Threat Systems Engineer

Command Post Technologies, Inc.Huntsville, AL

About The Position

Command Post Technologies (CPT) is seeking an experienced Threat Systems Engineer to support continuous cyber and electronic warfare threat operations across a distributed Multi-Domain Operations (MDO) environment. This role is focused on engineering, implementing, configuring, and validating cyber threat systems, defensive cyber controls, and supporting infrastructure used to replicate adversary capabilities within high-fidelity threat emulation environments. This position translates threat intelligence and engineering direction into executable system configurations, ensuring emulated systems accurately replicate adversary behavior, infrastructure, and operational effects while maintaining system stability, repeatability, and security. It is primarily aligned to operational support, with additional responsibilities supporting cyber implementation, technical validation, and lifecycle sustainment across live, virtual, and constructive environments. This role requires hands-on engineering expertise with offensive and defensive cyber tools, strong understanding of adversary infrastructure and defensive architectures, and the ability to operate effectively within highly classified, compartmented environments supporting geographically distributed operations. Occasional travel may be required based on mission requirements.

Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, Systems Engineering, Information Technology, Computer Engineering, or a related technical discipline.
  • Minimum of 15 years of experience supporting cyber operations, threat systems engineering, cyber range operations, threat emulation, or closely related DoW mission environments.
  • Hands-on experience engineering, configuring, and validating offensive and defensive cyber tools within threat emulation, operational test, or cyber range environments.
  • Demonstrated understanding of adversary cyber infrastructure, defensive architectures, techniques, and operational employment.
  • Experience translating threat intelligence into executable system configurations and operational threat environments.
  • Ability to operate effectively in sustained, high-tempo operational environments across geographically distributed teams.
  • Active Top Secret clearance with SCI eligibility required.

Nice To Haves

  • Experience supporting cyber ranges, threat emulation platforms, or live, virtual, and constructive (LVC) environments.
  • Familiarity with modular or behavior-driven threat modeling approaches.
  • Experience supporting Army, joint, or other DoW multi-domain operations involving cyber and EW integration.
  • Experience operating across multiple classification levels in continuously operating mission environments.

Responsibilities

  • Engineer, configure, and implement cyber threat systems, defensive cyber controls, and supporting security mechanisms within threat emulation environments.
  • Translate threat intelligence, threat profiles, and engineering guidance into operational system configurations that replicate adversary infrastructure, behaviors, and system responses with high fidelity.
  • Support deployment, integration, and sustainment of threat systems across distributed cloud, hub, and Tactical Edge Device (TED) environments.
  • Ensure threat systems are configured to support operational realism while maintaining repeatability, stability, and control during training, testing, and mission execution.
  • Validate that emulated cyber and EW threat systems accurately represent adversary capabilities, techniques, and operational effects.
  • Conduct technical testing, tuning, and assessment of threat system configurations to verify functionality, defensive control effectiveness, and mission relevance.
  • Identify gaps, inconsistencies, or degraded fidelity within threat representations and recommend corrective actions, configuration updates, or system enhancements.
  • Support verification activities to ensure threat systems align with operational objectives and do not introduce unintended impacts to test or training environments.
  • Provide hands-on operational support during ongoing threat operations, exercises, and mission execution across classified environments.
  • Support cyber implementation activities including system hardening, configuration management, security control validation, lifecycle sustainment, and technical documentation.
  • Collaborate with systems engineers, threat intelligence personnel, and Government stakeholders to ensure threat systems remain aligned with evolving mission requirements and intelligence updates.
  • Contribute to technical reporting, engineering analysis, and system assessments supporting continued threat environment modernization.

Benefits

  • Great health benefits
  • Leadership training
  • 401k with generous company matching
  • Employee Stock Ownership Plan (ESOP)
  • Career professional development
  • Tuition reimbursement
  • Flexible hours
  • Work/Life balance
  • Rewards and recognition
  • Paid Time Off
  • Parental Leave
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service