- Company Name
- Bespoke Technologies, Inc.
- Job Title
- Cyber Engineer
- Job Description
-
**Job Title**
Cyber Engineer
**Role Summary**
Senior technical risk assessor responsible for evaluating and mitigating security risks associated with the deployment of enabling technologies. Provides expert guidance on potential cyber threats, recommends risk mitigation strategies, and documents findings to enhance overall security posture.
**Expectations**
- Must possess a current Poly clearance.
- On‑site presence required; remote work not permitted.
**Key Responsibilities**
- Conduct comprehensive risk assessments of systems, networks, and cloud environments.
- Gather and analyze body‑of‑evidence artifacts (CONOPS, use cases, network diagrams, SSPs).
- Identify, characterize, and document threats and vulnerabilities using systematic investigative practices.
- Evaluate hardware, software, and network configurations for misconfigurations, outdated components, and unnecessary test scripts.
- Perform network operations analysis via management platforms, scanning tools, PCAP captures, and log reviews.
- Advise stakeholders on cyber risks, mitigation options, and policy implications.
- Ensure risk mitigation considerations are embedded early in development and design cycles.
- Maintain and communicate progress through status reports, case documentation, and mitigation summaries.
**Required Skills**
- CISSP certification.
- Expertise in analyzing IT systems for security vulnerabilities.
- Proficiency with architecture design, IP data flow analysis, encryption configuration, and vulnerability assessment using tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, BackTrack.
- Experience reviewing firewalls, routers, switches, VPNs, IDS/IPS for security gaps.
- Knowledge of protocols: IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232.
- Working knowledge of Windows, Linux, macOS, including versions 7–10, 2008R2, 2012, 2016.
- Familiarity with cloud platforms and hypervisors (Hyper‑V, VMware ESX, VirtualBox).
- Experience with cross‑domain appliances, DR architectures, network management, backup systems.
- Proven ability to conduct procurement analysis for security compliance.
- Strong written communication for concise, structured assessments.
**Required Education & Certifications**
- CISSP certification.
- Valid Poly clearance.