Latest Articles

Python Developer @ UCAR (Boulder, CO)

March 19, 2019

More information here.

The Unidata Program Center is hiring! We are looking for a Python developer to join our team in creating and maintaining software and data services to support the geosciences.

As part of the University Corporation for Atmospheric Research (UCAR) in Boulder, CO, Unidata offers competitive salaries and great benefits. UCAR was selected as one of the Best Companies to Work For in Colorado. Simply put, Unidata is a great place to work. Unidata’s team environment provides high levels of autonomy and responsibility with great opportunity to excel individually and contribute to the team’s success.

We are looking for a Python developer to help us help our community of scientists access the Earth system science data that fuels their research. As a member of the Python team, you will collaborate with other Unidata developers to test, support, maintain, and develop Unidata open source software products and real-time data streams. In particular, this position focuses on:

– Development and support for MetPy and Siphon
– Maintenance and enhancement of Unidata’s Python training materials
– Teaching Unidata’s Python Training Workshop locally and periodically at various universities, usually several times per year.

If you enjoy teaching, like working with Python, and want the opportunity to support and interact with Unidata’s fantastic community of users, we encourage you to apply. For a detailed job description see the official posting linked above.

Supercomputing and Life Sciences Symposium @ UNL

March 18, 2019

April 17, 2019 at the University of Nebraska – Lincoln and Lincoln, NE.

More information at the website.

The Holland Computing Center and the Quantitative Life Sciences Initiative have partnered to host the 2019 Supercomputing and Life Sciences (SLS) Symposium, bringing you speakers on computational sciences from across the nation and within the NU system.

Presentations will be evaluated and awarded prizes based on attendee votes. For more information, check out the “Presenter Information” tab at the website.

Registration is open, and more information will be posted on their website.


Webinar: CCoE Presents The NSF CC-DNI SecureCloud Project

March 11, 2019

From the CCoE mailing list (subscription info below).

CCoE Webinar March 25th at 10am CST: The NSF CC-DNI SecureCloud Project

Casimer DeCusatis is presenting the talk “The NSF CC-DNI SecureCloud Project: Autonomic Cybersecurity for Zero Trust Cloud Computing” on Monday March 25th at 11am (Eastern).

Please register hereBe sure to check spam/junk folder for registration confirmation email.

Cyberinfrastructure is undergoing a radical transformation as traditional data centers are replaced by cloud computing. Cloud hosted applications tend to have a poorly defined network perimeter, large attack surfaces, and pose significant challenges for network visibility, segmentation, and authentication.  We discuss research from the NSF SecureCloud project, which addresses the unique requirements of cloud security using an autonomic, zero trust architecture.

We have created and tested original software using a first-of-a-kind cybersecurity test bed constructed at the New York State Cloud Computing & Analytic Center, Marist College. We developed the first honeypot for software defined network (SDN) controllers , and created honeypots for graph database APIs, SSH, and other applications.  These honeypots collect raw data telemetry, which is processed into actionable threat intelligence using our Lightweight Cloud Analytics for Real Time Security (LCARS), an SIEM that includes the G-Star graph database and hive plot visualizer.

We have built a threat intelligence database including attack patterns and orchestrated response recipes. We demonstrate dynamic reconfiguration using REST APIs for network appliances, while we cloak high risk applications using a combination of Transport Layer Access Control and First Packet Authentication.  Use cases include reconfiguration of trust levels in response to distributed denial of service (DDoS) and other attacks.

Speaker bio:

Casimer DeCusatis is an Assistant Professor at Marist College.  He is a Cisco Distinguished Speaker, Fellow of IEEE, OSA, SPIE, and recipient of the following awards: IEEE Kiyo Tomiyasu, IEEE R1 Cybersecurity Education, Sigma Xi Walston Chubb, Mensa Copper Black, PSU Outstanding Alumnus, and IEEE/HKN OYEE.  He received his M.S.(1988) & Ph.D.(1990) from RPI and his B.S. from Penn State (1986).

Presentations are recorded and include time for questions with the audience.

Join Trusted CI’s announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under “Past Events.”

Announcing Trusted CI’s Open Science Cybersecurity Fellows Program

February 20, 2019

This is from Trusted CI.

Application Deadline: Wednesday, March 13th 2019. Apply here.
Updates and materials will be posted on their website.


Trusted CI serves the scientific community as the NSF Cybersecurity Center of Excellence, providing leadership in and assistance in cybersecurity in the support of research. In 2019, Trusted CI is establishing an Open Science Cybersecurity Fellows program. This program will establish and support a network of Fellows with diversity in both geography and scientific discipline. These fellows will have access to training and other resources to foster their professional development in cybersecurity. In exchange, they will champion cybersecurity for science in their scientific and geographic communities, and communicate challenges and successful practices to Trusted CI.

About the program

The vision for the Fellows program is to identify members of the scientific community, empower them with basic knowledge of cybersecurity and the understanding of Trusted CI’s services, and then have them serve as cybersecurity liaisons to their respective community. They would then assist members of the community with basic cybersecurity challenges and connect them with Trusted CI for advanced challenges.

Trusted CI will select six fellows each year.  Fellows will receive recognition, cybersecurity professional development consisting of training and travel funding.

The Fellows’ training will consist of a Virtual Institute, providing 20 hours of basic cybersecurity training over six months. The training will be delivered by Trusted CI staff and invited speakers. The Virtual Institute will be presented as a weekly series via Zoom and recorded to be publicly available for later online viewing. Travel support is budgeted (during their first year only) to cover fellows’ attendance at the NSF Cybersecurity Summit, PEARC, and one professional development opportunity agreed to with Trusted CI. The Fellows will be added to an email list to discuss any challenges they encounter that will receive prioritized attention from Trusted CI staff. Trusted CI will recognize the Fellows on its website and social media. Fellowships are funded for one year, but will be encouraged to continue to participating in TrustedCI activities the years following their fellowship year.

After the Virtual Institute, Fellows, with assistance from the Trusted CI team, will be expected to help their science community with cybersecurity and make them aware of Trusted CI for complex needs. By the end of the year, they will be expected to present or write a short white paper on the cybersecurity needs of their community and some initial steps they will take (or have taken) to address these needs. After the year of full support, Trusted CI will continue recognizing the cohort of Fellows and giving them prioritized attention. Over the years, this growing cohort of Fellows will broaden and diversify Trusted CI’s impact.

Application requirements

  • A description of their connection to the research community. Any connection to NSF projects should be clearly stated, ideally providing the NSF award number.
    A statement of interest in cybersecurity
  • Two-page biosketch
  • Optional demographic info
  • A letter from their supervisor supporting their involvement and time commitment to the program
  • A commitment to fully participate in the Fellows activities for one year (and optionally thereafter)

The selection of Fellows would be made by the Trusted CI PIs and Senior Personnel based on the following criteria:

  1. Demonstrated connection to scientific research, with preference given to those who demonstrate a connection to NSF-funded science.
  2. Articulated interest in cybersecurity.
  3. Fellows that broaden Trusted CI’s impact across all seven NSF research directorates (Trusted CI encourages applications for individuals with connections to NSF directorates other than CISE), with connections to any of the NSF 10 Big Ideas, or Fellows that increase the participation of underrepresented populations.

Who should apply?

  • Professionals and post-docs interested in cybersecurity for science, with evidence of that in their past and current role
  • Research Computing, Data, and IT technical or policy professionals interested in applying cybersecurity innovations to scientific research
  • Domain scientists interested in data integrity aspects of scientific research
  • Scientists from all across the seven NSF research directorates interested in how data integrity fits with their scientific mission
  • Researchers in the NSF 10 Big Ideas interested in cybersecurity needs
  • Regional network security personnel working across universities and facilities in their region
  • People comfortable collaborating and communicating across multiple institutions with IT / CISO / Research Computing and Data professionals
  • Anyone in a role relevant to cybersecurity for open science

More about the Fellowship

Fellows come from a variety of career stages, they demonstrate a passion for their area, the ability to communicate ideas effectively, and a real interest in the role of cybersecurity in research. Fellows are empowered to talk about cybersecurity to a wider audience, network with others who share a passion for cybersecurity for open science, and learn key skills that benefit them and their collaborators.

If you have questions about the Fellows program, please email at fellows at  trustedci org.

Application Deadline: Wednesday, March 13th 2019. Apply here.

Applicants will be notified by:  Wednesday, April 10th 2019