Virtual Infrastructure Engineer – Advanced Cyber Training Environments
•8 days ago
| Estimated Pay info | Based on similar jobs in your market$17 per hour |
|---|---|
| Hours | Full-time |
| Location | Arlington, VA Arlington, Virginia open_in_new |
About this job
h1 style="margin-top:24px;margin-bottom:5px;"span style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="color:#000000;"Job Title/span/span/span/b/span/span/span/span/spanbrspan style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"span style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="color:#000000;"Cyber#160;Virtualization Engineer/span/span/span/span/span/span/span/span/span/h1h1 style="margin-top:24px;margin-bottom:5px;"span style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="color:#000000;"Why IDS?/span/span/span/b/span/span/span/span/span/h1h1 style="margin-bottom:5px;"span style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"span style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="color:#000000;"IDS believes in resolving conflict, building innovative approaches to do so. Combining operational expertise with an intimate understanding of today#8217;s greatest challenges, we bring our customers the solutions required for success in a complex and multidimensional world. IDS tailors solutions for a diverse range of government, military, nonprofit, and public-sector clients./span/span/span/span/span/span/span/span/span/h1h1 style="margin-top:24px;margin-bottom:5px;"span style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="color:#000000;"Locations/span/span/span/b/span/span/span/span/span/h1span style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="color:#000000;"Arlington, VA/span/span/span/spanh1 style="margin-top:24px;margin-bottom:5px;"span style="font-size:20pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#0f4761;"span style="font-weight:normal;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="color:#000000;"Shifts Available/span/span/span/b/span/span/span/span/span/h1span style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"ispan style="color:#000000;"Please note, candidates must be flexible. Shift times are general hours; some projects may require earlier or later reporting based on customer requirements./span/i/span/span/spanbrbrspan style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#000000;"Job Description/span/span/span/span/b/span/span/spanbrbrspan style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="color:#000000;"SITE 525 is#160;seeking a highly skilled bCyber/b#160;bVirtualization Engineer/b to support the development and sustainment of advanced cyber training environments. This role involves hands-on engineering of secure, scalable, and AI-enabled virtual ranges that emulate realistic, adversarial network conditions across IT and OT domains. These environments are used for cyber mission rehearsals, red/blue/gray team operations, and full-spectrum cybersecurity exercises. Must be willing to travel up to 25%.#160;Responsible for designing, deploying, and maintaining advanced virtualized training environments that replicate realistic, large-scale, and adversarial network conditions. This position focuses on engineering and integrating dynamic, hypervisor-driven platforms and virtualization technologies to support cyber mission rehearsals, red/blue/gray team operations, and full-spectrum training exercises./span/span/span/spanbrbrspan style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#000000;"Key Duties/span/span/span/span/b/span/span/spanullispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Engineer and implement scalable virtualized environments leveraging hypervisors (KVM, VMware, Hyper-V), virtual machines, containers, and software-defined networking across hybrid, edge, and cloud infrastructures./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Implement and manage virtualization stacks including private cloud platforms, hypervisor clusters, and orchestration frameworks for large-scale, multi-tenant environments./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Develop automation and orchestration tooling for provisioning, snapshotting, and lifecycle management of virtualized assets using Infrastructure-as-Code and CI/CD pipelines./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Integrate advanced traffic simulation capabilities (burst, steady-state, geo-distributed, AI/ML-driven) to emulate realistic user and system behaviors within virtual ranges./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Build and maintain frameworks and tooling for user and NPC emulation across virtualized environments to enhance operational realism, including threat emulation and defensive toolsets for network monitoring, incident detection, and response./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Implement observability pipelines for performance monitoring, traffic replay, autoscaling validation, and centralized logging in production-grade virtual infrastructures./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Administer and secure hypervisor platforms and virtual networking components, ensuring isolation, resiliency, and compliance for mission-critical environments./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Manage network and server infrastructure including Active Directory, identity management systems, and virtualized security controls./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Integrate third-party virtualization and orchestration tools to improve fidelity and scalability of training environments./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Support exercise operations including setup, execution, troubleshooting, and real-time scenario management for White Cell operations./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Collaborate with technical working groups and stakeholders to validate and enhance virtualization strategies for cyber training environments./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Apply knowledge of OT systems (SCADA, ICS, PLCs, IoT/IIoT) within virtualized contexts for realistic emulation./span/span/span/span/span/span/li/ulspan style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"span style="color:#000000;"Relevant Technologies amp; Tools:/span/span/b/span/span/spanullispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Virtualization amp; Hypervisors: /span/bspan style="line-height:115%;"VMware ESXi/vSphere, KVM/QEMU, Microsoft Hyper-V, Proxmox, OpenStack /span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Virtual Infrastructure Management: /span/bspan style="line-height:115%;"VM lifecycle management, snapshotting, cloning, orchestration frameworks /span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Cloud amp; Containerization: /span/bspan style="line-height:115%;"Private cloud platforms, AWS, Azure, Kubernetes (K8s), Docker, Podman, hybrid and edge deploymentsb /b/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Networking amp; SDN: /span/bspan style="line-height:115%;"Virtual switches (vSwitch, vDS), software-defined networking, network segmentation, VPNs, dynamic Network-as-Code tools/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan lang="fr" style="line-height:115%;"Automation amp; IaC: /span/bspan lang="fr" style="line-height:115%;"Infrastructure-as-Code (Terraform, Ansible, Packer, /spanspan style="line-height:115%;"Helm, Nomad/spanspan lang="fr" style="line-height:115%;"), CI/CD integration for infrastructure /span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Performance amp; Observability: /span/bspan style="line-height:115%;"Metrics collection, centralized logging, traffic replay, load simulation, autoscaling validationb /b/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Security in Virtualized Environments: /span/bspan style="line-height:115%;"Identity management, Active Directory (GPOs, tiered admin scripts), secure isolation of virtual ranges /span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Cyber Range Engineering: /span/bspan style="line-height:115%;"Virtualized cyber training environments, adversarial network simulation, AI/ML-driven traffic emulation/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Traffic Simulation amp; User Emulation:/span/bspan style="line-height:115%;" Lariat, CMU GHOSTS, MITRE Caldera, Red Canary, Atomic Red Team, TRex, BreakingPoint, Locust, k6, custom Python/TypeScript scripts, AI-enabled agents/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Compliance amp; Assurance:/span/bspan style="line-height:115%;" NIST 800-series, ISO 27001, FedRAMP, CUI-compliant controls/span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="line-height:115%;"Monitoring amp; Control Interfaces:/span/bspan style="line-height:115%;" Custom dashboards for exercise operations, centralized scenario orchestration/span/span/span/span/span/span/li/ulbrspan style="font-size:11pt;"span style="line-height:115%;"span style="font-family:Calibri, sans-serif;"bspan style="font-size:14pt;"span style="line-height:115%;"span style="font-family:'Aptos Display', sans-serif;"span style="color:#000000;"Requirements/span/span/span/span/b/span/span/spanullispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Bachelor#8217;s or Master#8217;s degree in Cybersecurity, Computer Engineering, or related field./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"5+ years of experience in cyber engineering, network operations, or cyber range development./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Top Secret security clearance./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Proficiency in virtualization, containerization, and cloud technologies./span/span/span/span/span/span/lilispan style="font-size:11pt;"span style="color:#000000;"spanspan style="line-height:115%;"span style="font-family:Calibri, sans-serif;"span style="line-height:115%;"Experience with offensive and defensive cybersecurity tools and frameworks./span/span/span/span/span/span
Nearby locations
Nearby Job Titles
Registered Nurse Jobs Radiologic Technologist Jobs Fast Food Preparation Worker Jobs Applications Software Developer Jobs Driver JobsNearby Locations
Washington, DC Jobs Arlington, VA Jobs Alexandria, VA Jobs Bethesda, MD Jobs Virginia JobsNearby Companies
U.S. Navy Jobs MedStar Health, Inc. Jobs DoorDash Jobs Care.com Jobs MEDSTAR HEALTH JobsNearby Categories
Full-time Jobs Part-time Jobs Gig Jobs Posting ID: 1239767406 Posted: 2026-03-13 Job Title: Virtual Infrastructure Engineer