What are the responsibilities and job description for the Quantum Computing Security Specialist position at IONQ?
At IONQ, we're developing the world's most powerful full-stack quantum computer based on trapped-ion technology. As a Cybersecurity Engineer for Quantum Technologies, you'll be at the forefront of this technological revolution. Our computers will soon redefine industries like medicine, materials science, finance, artificial intelligence, machine learning, cryptography, and more.
About the Role
We're looking for an experienced Security Expert for Emerging Computing to drive the technical and process implementation across two key programs: an internal trust program and an external threat intelligence program. You'll have the opportunity to bring your diverse background and talents to bear in shaping the future of computing.
In the first three months, you'll help integrate threat intelligence into our security program. This involves defining user activity monitoring queries on our existing data, identifying and leveraging open source threat intelligence, and developing a quantitative risk analysis to inform security priorities.
Responsibilities
- Develop an overall program for identifying risk based on insider threat and outside threat intelligence
- Write code to connect to a variety of systems to collect and analyze data in support of security alerting, evidence collection, and system hardening
- Follow secure software development practices while working in an agile team, helping to scope, plan, prioritize, and complete work
- Write technical documentation, including software documentation, memos, and architecture diagrams
- Automate integrations with workflow-based tools
- Collaborate with both technical and non-technical teams
Requirements
To succeed as a Trust and Threat Intelligence Professional, you should have:
- Bachelor's degree in Computer Science or equivalent practical experience
- 6 years of relevant experience in cybersecurity
- Experience writing code that is used and maintained over time by a team
- Experience with tools like user activity monitoring used in insider threat programs
- Experience creating, deploying, and tuning indicators of compromise (IOCs) for corporate and hybrid cloud environments