Question
5-10

Cyber Security Project Engineer

12/4/2025

The Cyber Security Project Engineer will document system risks, perform vulnerability analyses, and conduct hands-on penetration testing. They will also create testing plans, analyze results, and recommend countermeasures to management.

Working Hours

40 hours/week

Company Size

51-200 employees

Language

English

Visa Sponsorship

No

About The Company
Bespoke Technologies, Inc. (Bespoke) is an Woman-Owned Small Business (WOSB) offering strategic bespoke solutions in AI/ML, data science and mission operations in support of National Security programs. Through our years of experience we have supported multiple agencies - each with different missions, unique technology platforms, and varying visions on what defines success. We recognize one size does not fit all. Through developing bespoke innovative solutions to our customers, Bespoke can help you uncover the right solutions for your toughest business challenges.
About the Role

BT-171 – Cyber Security Project Engineer
Location: Herndon (fully on-site, no remote option)



**MUST HAVE A POLY CLEARANCE TO APPLY. Those who do not have a Poly clearance will not be considered.**



Introduction
Bespoke Technologies is seeking support specializing in penetration testing and ethical hacking, to target, assess, and exploit risk and vulnerabilities of information systems.  The intent is to provide senior decision makers with documented and actionable data to aid in making strategic investment decisions. 

Work Requirements
  • The Candidate shall document all identified system risks, planned test procedures, and results.
  • The Candidate shall perform analyses of vulnerabilities identified during testing.
  • The Candidate shall review program-level documentation such as requirements specification, system architecture, design documents, test plans, and security plans.
  • The Candidate shall create and document penetration testing plans and procedures.
  • The Candidate shall conduct hands-on penetration testing by leveraging approved testing plans and procedures.
  • The Candidate shall analyze penetration test results, document risks, and recommend countermeasures to uncovered risks.
  • The Candidate shall participate or lead technical exchange meetings and application review boards.
  • The Candidate shall document action items and results from technical exchange meetings and application review boards.
  • The Candidate shall brief management on the status of action items and results of activities.

Required Skills and Demonstrated Experience
  • Demonstrated work experience in cyber security or related IT field.
  • Demonstrated experience with cyber penetration testing.
  • Demonstrated experience leveraging adversarial tactics to conduct hands-on security testing.
  • Demonstrated experience applying computer attack methods and system exploitation techniques.
  • Demonstrated working knowledge of cyber security principles for Linux, Windows, and virtual platforms.
  • Demonstrated experience designing, testing, or implementing IT security architecture.
  • Demonstrated experience performing network security analysis.
  • Demonstrated experience analyzing network architectures.
  • Demonstrated experience using network management tools
  • Demonstrated experience developing risk management methodologies.
  • Demonstrated experience analyzing test results to develop risk and threat mitigation plans.
  • Demonstrated experience testing or reviewing system configuration, development, and design specifically around enterprise systems and hypervisors.
  • Demonstrated experience designing, testing, or implementing complex Windows installations.

Highly Desired Skills and Demonstrated Experience
  • Demonstrated experience participating in public and private information security groups and organizations.
  • Demonstrated experience communicating vulnerability results and risk posture to senior executives.
  • Demonstrated experience performing complex technical tasks with minimal direction.
  • A Bachelor's degree in Computer Science, Information Systems, Engineering, or other related scientific or technical discipline.
  • Two or more of the relevant certifications:
    • Offensive Security Certified Professional (OSCP)
    • Global Information Assurance Certification Penetration Tester (GPEN)
    • eLearn Security Certified Professional Penetration Tester (eCPPTv2)
    • Global Information Assurance Certification Web Application Penetration Tester (GWAPT)
Key Skills
Cyber SecurityPenetration TestingEthical HackingRisk ManagementNetwork Security AnalysisSystem Exploitation TechniquesLinuxWindowsVirtual PlatformsIT Security ArchitectureVulnerability AssessmentTechnical Exchange MeetingsDocumentationSecurity PlansTest PlansAdversarial Tactics
Categories
TechnologySecurity & SafetyEngineering
Apply Now

Please let Bespoke Technologies, Inc. know you found this job on PrepPal. This helps us grow!

Apply Now
Get Ready for the Interview!

Do you know that we have special program that includes "Interview questions that asked by Bespoke Technologies, Inc.?"

Elevate your application

Generate a resume, cover letter, or prepare with our AI mock interviewer tailored to this job's requirements.