
Information Systems Engineers
University of Utah, Campus, IL, United States
Job Summary
The Center for High Performance Computing ( CHPC ) at the University of Utah provides advanced computing and data systems and services that support cutting-edge scholarship and innovation across disciplines. The CHPC partners with faculty, researchers, and institutional stakeholders to design and operate, scalable and performant computing environments that enable data-intensive and computationally complex research. In addition to supporting traditional high-performance computing workloads, the CHPC plays a critical role in developing and maintaining computational environments for research with sensitive information that must meet federal and sponsor compliance requirements. Through collaboration, technical expertise, and a commitment to service, the CHPC advances the University of Utah’s research mission by delivering reliable, trustworthy, and forward-looking research computing infrastructure.
The Research Enablement Engineer designs, builds, and maintains systems and automation to reduce friction associated with operational processes in research computing environments, working closely with other teams with the goal of improving the user experience by reducing operational delays and complexity. A key focus of this position will be advancing the University’s HIPAA and NIST SP 800-171 regulated research computing environments by designing and maintaining a system to make research software management scalable, reproducible, as well as compliant with applicable regulations. There are further opportunities for automation and process improvement, such as improving user onboarding experiences, simplifying research data acquisition processes, and supporting the collection and management of project and user details.
Focused on internal tooling, workflow automation, and platform enablement, this role empowers User Services, Systems, and Security teams to operate more efficiently and consistently, particularly in support of projects requiring a compliant research computing and data environment. Acting as a bridge between research users, computing operations, and compliance requirements, this software- and workflow-focused position emphasizes sustainable design, usability, and clear documentation, building the infrastructure that allows regulated research to scale without increasing operational complexity.
This role is not expected to perform primary vulnerability remediation or policy interpretation, but rather to enable those functions through software tooling and workflow design.
Responsibilities
Design and implement internal tools and workflows to support:
Research software onboarding and lifecycle management
Collection and organization of onboarding and compliance metadata
Automation of repeatable processes related to regulated environments for research computing and data
Develop and maintain systems that support software builds, review workflows, and lifecycle tracking in regulated environments.
Work closely with User Services and other staff to optimize infrastructure and compliance processes and expand support for user education, documentation, and research workflow development.
Collaborate with Systems and Security teams to ensure tooling integrates cleanly with identity, access, and compliance requirements without duplicating their responsibilities.
Improve the organization, structure, and accessibility of documentation and operational artifacts for the regulated research computing and data environments.
Support the design of automated or semi-automated vulnerability scanning workflows (in collaboration with the Security team), including:
Build-time scanning integration
Flagging and routing of findings for human interpretation
Assist in defining scalable models for software build, review, and maintenance (e.g., build automation, CI/CD-style pipelines).
Contribute to long-term planning for ML/AI-assisted vulnerability interpretation and workflow optimization.
Participate in cross-team design discussions related to regulated research computing architecture and operations.
Minimum Qualifications
Bachelor’s degree in Computer Science, Engineering, Information Systems, Physics, Mathematics, or another quantitative STEM discipline; or an equivalent combination of education and directly related experience.
Experience designing or maintaining internal tools, automation, or developer platforms.
Familiarity with Linux-based systems and container technologies (e.g., Apptainer, Docker, Podman).
Experience working in collaborative, cross-functional technical environments.
Ability to research and translate requirements into structured, maintainable systems.
A security clearance is not required for this position.
Salary and Job Levels
Information Systems Engineer II : Requires a bachelor’s (or equivalency) + 4 years or a master’s (or equivalency) + 2 years of directly related work experience.
P17 Salary Range ( DOE ): $43,796 – $84,883
Information Systems Engineer III : Requires a bachelor’s (or equivalency) + 4 years or a master’s (or equivalency) + 2 years of directly related work experience.
P20 Salary Range ( DOE ): $58,292 – $112,979
Information Systems Engineer IV : Requires a bachelor’s (or equivalency) + 8 years or a master’s (or equivalency) + 6 years of directly related work experience.
P21 Salary Range ( DOE ): $64,122 – $124,278
Preferences
Experience supporting research computing, HPC , or scientific software environments. Knowledge of Spack (package manager for scientific software) or other software build or module systems preferred.
Familiarity with regulated computing concepts (e.g., NIST SP 800-171, CMMC , HIPAA ), even if not acting as a security specialist.
Experience with Git version control software.
Experience with CI/CD pipelines, build automation, or infrastructure-adjacent development.
Experience with machine learning and artificial intelligence tools, especially large language models. Experience with locally hosted (on-premises) tools and experience with integration of models with software tools (use of APIs) are both beneficial.
Interest in documentation, developer experience, and process design.
Exposure to vulnerability scanning tools and workflows (interpretation experience a plus, but not required).
Equal Opportunity Statement
Consistent with state and federal law, the University of Utah does not discriminate based upon race, ethnicity, color, religion, national origin, age, disability, sex, sexual orientation, gender, gender identity, gender expression, pregnancy, pregnancy-related conditions, genetic information, or protected veteran’s status. The University does not discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities extends to admission and employment. Inquiries about the application of Title IX and the regulations may be referred to the Title IX Coordinator, to the Department of Education, Office for Civil Rights, or both.
To request a reasonable accommodation for a disability or if you or someone you know has experienced discrimination or sexual misconduct including sexual harassment, you may contact the Director/Title IX Coordinator in the Office of Equal Opportunity and Title IX (OEO). More information, including the Director/Title IX Coordinator’s office address, electronic mail address, and telephone number can be located at the:
University of Utah Non‑Discrimination page .
Online reports may be submitted at
https://oeo.utah.edu .
https://publicsafety.utah.edu/safetyreport/
This report includes statistics about criminal offenses, hate crimes, arrests and referrals for disciplinary action, and Violence Against Women Act offenses. They also provide information about safety and security-related services offered by the University of Utah. A paper copy can be obtained by request at the Department of Public Safety located at 1658 East 500 South.
#J-18808-Ljbffr
The Center for High Performance Computing ( CHPC ) at the University of Utah provides advanced computing and data systems and services that support cutting-edge scholarship and innovation across disciplines. The CHPC partners with faculty, researchers, and institutional stakeholders to design and operate, scalable and performant computing environments that enable data-intensive and computationally complex research. In addition to supporting traditional high-performance computing workloads, the CHPC plays a critical role in developing and maintaining computational environments for research with sensitive information that must meet federal and sponsor compliance requirements. Through collaboration, technical expertise, and a commitment to service, the CHPC advances the University of Utah’s research mission by delivering reliable, trustworthy, and forward-looking research computing infrastructure.
The Research Enablement Engineer designs, builds, and maintains systems and automation to reduce friction associated with operational processes in research computing environments, working closely with other teams with the goal of improving the user experience by reducing operational delays and complexity. A key focus of this position will be advancing the University’s HIPAA and NIST SP 800-171 regulated research computing environments by designing and maintaining a system to make research software management scalable, reproducible, as well as compliant with applicable regulations. There are further opportunities for automation and process improvement, such as improving user onboarding experiences, simplifying research data acquisition processes, and supporting the collection and management of project and user details.
Focused on internal tooling, workflow automation, and platform enablement, this role empowers User Services, Systems, and Security teams to operate more efficiently and consistently, particularly in support of projects requiring a compliant research computing and data environment. Acting as a bridge between research users, computing operations, and compliance requirements, this software- and workflow-focused position emphasizes sustainable design, usability, and clear documentation, building the infrastructure that allows regulated research to scale without increasing operational complexity.
This role is not expected to perform primary vulnerability remediation or policy interpretation, but rather to enable those functions through software tooling and workflow design.
Responsibilities
Design and implement internal tools and workflows to support:
Research software onboarding and lifecycle management
Collection and organization of onboarding and compliance metadata
Automation of repeatable processes related to regulated environments for research computing and data
Develop and maintain systems that support software builds, review workflows, and lifecycle tracking in regulated environments.
Work closely with User Services and other staff to optimize infrastructure and compliance processes and expand support for user education, documentation, and research workflow development.
Collaborate with Systems and Security teams to ensure tooling integrates cleanly with identity, access, and compliance requirements without duplicating their responsibilities.
Improve the organization, structure, and accessibility of documentation and operational artifacts for the regulated research computing and data environments.
Support the design of automated or semi-automated vulnerability scanning workflows (in collaboration with the Security team), including:
Build-time scanning integration
Flagging and routing of findings for human interpretation
Assist in defining scalable models for software build, review, and maintenance (e.g., build automation, CI/CD-style pipelines).
Contribute to long-term planning for ML/AI-assisted vulnerability interpretation and workflow optimization.
Participate in cross-team design discussions related to regulated research computing architecture and operations.
Minimum Qualifications
Bachelor’s degree in Computer Science, Engineering, Information Systems, Physics, Mathematics, or another quantitative STEM discipline; or an equivalent combination of education and directly related experience.
Experience designing or maintaining internal tools, automation, or developer platforms.
Familiarity with Linux-based systems and container technologies (e.g., Apptainer, Docker, Podman).
Experience working in collaborative, cross-functional technical environments.
Ability to research and translate requirements into structured, maintainable systems.
A security clearance is not required for this position.
Salary and Job Levels
Information Systems Engineer II : Requires a bachelor’s (or equivalency) + 4 years or a master’s (or equivalency) + 2 years of directly related work experience.
P17 Salary Range ( DOE ): $43,796 – $84,883
Information Systems Engineer III : Requires a bachelor’s (or equivalency) + 4 years or a master’s (or equivalency) + 2 years of directly related work experience.
P20 Salary Range ( DOE ): $58,292 – $112,979
Information Systems Engineer IV : Requires a bachelor’s (or equivalency) + 8 years or a master’s (or equivalency) + 6 years of directly related work experience.
P21 Salary Range ( DOE ): $64,122 – $124,278
Preferences
Experience supporting research computing, HPC , or scientific software environments. Knowledge of Spack (package manager for scientific software) or other software build or module systems preferred.
Familiarity with regulated computing concepts (e.g., NIST SP 800-171, CMMC , HIPAA ), even if not acting as a security specialist.
Experience with Git version control software.
Experience with CI/CD pipelines, build automation, or infrastructure-adjacent development.
Experience with machine learning and artificial intelligence tools, especially large language models. Experience with locally hosted (on-premises) tools and experience with integration of models with software tools (use of APIs) are both beneficial.
Interest in documentation, developer experience, and process design.
Exposure to vulnerability scanning tools and workflows (interpretation experience a plus, but not required).
Equal Opportunity Statement
Consistent with state and federal law, the University of Utah does not discriminate based upon race, ethnicity, color, religion, national origin, age, disability, sex, sexual orientation, gender, gender identity, gender expression, pregnancy, pregnancy-related conditions, genetic information, or protected veteran’s status. The University does not discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities extends to admission and employment. Inquiries about the application of Title IX and the regulations may be referred to the Title IX Coordinator, to the Department of Education, Office for Civil Rights, or both.
To request a reasonable accommodation for a disability or if you or someone you know has experienced discrimination or sexual misconduct including sexual harassment, you may contact the Director/Title IX Coordinator in the Office of Equal Opportunity and Title IX (OEO). More information, including the Director/Title IX Coordinator’s office address, electronic mail address, and telephone number can be located at the:
University of Utah Non‑Discrimination page .
Online reports may be submitted at
https://oeo.utah.edu .
https://publicsafety.utah.edu/safetyreport/
This report includes statistics about criminal offenses, hate crimes, arrests and referrals for disciplinary action, and Violence Against Women Act offenses. They also provide information about safety and security-related services offered by the University of Utah. A paper copy can be obtained by request at the Department of Public Safety located at 1658 East 500 South.
#J-18808-Ljbffr