Tag Archives: #cyberaware

Cybersecurity Engineer Position Available at Bayer

Job Description:

As an Associate Cybersecurity Engineer within Bayer’s Medical Device Cybersecurity group, you play a crucial role in securing Bayer Radiology medical devices and software against potential cyber threats. Your responsibilities include reviewing cybersecurity vulnerabilities, assessing their likelihood of exploitation, and evaluating potential impacts on the safety and effectiveness of Bayer Radiology medical devices. You will also design and develop solutions to mitigate cybersecurity risks associated with Bayer Radiology medical devices, software, and IT products. This position operates on a global scale, ensuring the security of Bayer’s medical devices worldwide.

Tasks and Responsibilities:

  • Fulfill requirements defined by others;
  • Support the development of one design element at a time within a selected discipline;
  • Learn about the product and clinical applications;
  • Gain a guided understanding of direct interfaces (inputs/outputs) within relevant processes;
  • Participate in cybersecurity design reviews;
  • Receive clearly defined objectives and instructions from a more experienced lead engineer, cybersecurity engineer, or supervisor;
  • Accurately follow directions;
  • Communicate work activities effectively;
  • Contact and gather information from suppliers;
  • Communicate work activities effectively.
  • The primary location for this role is Indianola, PA (Pittsburgh, PA area).

For more information or to submit an application, click here: Cybersecurity Engineer

Advanced Persistent Threat Presentation by Lucas Franklin

Please join us for a speaker series presentation sponsored by the Top Secret Colonials. The presentation will be given by Lucas Franklin and will be focused on Advanced Persistent Threats.

  • Date: October 15th
  • Time: 4:30 pm – 5:30 pm
  • Place: Wheatley Atrium

Lucas Franklin will be sharing insights from a notable cyber incident he encountered involving suspected Russian advanced persistent threats (APTs) during his tenure at #1 Cochran. Prior to pursuing a graduate degree, Lucas served as the head of cybersecurity at #1 Cochran, where he led efforts to safeguard the organization’s digital infrastructure.

Lucas Franklin earned his Bachelor’s degree in Computer Science from IUP in 2022. Shortly after, he joined the IT department at #1 Cochran, where he rapidly took on key responsibilities including overseeing major acquisitions, leading technical training initiatives, and managing cybersecurity operations. In 2024, he departed the company to pursue a Master’s in Cybersecurity at WGU.

Dr. Kassa Wins Best Paper Award at ACMSE

Dr. Yonas Kassa has been honored with the Best Full Paper Award at the 2025 ACM Southeast (ACMSE) Conference, which took place from April 24-26, 2025, at Southeast Missouri State University. As the oldest continuously running annual conference of the ACM, ACMSE serves as a vital platform for students, faculty, researchers, and industry professionals to share their latest research across all facets of computer science.

Dr. Kassa’s award-winning paper, a collaborative effort with four other researchers, is titled “Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking.” You can access the paper here.

Congratulations to Dr. Kassa and his co-authors on this significant achievement!

Data Privacy Day – January 28th

The Top Secret Colonials are promoting a data privacy awareness day on January 28th. Data Privacy Day is meant to help raise the public’s awareness around data security and educate all internet users to be safer online. This day also aims to encourage greater accountability among consumers to better perceive how their information is being shared.

On January 28, the National Cyber Security Alliance (NCSA) will host events in Washington, DC and Los Angeles where privacy professionals will explain solutions to current challenges as well as best practices, such as how to recognize cyber intrusions and establishing an incident response plan. NCSA will also hold Twitter chats centered around data privacy in the days leading up to Data Privacy Day.

Data Privacy Tips (from StaySafeOnline.org):

  • Share with Care
    • What you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
    • Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s ok to limit how and with whom you share information.
    • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful when and how you share information about others.
    • Post only about others as you have them post about you: The golden rule applies online as well.
    • Own your online presence: It’s OK to limit who can see your information and what you share. Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Personal Information Is Like Money: Value It. Protect It.
    • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true or ask for personal information.
    • Get two steps ahead: Switch on two-step verification or multi-factor authentication wherever offered to prevent unauthorized access.
    • Know what’s being collected, who is collecting it and how it will be used: Information about you, such as the games you like to play, what you search for online and where you shop and live, has value ‒ just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites. Only use a product or service if the company is open and clearly states how it will use your personal information. If you’re not sure what a business will do with your information, ask your parents. Think twice if an app wants permission to use personal information (like your location) it doesn’t need before you say “OK.”
    • Secure your devices: Use strong passwords or passcodes or touch ID features to lock your devices. Securing your device can help protect your information if your device is lost or stolen and keep prying eyes out.
    • Get savvy about WiFi hotspots: Public wireless networks and hotspots are not secure – this means the possibility exists that anyone can see what you are doing on your laptop or smartphone while you are connected to it. Think about what you are doing and if you would want another person to see it. If you use public WiFi a lot, think about using a virtual private network (VPN) that provides a more secure WiFi connection.
    • Now you see me, now you don’t: Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Turn off WiFi and Bluetooth when not in use, and limit your use of free public wireless networks, which stores and locations can use to track what you do online.
    • When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way bad guys get access to your personal information. If it looks weird, even if you know the source, it’s best to delete.

Sources:

-http://associationsnow.com/2016/01/data-privacy-day-to-raise-publics-awareness-of-its-role-in-data-security/

-https://www.staysafeonline.org/data-privacy-day/privacy-tips/