Visit www.acad.jobs with all Jobs for Academics!
                
Position: Associate Cyber Security Engineer
Institution: Carnegie Mellon University
Location: Pittsburgh, Pennsylvania, United States
Duties: The candidate will work with other team members in developing cyber-security training, exercises, scenarios, and simulations. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building the supporting systems and networks. As such, the candidate will work regularly with a wide range of software and hardware technologies, be involved software and hardware prototype development, and may also assist in the creation and delivery of cybersecurity courses
Requirements: BS in Computer Science, Information Science, or related discipline with three (3) years applicable working experience; MS in the same fields with one (1) year of experience or equivalent combination of training or experience; You will have experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems; Scripting (e.g. PowerShell, Bash, etc.); Configuration management and deployment automation (e.g. Ansible, Puppet, Chef, Packer, etc.); Virtualization and cloud technologies (e.g. VMWare ESX server, Linux KVM/QEMU, Xen, Microsoft Azure, Amazon AWS, etc.)
   
Text: Skip navigation and jump directly to page contentCareers@CarnegieMellonWhy Carnegie Mellon?Benefits at a GlanceDiversity and InclusionWork/LifeLiving in PittsburghDual CareersProspective Employee DisclosuresNeed Assistance?Frequently Asked QuestionsHuman ResourcesJob PostingsNeed Assistance?Go to the main content section.|My Account Options|Sign InThis service is set to disconnect automatically after {0} minutes of inactivity. Your session will end in {1} minutes.Click OK to reset the timer to {0} minutes.You have been signed out.This service is set to sign out after {0} minutes of inactivity.Job SearchMy JobpageBasic Search|My Submissions|My Job Cart|My Saved Searches|Beginning of the main content section.Return to the home pagePrintable FormatReturn to previous position on page -Description: Qualifications: : Job Function: Primary Location: : Public Referral Bonus: : : Refer a friend for this jobRefer a friendRefer a candidateSubmit a candidate's profile ('requisitionDescriptionInterface', 'descRequisition', ['104902','true','104902','false','Submission for the position: Associate Cyber Security Engineer - (Job Number: 2015368)','false','104902','false','true','https://cmu.taleo.net/careersection/jobdetail.ftl?job=2015368%26lang=en','Associate Cyber Security Engineer','true','Associate Cyber Security Engineer','2015368','%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EWhat We Do%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe SEI helps advance software engineering principles and practices and serves as a national resource in software engineering and computer security. The SEI works closely with academia, defense and government organizations, and industry to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software that is defect free, within budget and on time, every time.%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EAre you creative, curious, energetic, collaborative, technology-focused, and hard-working? Are you familiar with end-to-end software development activities and full-stack engineering? Apply to join our team.%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EAbout The Team%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe CERT Cyber Workforce Development (CWD) team aims to lower the cost and time required to build cybersecurity expertise and to amplify that expertise to a globally distributed workforce. To achieve this, we develop and integrate innovative tools and processes to train, exercise, and assess cybersecurity professionals and teams. In doing so, CWD pioneers research and development efforts designed to counter cybersecurity threats to our nation.%3C/font%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cfont size=%222%22%3ECWD’s core strength is our encouraging and highly collaborative culture. Our team recognizes the importance of our mission: to ensure that our nation’s cybersecurity workforce is the best in the world. We are looking for people of character who share our passion, love technology and teamwork, and who have a desire to teach, learn from, and collaborate with others. We provide numerous internal and external training and professional development opportunities for members of our team. We also learn from each other through cross-training and mentoring. %3C/font%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cb%3E%3Cfont size=%222%22%3EPosition Summary%3C/font%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cb%3E%3C/b%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe candidate will work with other team members in developing cyber-security training, exercises, scenarios, and simulations. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building the supporting systems and networks. As such, the candidate will work regularly with a wide range of software and hardware technologies, be involved software and hardware prototype development, and may also assist in the creation and delivery of cybersecurity courses. %3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe position requires the candidate to have effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3ERequirements:%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EBS in Computer Science, Information Science, or related discipline with three (3) years applicable working experience; MS in the same fields with one (1) year of experience or equivalent combination of training or experience.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EWillingness to travel to various locations in support of the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (15%)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ECandidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EKnowledge, Skills, and Abilities%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EYou will have experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. %3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EScripting (e.g. PowerShell, Bash, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EConfiguration management and deployment automation (e.g. Ansible, Puppet, Chef, Packer, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EVirtualization and cloud technologies (e.g. VMWare ESX server, Linux KVM/QEMU, Xen, Microsoft Azure, Amazon AWS, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ENetwork administration (e.g. routers, switches, firewalls, proxies, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EProgramming (e.g. C, C++, C#, Python, Java, etc.)%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EDesired Experience:%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ECISSP, Network+, Security+ and/or other industry standard certifications.%26nbsp;%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EUS military service in a series of positions involving information technology, cyber security, and management of large-scale government networks.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EStrong presentation/platform skills and excellent writing skills.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ETeam leadership positions within cybersecurity and/or IT-focused organizations.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ETeaching experience, along with course and curriculum development%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3Cb%3E%3C/b%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%26nbsp;%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EMore Information%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cb%3E%3C/b%3E%3Cbr%3E%3Cfont size=%222%22%3EPlease visit %3C/font%3E%3Ca href=%22http://“Why Carnegie Mellon”%22%3E%3Cfont size=%222%22%3E“Why Carnegie Mellon”%3C/font%3E%3C/a%3E%3Cfont size=%222%22%3E to learn more about becoming part of an institution inspiring innovations that change the world.%3Cbr%3EA listing of employee benefits is available at: %3C/font%3E%3Ca href=%22http://www.cmu.edu/jobs/benefits-at-a-glance/%22%3E%3Cfont size=%222%22%3Ewww.cmu.edu/jobs/benefits-at-a-glance/%3C/font%3E%3C/a%3E%3Cfont size=%222%22%3E.%3Cbr%3E%3Cb%3ECarnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.%3C/b%3E%3Cbr%3E%3Cbr%3E%3C/font%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3C/font%3E','%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EWhat We Do%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe SEI helps advance software engineering principles and practices and serves as a national resource in software engineering and computer security. The SEI works closely with academia, defense and government organizations, and industry to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software that is defect free, within budget and on time, every time.%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EAre you creative, curious, energetic, collaborative, technology-focused, and hard-working? Are you familiar with end-to-end software development activities and full-stack engineering? Apply to join our team.%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EAbout The Team%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe CERT Cyber Workforce Development (CWD) team aims to lower the cost and time required to build cybersecurity expertise and to amplify that expertise to a globally distributed workforce. To achieve this, we develop and integrate innovative tools and processes to train, exercise, and assess cybersecurity professionals and teams. In doing so, CWD pioneers research and development efforts designed to counter cybersecurity threats to our nation.%3C/font%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cfont size=%222%22%3ECWD’s core strength is our encouraging and highly collaborative culture. Our team recognizes the importance of our mission: to ensure that our nation’s cybersecurity workforce is the best in the world. We are looking for people of character who share our passion, love technology and teamwork, and who have a desire to teach, learn from, and collaborate with others. We provide numerous internal and external training and professional development opportunities for members of our team. We also learn from each other through cross-training and mentoring. %3C/font%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22%3E%3Cbr%3E%3Cb%3E%3Cfont size=%222%22%3EPosition Summary%3C/font%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cb%3E%3C/b%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe candidate will work with other team members in developing cyber-security training, exercises, scenarios, and simulations. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building the supporting systems and networks. As such, the candidate will work regularly with a wide range of software and hardware technologies, be involved software and hardware prototype development, and may also assist in the creation and delivery of cybersecurity courses. %3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cbr%3E%3Cfont size=%222%22%3EThe position requires the candidate to have effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3ERequirements:%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EBS in Computer Science, Information Science, or related discipline with three (3) years applicable working experience; MS in the same fields with one (1) year of experience or equivalent combination of training or experience.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EWillingness to travel to various locations in support of the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (15%)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ECandidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EKnowledge, Skills, and Abilities%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EYou will have experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. %3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EScripting (e.g. PowerShell, Bash, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EConfiguration management and deployment automation (e.g. Ansible, Puppet, Chef, Packer, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EVirtualization and cloud technologies (e.g. VMWare ESX server, Linux KVM/QEMU, Xen, Microsoft Azure, Amazon AWS, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ENetwork administration (e.g. routers, switches, firewalls, proxies, etc.)%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EProgramming (e.g. C, C++, C#, Python, Java, etc.)%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%26nbsp;%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EDesired Experience:%3C/b%3E%3C/font%3E%3C/p%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cfont face=%22Arial%22%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3E%3C/font%3E%3C/p%3E%3Cul%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ECISSP, Network+, Security+ and/or other industry standard certifications.%26nbsp;%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EUS military service in a series of positions involving information technology, cyber security, and management of large-scale government networks.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3EStrong presentation/platform skills and excellent writing skills.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ETeam leadership positions within cybersecurity and/or IT-focused organizations.%3C/font%3E%3C/div%3E%3C/li%3E%3Cli%3E%3Cdiv style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont size=%222%22%3ETeaching experience, along with course and curriculum development%3Cbr%3E%3C/font%3E%3C/div%3E%3C/li%3E%3C/ul%3E%3Cb%3E%3C/b%3E%3C/font%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%26nbsp;%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3E%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%222%22%3E%3Cb%3EMore Information%3C/b%3E%3C/font%3E%3C/p%3E%3Cp style=%22margin-top: 0px; margin-bottom: 0px;%22%3E%3Cfont face=%22Arial%22 size=%223%22%3E%3Cb%3E%3C/b%3E%3Cbr%3E%3Cfont size=%222%22%3EPlease visit %3C/font%3E%3Ca href=%22http://“Why Carnegie Mellon”%22%3E%3Cfont size=%222%22%3E“Why Carnegie Mellon”%3C/font%3E%3C/a%3E%3Cfont size=%222%22%3E to learn more about becoming part of an institution inspiring innovations that change the world.%3Cbr%3EA listing of employee benefits is available at: %3C/font%3E%3Ca href=%22http://www.cmu.edu/jobs/benefits-at-a-glance/%22%3E%3Cfont size=%222%22%3Ewww.cmu.edu/jobs/benefits-at-a-glance/%3C/font%3E%3C/a%3E%3Cfont size=%222%22%3E.%3Cbr%3E%3Cb%3ECarnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.%3C/b%3E%3Cbr%3E%3Cbr%3E%3C/font%3E%3Cbr%3E%3C/font%3E%3C/p%3E%3C/font%3E%3C/font%3E','','','','','Cyber Security','Cyber Security','United States-Pennsylvania-Pittsburgh','United States-Pennsylvania-Pittsburgh','Full Time','Full Time','','','false','None Specified','None Specified','','','false','104902','104902','true','104902','false','Submission for the position: Associate Cyber Security Engineer - (Job Number: 2015368)','false','104902','false','true','https://cmu.taleo.net/careersection/jobdetail.ftl?job=2015368%26lang=en','Associate Cyber Security Engineer','true']); Human Resources - CareersWhitfield Hall, 143 North Craig Street, Pittsburgh, PA 15213(412) 268-3386 Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran Human ResourcesCarnegie Mellon Home
Please click here, if the Job didn't load correctly.







Please wait. You are being redirected to the Job in 3 seconds.