Cyber Range Engineer

Axom Technologies Inc.Fort Meade, MD

About The Position

By Light Professional IT Services LLC readies warfighters and federal agencies with technology and systems engineered to connect, protect, and prepare individuals and teams for whatever comes next. Headquartered in McLean, VA, By Light supports defense, civilian, and commercial IT customers worldwide. Cole Engineering Services (CESI), a By Light company, is recognized as a premier provider of modeling and simulation (M&S) training solutions to the Federal Government and industry. Since 2004, CESI has been at the forefront of developing, maintaining, and integrating simulation-based training, serious gaming, technical services, training and other support in live, virtual, constructive, and gaming (LVCG) domains. CESI also designs, builds and runs infrastructure, platforms, applications and processes that enable cyber training for the integrated multi-domain force. Our vision is to become a worldwide full spectrum LVCG and cyber training/analysis developer, integrator and services provider.

Requirements

  • Bachelor’s degree in a technical discipline such as information technology, computer science, systems or software engineering from an accredited college or university or 6 years of relevant experience can be substituted for degree.
  • 5+ years of combined experience with Computer Network Operations (CNO)/ Computer Network Exploitation (CNE)/ Computer Network Defense (CND) platforms, cyber training, validation exercises, and working with cyber protection teams (CPTs), including planning, coordinating, and execution.
  • Current DoD 8140/8570 IAT Level II Certification
  • Relevant networking engineering certification
  • Relevant Cloud/VMware certification
  • Relevant certification in RedHat/Linux/Windows
  • Working knowledge and hands-on experience in both Windows and Linux operating system environments.
  • Experience working with VMware and supporting systems within virtualized environments.
  • Proven ability to troubleshoot network connectivity, performance, and configuration issues involving DNS, routing, and TCP/IP.
  • Intermediate knowledge of defensive and offensive cyber tools and techniques.
  • Must be a self-starter in a fast-paced environment and able to work with a range of engineers holding a diverse set of skills at differing levels of experience.
  • Effective written and oral communication with multiple levels of leadership involving both business and technical sides of the business.
  • Able to prioritize multiple tasks, projects, and demands.

Nice To Haves

  • Familiarity with or experience supporting the Joint Event Life Cycle (JELC).
  • Experience supporting cyber training and validation exercises, including planning, coordination, and execution with Cyber Protection Teams (CPTs).
  • Experience using SIEMs, intrusion detection systems, or threat intelligence platforms to support cybersecurity operations.
  • Experience using scripting or automation tools to streamline cybersecurity operations or environment setup.

Responsibilities

  • Support the planning, build, and execution of cybersecurity training, mission rehearsal, and validation events within cyber range environments.
  • Build and configure cyber range content (virtual machines, virtual networks, accounts/roles, tooling, and exercise injects) to meet event objectives and scenario design.
  • Implement and operate offensive and defensive training content, including red cell tools, defensive sensors, and supporting applications, under established design guidance.
  • Provide event support during execution windows, including environment readiness checks, user access support, troubleshooting, and rapid issue resolution.
  • Configure and maintain Windows and Linux hosts used in training environments, including patching, baseline configuration, and restoration of lab state as required.
  • Deliver virtual infrastructure and network support (VMware, routing/switching constructs, DNS, TCP/IP), including diagnosing connectivity and performance issues across range enclaves.
  • Coordinate with content developers, exercise staff, and stakeholders to capture requirements, track tasks, and communicate status, risks, and impacts.
  • Develop and update technical documentation (build notes, runbooks, diagrams, and after-action inputs) to support repeatable event delivery and knowledge transfer.
  • Identify repeat issues and contribute to continuous improvement by recommending and implementing process, automation, or standard configuration updates.

Benefits

  • Occasional travel may be required up to 10% of the time.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service