>

Current Opportunities at Vanderbilt

Postdoctoral Fellow Position in Cybersecurity. This position is in the Wicked Problems Laboratory in the Vanderbilt University Institute of National Security.

Department Vanderbilt University Institute of National Security
Full Description

The Wicked Problems Lab (wickedproblemslab.com) at the Vanderbilt University Institute of National Security invites applications for a Cybersecurity Postdoctoral Fellow focused on advanced, applied research in cybersecurity and critical infrastructure protection. The Lab brings together leading researchers, engineers, and operational experts to translate emerging technologies into pragmatic, real-world solutions. Work from the Wicked Problems Lab has been featured on the front page of The New York Times and has informed U.S. Congressional testimony.

This is a deeply technical position centered on experimentation, data-driven analysis, and the development of new methods for detecting, defending against, and mitigating cyber threats. The Postdoctoral Fellow will conduct high-impact research on network traffic analysis, anomaly detection, and infrastructure resilience—working directly with operational data to design, test, and validate real-world solutions.

The Postdoctoral Fellow will be mentored by Dr. Sandeep Neema, Director of the Institute for Software Integrated Systems, Professor of Computer Science, and Professor of Electrical and Computer Engineering. The Fellow will also work closely with Brett Goldstein, Research Professor of Engineering, Special Advisor to the Chancellor for National Security, and former Director of the Defense Digital Service at the Pentagon. This role provides unique access to operational datasets and research partnerships that connect directly to national security missions, allowing the Fellow to produce work with both academic rigor and practical relevance.

Key Responsibilities:
• Perform advanced research in network traffic analysis, anomaly detection, and cyber threat modeling.
• Develop, prototype, and evaluate algorithms and tools for network defense and situational awareness.
• Conduct large-scale data analysis using packet captures, flow data, and system telemetry.
• Publish findings in top-tier cybersecurity and systems research venues.
Preferred Technical Expertise:
• Network forensics, intrusion detection, or flow-based analysis (Zeek, Suricata, PCAP, NetFlow)
• Critical infrastructure and industrial control system (ICS) security
• AI/ML or statistical approaches for cyber anomaly detection
• High-performance computing, distributed systems, or cloud-native architectures for network analysis
• Advanced programming and data science skills (Python, C/C++, or Rust preferred)
Qualifications:
• Ph.D. in Computer Science, Electrical or Computer Engineering, Cybersecurity, or a closely related field (completed or near completion)
• Strong research record in cybersecurity, systems, or network analysis
• Demonstrated experience working with large-scale network or systems data
• Ability to design and execute rigorous technical experiments and publish results

This position offers an exceptional opportunity for a technically strong researcher to advance applied cybersecurity science with direct operational relevance. The Fellow will gain access to unique datasets, mentorship from leading experts, and the ability to see their work influence live defense and infrastructure systems.

Application Details

Applications should include a CV, brief description of research experience and interests, list of publications and three references submitted electronically to Megan Pask at megan.pask@vanderbilt.edu. U.S. citizenship is required for this position. For full consideration, applications should be completed by December 8, 2025. Additional applications will be accepted and reviewed until the position is filled. The position is for two years, renewable for up to three years. 

Contact: Megan Pask (megan.pask@vanderbilt.edu)

Contact Megan Pask
megan.pask@vanderbilt.edu
Posted 2025-11-19 13:55:05

Back to opportunities listing »