Tyto Athene is searching for a Cyber Engineering Lead to lead our internal cyber AI and automation product development program. This role is multi-faceted. The successful candidate is a highly skilled and innovative Cyber Engineer with operational experience supporting Security Operations Center (SOC), Network Operations Center (NOC), and offensive cyber/penetration testing capabilities. This role is at the forefront of leveraging artificial intelligence (AI) and machine learning (ML) to make sense of massive streams of network and security data, exploit advanced AI features in existing sensors, build intelligent cyber/network automations, drastically reduce incident response times, and automate repetitive, low-value operational tasks. You will be instrumental in transforming our operations from reactive to predictive, enabling our teams to focus on strategic initiatives and complex threat hunting. The selected candidate will be a technical leader in Tyto’s new Technology Acceleration Lab for Operational Needs (TALON).
Responsibilities:
Real-time Data Ingestion & Feature Engineering:
Design, develop, and implement AI/ML models to process and derive insights from high-volume, real-time streaming data from diverse NOC/SOC sources (e.g., network telemetry, logs, flow data, packet captures, security alerts, endpoint data, threat intelligence feeds).
Perform advanced feature engineering on raw network and security data to extract meaningful patterns, indicators of compromise (IOCs), and behavioral anomalies.
Develop and integrate data ingestion pipelines from various sensors, platforms (SIEM, EDR, NDR), and network devices into the AI/ML ecosystem.
AI-Driven Anomaly Detection & Threat Identification:
Develop and deploy AI/ML models for anomaly detection in network traffic, user behavior, system logs, and security events.
Engineer solutions to identify sophisticated cyber threats and network anomalies with high accuracy and low false positives.
Leverage and integrate with existing AI/ML capabilities embedded within NOC/SOC sensors and tools to maximize their effectiveness.
AI-Powered Cyber & Network Automation:
Design and build intelligent automation playbooks and workflows that leverage AI/ML insights to automate incident response, network configuration changes, threat containment, and remediation actions.
Develop predictive models to anticipate network failures, security breaches, or performance bottlenecks, enabling proactive intervention.
Implement AIOps solutions to centralize monitoring, intelligently correlate events, and recommend or execute automated resolutions for common operational issues.
Create Security Orchestration, Automation, and Response (SOAR) integrations that are enhanced by AI/ML decisions, optimizing triage, investigation, and response times.
Performance Optimization & Efficiency Enhancement:
Focus on reducing the Mean Time To Detect (MTTD) and Mean Time To Resolve (MTTR) for network incidents and cyber threats through AI/ML-driven insights and automation.
Identify and automate repetitive, low-value tasks performed by NOC/SOC analysts, freeing them to focus on complex investigations, threat hunting, and strategic initiatives.
Develop systems for intelligent alert prioritization, reducing alert fatigue and enabling analysts to focus on critical events.
Model Lifecycle Management (MLOps):
Implement robust MLOps practices for continuous integration, continuous delivery, and continuous training (CI/CD/CT) of AI/ML models in production.
Monitor model performance, detect model drift, and ensure the ongoing accuracy and relevance of deployed models.
Establish clear data governance and lineage for AI/ML models, ensuring explainability and auditability in critical operational environments.
Collaboration & Domain Expertise Integration:
Work closely with NOC engineers, SOC analysts, network architects, and cybersecurity experts to understand operational challenges, define problem statements, and integrate AI/ML solutions seamlessly into existing workflows.
Translate complex AI/ML concepts and results into actionable insights for operational teams.
Required:
Desired:
Clearance:
Compensation:
Benefits:
Software Powered by iCIMS
www.icims.com