HPC Cyber Security Engineer
Oak Ridge, Anderson County, Tennessee, 37830, USA
Listed on 2026-02-13
-
IT/Tech
Cybersecurity, Systems Engineer, Cloud Computing
Annual Salary Range: $$ - $$
Work‑Site Type:
Remote
ORNL offers a flexible work environment that supports both the organization and the employee. In addition, this position is considered remote-eligible for ORNL in pre-approved locations. Remote‑eligibility is not a continued guarantee and could be subject to change based on evolving organizational needs.
Note about pay range:
Please note that the pay range information is a general guideline only. Many factors are taken into consideration when setting starting pay. Salary for this position will be commensurate with the final candidate’s qualifications and experience, including skills, knowledge, relevant education, certifications, plus also aligned with the internal peer group. It is not typical for an individual to be offered a salary at or near the top of the range for a position.
Link to benefits. (Use the "Apply for this Job" box below).?locale=
The National Center for Computational Sciences (NCCS) at Oak Ridge National Laboratory (ORNL) operates the fastest High Performance Computers (HPC) in the world. We are seeking innovative and creative Linux‑types to play a key role in ensuring the security, performance, and reliability of the NCCS computing infrastructure. Our efforts support a highly‑skilled user base consisting of the best‑of‑the‑best science teams around the world.
NCCS enables these teams to perform science that is just not possible anywhere else. In return, and instead of charging for compute and data allocations, we ask these scientists to publish their work in open literature. If you are excited about applying Dev Sec Ops best practices to HPCs, come help us guarantee the integrity of open science publications that utilize NCCS supercomputing resources.
Team
The HPC Cybersecurity Engineering team is one half of the NCCS Security and Information Engineering Group. It is tasked with architecting, developing, deploying, and maintaining all facets of the Supercomputing‑specific technical security program (which is an enclave of the broader ORNL network). We recognize that there are many security disciplines and keep ourselves sharp by sharing incident response, blue team engineering, red team vulnerability research, policy architecture, and Dev Sec Ops responsibilities with each other.
We work hand‑in‑hand with other teams to help them secure their systems and act as liaisons between ORNL’s broader risk management framework. We are exclusively a Linux shop without enterprise phishing and mobile device security headaches; instead our security problems revolve around unique challenges such as the scaling of security tools in a high performance environment and maintaining the integrity of scientific computing.
You
You deploy infrastructure and/or security controls as code because automation lets you focus on the more difficult and rewarding problems. You love working with others because the ‘best solutions’ to a problem are a product of collaboration. You may have a Git Hub account with cool projects. You may have more than a couple of our Preferred Qualifications and probably do not yet have any prior HPC experience.
You may have technical leadership experience and/or want to grow into this role. You may or may not think Hackers is an incredible movie.
- Translate complex technical concepts to better communicate with scientific and management staff.
- Help shape the Supercomputing security architectural vision and lead teams to evaluate novel scientific capabilities against our core security values.
- Develop and maintain security applications deployed with container orchestration tools.
- Automate policy assessments to verify cyber security and operational policy.
- Engineer secure software development frameworks and tools.
- Define and implement best practices and standards within the organization.
- Analyze, triage, and respond to application, system, and network events. Install, maintain, and monitor common security systems such as (N/H)
IDS and SIEM. - Interpret cyber security policy, recommend enhancements to current policies, and lead subsequent implementation efforts.
- Respond to system vulnerabilities and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).