Start Date
Immediate
Expiry Date
09 Nov, 25
Salary
0.0
Posted On
09 Aug, 25
Experience
4 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Federal Government, Malware Analysis, Security Tools, Operating Systems, Python, Communication Skills, Volatility, Correlation, Siem, Mastery, Gcia, Log Analysis, Digital Forensics, Information Security, Edr, Computer Science
Industry
Information Technology/IT
PROJECT/UNIT DESCRIPTION
The Information and Cybersecurity Department (ICD) provides enterprise cybersecurity services in protection of GTRI’s unclassified information assets (data, systems, and networks). ICD consists of two components: The Governance, Risk, and Compliance (GRC) Team and the Information Security Operations Center (ISOC). The GRC Team provides services in cybersecurity policy, risk management, data governance, privacy, awareness and training, and ensuring compliance with Federal, state, and local cybersecurity requirements. The ISOC provides technical cybersecurity expertise via services in continuous monitoring, incident response, and vulnerability management.
ICD’s mission is to safeguard the integrity, confidentiality, and availability of GTRI’s data and information systems. We are committed to building a resilient security culture that empowers our teams to innovate while proactively mitigating risk. Through strategic leadership, continuous education, and collaboration with stakeholders.
REQUIRED MINIMUM QUALIFICATIONS
PREFERRED QUALIFICATIONS
TRAVEL REQUIREMENTS
<10% travel
U.S. CITIZENSHIP REQUIREMENTS
Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.
JOB PURPOSE
Requires extensive knowledge of computer operating systems, networks, log analysis and security tools.
Applies engineering principles to cybersecurity challenges.
Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioral analysis.
Defining cybersecurity controls for different systems and networks.
Creates novel cyber security technology components to ensure that critical systems/information are resilient to cyber exploits and attacks.
Performs attendant vulnerability assessments, analysis, and software engineering and design.
Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis.
Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls.
Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.
KEY RESPONSIBILITIES
ADDITIONAL RESPONSIBILITIES