ITC is a Woman Owned Small Business delivering exceptional consultation to the U.S. Government in Systems/Software Engineering, Cybersecurity Solutions, Mission Operations/INTEL Analysis, and Management Services in order to enable our customers to solve the most challenging problems. With continued growth comes opportunity, and we are currently searching for a Top-Secret SCI with polygraph-cleared Senior-level Cyber Security Engineer. Responsibilities: Technical Analysis & System Design Analyze user needs and software requirements to determine design feasibility within time and cost constraints. Evaluate information to recommend and plan computer specifications, system layouts, and peripheral equipment modifications. Review and refine existing programs to reduce operating time, increase efficiency, and improve techniques. Collaborate with systems analysts, engineers, programmers, and other stakeholders to design systems and define performance requirements, capabilities, and interfaces. Gather and assess information on reporting formats, costs, and security needs to determine optimal hardware configurations. Estimate software development costs and schedules. Consult with customers on software system design, development, and maintenance. Work with engineering teams to evaluate hardware/software interfaces, define specifications, set performance requirements, and resolve customer issues. Partner with data processing and project managers to understand project limitations, capabilities, and requirements. Prepare detailed reports and correspondence outlining project specifications, activities, progress, and status. Evaluate cost, reporting, and security factors to ensure hardware configurations align with project goals. Security System Design & Deployment Implement and upgrade new security assets—including software, hardware, and network security components—in virtual and/or physical environments. Security Maintenance Maintain and repair existing security systems, performing replacements or upgrades as needed. Vulnerability Management Conduct system scans and simulations to identify weaknesses in IT infrastructure and develop mitigation strategies. Reporting & Recommendations Document findings from security tests or breaches and present actionable recommendations for security enhancements to management. Policy & Procedure Development Develop, implement, and manage security policies and best practices to prevent future incidents and strengthen organizational resilience.