Job Description
Key Functions and Expected Performance:• Executes modeling and analysis of discipline-specific engineering problems.
• Assist with cloud development, deployment and integration of developed AI applications.
• Constructs the development and maintenance of discipline-specific software systems and/or engineering tools to support project and research goals.
• Executes engineering and/or software design, implementation, analysis, maintenance, or experimentation as directed by Principal Investigator and lead Engineers.
• Delivers technical documentation for work products of project.
• Research and maintain familiarity with and expertise in emerging technologies and techniques related to project and research goals.
• Communicate regularly, effectively, and professionally with Principal Investigator, System Architect, and research team.
• Ensures adherence to existing technical standards and recommend or develop new standards, as applicable.
• Provide data to assist in evaluation of project research direction and progress, providing input on solutions as necessary.
• Deliver technical progress reports/presentations in written and/or oral form to project research staff and faculty.
• Share research knowledge, product, and processes with Principal Investigator, System Architect, and research team.
Supervisory Relationships:
This position does not have supervisory responsibility; this position reports administratively and functionally to the Principal Investigator.
Education and Certifications:
• A Bachelor’s degree is necessary, preferably in computer science or engineering.
• Certification or 5+ years of experience in the area of cyber security AND cyber vulnerability management is required.
Experience and Skills:
The successful candidate will have following skills:
• Knowledge of medical devices and hospital information technology and cybersecurity is preferred.
• Experience with vulnerability assessment and mitigation using information security tools and dashboards for data visualization and incident alert reporting is necessary.
• Experience with Penetration testing and state-of-the-art security tools such as Metasploit, Splunk is preferred.
• Competency in computer networking, networking equipment, and network protocols.
• Experience with designing and setting up custom cloud computing infrastructure is necessary. This experience could be using OpenStack (preferred) or commercial clouds such as AWS, GCP, or Azure.
• Experience with machine learning technologies is preferred.
• Established skills in software system development, modeling, and/or systems engineering is necessary.
• Ability to design, implement, test, document, and maintain software is necessary.
• Ability to quickly learn ISIS tools and technologies and becomes a productive project contributor is necessary.
Job responsibilities listed herein are intended to be a thorough representation of the duties, responsibilities, expectations, and qualifications for this specific
role at the time of hire but should not be considered all-encompassing as actual responsibilities may evolve to include additional duties as assigned based on
organizational and operational needs.
• Practical knowledge of software development tools, programming languages (e.g., C/C++, Java, Python, Matlab, C#, among others), databases, and web technologies, as needed by project, is necessary.
• Experience with state-of-the-art software development environments (e.g. Eclipse), tools (e.g. git), and collaborative environments (e.g. GitHub) is necessary.