Secure Computing Engineer (Level 2,3) - HAC - Open Rank at Georgia Tech Research Institute
Huntsville, Alabama, USA -
Full Time


Start Date

Immediate

Expiry Date

09 Nov, 25

Salary

0.0

Posted On

10 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Defense, Security Tools, Customer Service Skills, Linux, Operating Systems, Federal Government, Computer Engineering, Puppet, Selinux, Software, Information Systems, Infrastructure Technologies, Kubernetes, Microsoft Operating Systems, Information Technology, Hardening

Industry

Information Technology/IT

Description

PROJECT/UNIT DESCRIPTION

The Secure Computing Engineer will assist and support the SCD management team. Responsibilities will include managing small projects, designing and implementing architectural solutions, and configuring systems. Additionally, the engineer will create documentation and evaluate hardware and software used to secure classified hardware, data, and networks.

REQUIRED MINIMUM QUALIFICATIONS

  • Ability to work in a mixed-OS environment with knowledge of networking and Linux.
  • Proficient with Linux operating systems and infrastructure technologies.
  • Experienced with Open Source Software acquisition and security practices.
  • Experienced with Linux security practices, including SELinux and system hardening.
  • Knowledgeable of LAN and WAN network environments.
  • Working knowledge of TCP/IP, Layer 2 and 3 protocols.
  • Proficient with Docker, Kubernetes, and virtualization platforms.
  • Proficient with configuration management tools like Ansible, Puppet, or Chef.
  • Strong troubleshooting and problem-solving capabilities.
  • Interpret ACAS/Nessus scan results to remediate vulnerabilities.
  • Ability to configure operating systems and applications in a STIG environment.
  • Configure and troubleshoot security infrastructure OS, applications, and devices.
  • Ability to learn and manage security tools such as Trellix ePO, Trellix ENS, ACAS/Nessus, SCAP Compliance Checker, Splunk, STIG Viewer, and related products.
  • Strong oral and written communication abilities.
  • Excellent customer service skills.
  • Ability to work within an accredited DoD closed area.
  • Ability to work independently and demonstrate initiative.
  • Ability to obtain DoD required certifications.
  • Willingness to pursue professional learning or a Master’s degree.
  • Perform other duties as assigned.

PREFERRED QUALIFICATIONS

  • Active Secret Clearance
  • Active participation in professional organizations and ongoing development activities.
  • Proficiency in Linux scripting.
  • Experience in securing Red Hat Enterprise Linux systems.
  • Knowledge of Department of Defense encryption standards.
  • Familiarity with configuring and securing Cisco network equipment.
  • Familiarity with Microsoft operating systems and software.

TRAVEL REQUIREMENTS

<10% travel

U.S. CITIZENSHIP REQUIREMENTS

Due to our research contracts with the U.S. federal government, candidates for this position must be U.S. Citizens.

Responsibilities

JOB PURPOSE

The purpose of this job is to architect, design, implement, and maintain classified computer systems/networks and cyber security solutions for classified networks including government enclaves. This includes identifying and defining new cybersecurity objectives and controls as well as developing and maintaining automated security validation toolsets. Conducts system, network or software risk assessments. Performs vulnerability analysis of open source software.
Integrates new architectural features into existing infrastructures, create cybersecurity architectural artifacts, provides architectural analysis of cybersecurity features and relates existing system to future needs and trends, leverages advanced forensic tools and techniques for Incident response, provides engineering recommendations, and resolves integration and testing issues.
Serve in consultative role, on GTRI systems and projects. Defining cybersecurity controls for different systems and networks. Uses defined threats of what the controls are trying to mitigate or that an analyst in a SOC would monitor for, responding to alerts with the system or networks. Interact, advise, and counsel on a regular basis with internal staff as well as project directors and other internal/external stakeholders.
Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, certification and accreditation, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis.
Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls. Including but not limited to supporting and maintaining virtual infrastructure, servers, workstations, storage fabrics, heterogeneous operating systems, and networking infrastructure. Maintaining backups and managing disaster recovery and business continuity plans is a core function of this role as well, along with performing routine maintenance, upgrades, and deploying new classified information systems to enhance the capabilities of GTRI.

KEY RESPONSIBILITIES

  • System Architecture design (compute, hardware/virtual, OS, storage, networking, security).
  • Translate researcher IT needs into robust and scalable IT Solutions/Infrastructure.
  • Contributor to the development of Continuous Integration and Continuous Development (CICD) processes using DevOps and DevSecOps principles.
  • Cross Domain Data Exchange and Systems Integration Implementer of Infrastructure as Code.
  • Virtual machine management.
  • Deploy security control configuration to systems using configuration management tools.
Loading...