Command Post Technologies (CPT) is seeking an experienced Threat Systems Engineer to support continuous cyber and electronic warfare threat operations across a distributed Multi-Domain Operations (MDO) environment. This role is focused on engineering implementing configuring and validating cyber threat systems defensive cyber controls and supporting infrastructure used to replicate adversary capabilities within high-fidelity threat emulation environments.
This position translates threat intelligence and engineering direction into executable system configurations ensuring emulated systems accurately replicate adversary behavior infrastructure and operational effects while maintaining system stability repeatability and security. It is primarily aligned to operational support with additional responsibilities supporting cyber implementation technical validation and lifecycle sustainment across live virtual and constructive environments.
This role requires hands-on engineering expertise with offensive and defensive cyber tools strong understanding of adversary infrastructure and defensive architectures and the ability to operate effectively within highly classified compartmented environments supporting geographically distributed operations. Occasional travel may be required based on mission requirements.
Key Responsibilities
- Engineer configure and implement cyber threat systems defensive cyber controls and supporting security mechanisms within threat emulation environments.
- Translate threat intelligence threat profiles and engineering guidance into operational system configurations that replicate adversary infrastructure behaviors and system responses with high fidelity.
- Support deployment integration and sustainment of threat systems across distributed cloud hub and Tactical Edge Device (TED) environments.
- Ensure threat systems are configured to support operational realism while maintaining repeatability stability and control during training testing and mission execution.
- Validate that emulated cyber and EW threat systems accurately represent adversary capabilities techniques and operational effects.
- Conduct technical testing tuning and assessment of threat system configurations to verify functionality defensive control effectiveness and mission relevance.
- Identify gaps inconsistencies or degraded fidelity within threat representations and recommend corrective actions configuration updates or system enhancements.
- Support verification activities to ensure threat systems align with operational objectives and do not introduce unintended impacts to test or training environments.
- Provide hands-on operational support during ongoing threat operations exercises and mission execution across classified environments.
- Support cyber implementation activities including system hardening configuration management security control validation lifecycle sustainment and technical documentation.
- Collaborate with systems engineers threat intelligence personnel and Government stakeholders to ensure threat systems remain aligned with evolving mission requirements and intelligence updates.
- Contribute to technical reporting engineering analysis and system assessments supporting continued threat environment modernization.
Requirements
- Bachelors degree in Cybersecurity Computer Science Systems Engineering Information Technology Computer Engineering or a related technical discipline.
- Minimum of 15 years of experience supporting cyber operations threat systems engineering cyber range operations threat emulation or closely related DoW mission environments.
- Hands-on experience engineering configuring and validating offensive and defensive cyber tools within threat emulation operational test or cyber range environments.
- Demonstrated understanding of adversary cyber infrastructure defensive architectures techniques and operational employment.
- Experience translating threat intelligence into executable system configurations and operational threat environments.
- Ability to operate effectively in sustained high-tempo operational environments across geographically distributed teams.
- Active Top Secret clearance with SCI eligibility required.
Preferred Qualifications
- Experience supporting cyber ranges threat emulation platforms or live virtual and constructive (LVC) environments.
- Familiarity with modular or behavior-driven threat modeling approaches.
- Experience supporting Army joint or other DoW multi-domain operations involving cyber and EW integration.
- Experience operating across multiple classification levels in continuously operating mission environments.
About us: We are Command Post Technologies Inc. (CPT). CPT is a Service-Disabled Veteran-Owned Small Business (SDVOSB) providing engineering services in the areas of Cyber Security Software Development Test & Evaluation and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals we come together as a team supporting a culture rooted in our core principles of integrity determination and all of CPTs collaboration efforts our team prioritizes communication accountability and being resourceful in order to maximize efficiency and results.
Whats In It for You
- Great health benefits (for more info contact us directly)
- Leadership training
- 401k with generous company matching
- Employee Stock Ownership Plan (ESOP)
- Career professional development
- Tuition reimbursement
- Flexible hours
- Work/Life balance
- Rewards and recognition
- Paid Time Off
- Parental Leave
Command Post Technologies Inc. (CPT) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded in 2008 and headquartered in Suffolk VA with personnel in various states including Virginia Maryland Florida and Texas. With 2/3 of our staff being former military CPT firmly believes in employing veterans. Command Post Technologies Inc. is a unique provider of innovative solutions that enhance our corporate clients productivity and empower our government clients with the ability to protect against all enemies: foreign and domestic. CPT adapts its successful military experiential approach to the needs of leaders in a global business environment and provides an elite leadership curriculum that results in a world-class leadership-altering event.
Command Post Technologies Inc. (CPT) is an Equal Employment Opportunity and Affirmative Action employer. We consider applicants without regard to race color religion age national origin ancestry ethnicity gender gender identify gender expression sex sexual orientation marital status veteran status disability genetic information citizenship status or membership in any other group protected by federal state or local law. We take Affirmative Action to ensure equal opportunities for employees and potential employees without regard to race color religion age national origin ancestry ethnicity gender gender identity gender expression sex sexual orientation marital status veteran status disability genetic information citizenship status or membership in any other group protected by federal state or local law.
We abide by the Pay Transparency Nondiscrimination Provision and will refrain from discharging or otherwise discriminating against employees or applicants who inquire about discuss or disclose their compensation or the compensation of other employees or applicants. An exception exists where the employee or applicant makes the disclosure based on information obtained while performing his or her essential job functions.
Required Experience:
IC
Command Post Technologies (CPT) is seeking an experienced Threat Systems Engineer to support continuous cyber and electronic warfare threat operations across a distributed Multi-Domain Operations (MDO) environment. This role is focused on engineering implementing configuring and validating cyber thr...
Command Post Technologies (CPT) is seeking an experienced Threat Systems Engineer to support continuous cyber and electronic warfare threat operations across a distributed Multi-Domain Operations (MDO) environment. This role is focused on engineering implementing configuring and validating cyber threat systems defensive cyber controls and supporting infrastructure used to replicate adversary capabilities within high-fidelity threat emulation environments.
This position translates threat intelligence and engineering direction into executable system configurations ensuring emulated systems accurately replicate adversary behavior infrastructure and operational effects while maintaining system stability repeatability and security. It is primarily aligned to operational support with additional responsibilities supporting cyber implementation technical validation and lifecycle sustainment across live virtual and constructive environments.
This role requires hands-on engineering expertise with offensive and defensive cyber tools strong understanding of adversary infrastructure and defensive architectures and the ability to operate effectively within highly classified compartmented environments supporting geographically distributed operations. Occasional travel may be required based on mission requirements.
Key Responsibilities
- Engineer configure and implement cyber threat systems defensive cyber controls and supporting security mechanisms within threat emulation environments.
- Translate threat intelligence threat profiles and engineering guidance into operational system configurations that replicate adversary infrastructure behaviors and system responses with high fidelity.
- Support deployment integration and sustainment of threat systems across distributed cloud hub and Tactical Edge Device (TED) environments.
- Ensure threat systems are configured to support operational realism while maintaining repeatability stability and control during training testing and mission execution.
- Validate that emulated cyber and EW threat systems accurately represent adversary capabilities techniques and operational effects.
- Conduct technical testing tuning and assessment of threat system configurations to verify functionality defensive control effectiveness and mission relevance.
- Identify gaps inconsistencies or degraded fidelity within threat representations and recommend corrective actions configuration updates or system enhancements.
- Support verification activities to ensure threat systems align with operational objectives and do not introduce unintended impacts to test or training environments.
- Provide hands-on operational support during ongoing threat operations exercises and mission execution across classified environments.
- Support cyber implementation activities including system hardening configuration management security control validation lifecycle sustainment and technical documentation.
- Collaborate with systems engineers threat intelligence personnel and Government stakeholders to ensure threat systems remain aligned with evolving mission requirements and intelligence updates.
- Contribute to technical reporting engineering analysis and system assessments supporting continued threat environment modernization.
Requirements
- Bachelors degree in Cybersecurity Computer Science Systems Engineering Information Technology Computer Engineering or a related technical discipline.
- Minimum of 15 years of experience supporting cyber operations threat systems engineering cyber range operations threat emulation or closely related DoW mission environments.
- Hands-on experience engineering configuring and validating offensive and defensive cyber tools within threat emulation operational test or cyber range environments.
- Demonstrated understanding of adversary cyber infrastructure defensive architectures techniques and operational employment.
- Experience translating threat intelligence into executable system configurations and operational threat environments.
- Ability to operate effectively in sustained high-tempo operational environments across geographically distributed teams.
- Active Top Secret clearance with SCI eligibility required.
Preferred Qualifications
- Experience supporting cyber ranges threat emulation platforms or live virtual and constructive (LVC) environments.
- Familiarity with modular or behavior-driven threat modeling approaches.
- Experience supporting Army joint or other DoW multi-domain operations involving cyber and EW integration.
- Experience operating across multiple classification levels in continuously operating mission environments.
About us: We are Command Post Technologies Inc. (CPT). CPT is a Service-Disabled Veteran-Owned Small Business (SDVOSB) providing engineering services in the areas of Cyber Security Software Development Test & Evaluation and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals we come together as a team supporting a culture rooted in our core principles of integrity determination and all of CPTs collaboration efforts our team prioritizes communication accountability and being resourceful in order to maximize efficiency and results.
Whats In It for You
- Great health benefits (for more info contact us directly)
- Leadership training
- 401k with generous company matching
- Employee Stock Ownership Plan (ESOP)
- Career professional development
- Tuition reimbursement
- Flexible hours
- Work/Life balance
- Rewards and recognition
- Paid Time Off
- Parental Leave
Command Post Technologies Inc. (CPT) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded in 2008 and headquartered in Suffolk VA with personnel in various states including Virginia Maryland Florida and Texas. With 2/3 of our staff being former military CPT firmly believes in employing veterans. Command Post Technologies Inc. is a unique provider of innovative solutions that enhance our corporate clients productivity and empower our government clients with the ability to protect against all enemies: foreign and domestic. CPT adapts its successful military experiential approach to the needs of leaders in a global business environment and provides an elite leadership curriculum that results in a world-class leadership-altering event.
Command Post Technologies Inc. (CPT) is an Equal Employment Opportunity and Affirmative Action employer. We consider applicants without regard to race color religion age national origin ancestry ethnicity gender gender identify gender expression sex sexual orientation marital status veteran status disability genetic information citizenship status or membership in any other group protected by federal state or local law. We take Affirmative Action to ensure equal opportunities for employees and potential employees without regard to race color religion age national origin ancestry ethnicity gender gender identity gender expression sex sexual orientation marital status veteran status disability genetic information citizenship status or membership in any other group protected by federal state or local law.
We abide by the Pay Transparency Nondiscrimination Provision and will refrain from discharging or otherwise discriminating against employees or applicants who inquire about discuss or disclose their compensation or the compensation of other employees or applicants. An exception exists where the employee or applicant makes the disclosure based on information obtained while performing his or her essential job functions.
Required Experience:
IC
View more
View less