Information Cybersecurity Engineer (Mid to Senior Level) - ICD - Open Rank at Georgia Tech Research Institute
Atlanta, GA 30332, USA -
Full Time


Start Date

Immediate

Expiry Date

09 Nov, 25

Salary

0.0

Posted On

09 Aug, 25

Experience

4 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Federal Government, Malware Analysis, Security Tools, Operating Systems, Python, Communication Skills, Volatility, Correlation, Siem, Mastery, Gcia, Log Analysis, Digital Forensics, Information Security, Edr, Computer Science

Industry

Information Technology/IT

Description

PROJECT/UNIT DESCRIPTION

The Information and Cybersecurity Department (ICD) provides enterprise cybersecurity services in protection of GTRI’s unclassified information assets (data, systems, and networks). ICD consists of two components: The Governance, Risk, and Compliance (GRC) Team and the Information Security Operations Center (ISOC). The GRC Team provides services in cybersecurity policy, risk management, data governance, privacy, awareness and training, and ensuring compliance with Federal, state, and local cybersecurity requirements. The ISOC provides technical cybersecurity expertise via services in continuous monitoring, incident response, and vulnerability management.
ICD’s mission is to safeguard the integrity, confidentiality, and availability of GTRI’s data and information systems. We are committed to building a resilient security culture that empowers our teams to innovate while proactively mitigating risk. Through strategic leadership, continuous education, and collaboration with stakeholders.

REQUIRED MINIMUM QUALIFICATIONS

  • Candidates currently enrolled in an accredited degree program relevant to this position will be considered. The candidate must have a graduation date of no later than December 2025.
  • Extensive knowledge of current and emerging threats, attacker TTPs, and malware analysis.
  • Ability to analyze large datasets, identify patterns, and draw meaningful conclusions.
  • Expertise in using security tools (SIEM, EDR, network analysis), scripting languages (Python, PowerShell), and operating systems.
  • Understanding of threat intelligence platforms and OSINT techniques.
  • Strong communication skills and ability to work effectively with other teams.
  • Ability to obtain a secret security clearance.
  • One or more intermediate cybersecurity certifications such as: Certified Ethical Hacker (CEH), PenTest+, GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH) or equivalent.

PREFERRED QUALIFICATIONS

  • Active Secret Clearance.
  • Master’s degree in a related field.
  • 6 years of experience in Splunk/SIEM administration.
  • Mastery of SIEM platforms (e.g., Splunk, Elastic Security) for advanced log analysis and correlation.
  • Extensive experience with EDR solutions (e.g., CrowdStrike Falcon, SentinelOne) for endpoint threat detection and response.
  • Proficiency in network traffic analysis tools (e.g., Wireshark, Zeek) for identifying malicious network activity.
  • Experience with forensic tools (e.g., Autopsy, Volatility) for in-depth investigations.

TRAVEL REQUIREMENTS

<10% travel

U.S. CITIZENSHIP REQUIREMENTS

Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.

Responsibilities

JOB PURPOSE

Requires extensive knowledge of computer operating systems, networks, log analysis and security tools.
Applies engineering principles to cybersecurity challenges.
Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioral analysis.
Defining cybersecurity controls for different systems and networks.
Creates novel cyber security technology components to ensure that critical systems/information are resilient to cyber exploits and attacks.
Performs attendant vulnerability assessments, analysis, and software engineering and design.
Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis.
Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls.
Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.

KEY RESPONSIBILITIES

  • Assist with information technology risk assessments for systems, software, or configurations.
  • Helps with the validation security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements.
  • Actively collaborates with customers and external teams, derives tasks from detailed requirements.
  • Design and interpret security requirements and practices to meet enterprise accreditation goals.
  • Provide leadership to lower-level cybersecurity and IT professionals across the enterprise.
  • Approve modification to critical information systems and directs implementation of configuration changes.

ADDITIONAL RESPONSIBILITIES

  • Conducting in-depth, proactive searches across GTRI’s networks and systems to uncover hidden or advanced threats that have evaded traditional security measures.
  • Developing and refining threat hunting methodologies, playbooks, and hypotheses based on threat intelligence and observed patterns.
  • Analyzing large datasets from various security tools (SIEM, EDR, network traffic analysis) to identify anomalies and indicators of compromise (IOCs).
  • Leveraging threat intelligence platforms and open-source intelligence (OSINT) to stay abreast of emerging threats and attacker tactics, techniques, and procedures (TTPs).
  • Performing deep-dive analysis of suspicious activities, potentially involving malware analysis, reverse engineering, and forensic investigations.
  • Evaluating and recommending new security technologies to enhance threat hunting capabilities.
  • Collaborating with incident response, security engineering, and other security teams to share findings and improve overall security posture.
  • Communicating complex technical findings to both technical and non-technical audiences in a clear and concise manner.
  • Mentoring and training junior threat hunters.
Loading...