery and business continuity plans is a core function of this role as well, along with performing routine maintenance, upgrades, and deploying new classified information systems to enhance the capabilities of GTRI.
Key Responsibilities
- Translate researcher IT needs into robust and scalable IT Solutions/Infrastructure
- Contribute to the development of Continuous Integration and Continuous Development (CICD) processes using DevOps and DevSecOps principles
- Cross Domain Data Exchange and Systems Integration Implementer of Infrastructure as Code
- Virtual machine management
- Deploy security control configuration to systems using configuration management tools
Required Minimum Qualifications
- Knowledge of TCP/IP, IP configuration, peer-to-peer networking, and IP addressing and subnetting
- Experience with configuring and troubleshooting computer networks
- Experience with Microsoft Active Directory (AD), Microsoft Group Policy Objects (GPOs), Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP)
- Knowledge related to virtual system administration and configuration
Education and Length of Experience
Levels 1, 2, 3
- 0 years of related experience with a Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, Software Engineering, Computer Information Systems, Information Technology, Computer Engineering, or related field
Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.
Clearance Type Required
Candidates must be able to obtain and maintain an active security clearance.
#J-18808-LjbffrSimilar Jobs
- View Job
Secure Computing Engineer - ELSYS - On Site - (Open Rank)
Atlanta - View Job
Secure Computing Engineer - ELSYS - On Site - (Open Rank)
Atlanta - View Job
Systems Engineer - ELSYS - Hybrid - (Open Rank)
Atlanta - View Job
Secure Computing Engineer (Mid Level) - HAC - Open Rank (Onsite)
Atlanta - View Job
Secure Computing Engineer - Open Rank (Entry-Junior Level)-ACL-Onsite
Atlanta