Network Engineer
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security, IT Support
Network Engineer
Contingent Upon Contract Award
Company OverviewDutch Ridge Consulting Group, LLC (DRCG), a United States (US) Small Business Administration (SBA) Certified Service-Disabled Veteran-Owned Small Business (SDVOSB) and ISO 9001:2015 Certified Company was established in 2016. DRCG is 100% US owned, has over 50 employees, and provides high-quality support staff at ten client locations throughout the US, with corporate offices in Ashburn, VA and Beaver, PA. DRCG delivers expertise in Cybersecurity Engineering and Operations;
Cyber Threat Intelligence;
Insider Threat Prevention and Detection;
Information Technology Solutioning;
Systems Integration;
Program Management;
Policy, Planning, Communications, and Compliance Support;
Workflow Solutioning;
Risk Management;
Business Process Reengineering; and Professional Business Consulting Services. DRCG's technical approach optimizes client investments by leveraging expertise in managing growth and transformation of existing IT environments.
Plan, design, install, configure, test, operate, maintain, and manage network components including hardware, software, and operating systems that permit information sharing across the full spectrum of transmission using all media in support of Information Technology (IT) infrastructure supporting cyber OT&E. Systems include (but are not limited to) NIPR/SIPR networks, exploitation toolsets, circuits, and business systems. Support the security of information and information systems according to DoD and DON policies and guidance.
Administer and maintain designated IT infrastructure, including network and system security, patch management, reviewing system logs, monitoring system activities, maintaining user access administration, generate backup and recovery planning, maintaining physical security, and disabling unnecessary services. Additionally, create and update certification and accreditation artifacts, as well as assess cybersecurity compliance requirements to support RMF of systems. Provide vulnerability analysis and detailed trend reports which drive architecture design, tailored network defense response options and perform forensic analysis to maintain the Navy defensive posture and initiatives.
and Responsibilities
Provide network engineering and administration of multi classification networks:
- Establish virtual environments tailored to support scheduled cyber OT&E events in timely manner; test and validate virtual environment prior to test execution and provide troubleshooting support during test execution.
- As required, package, maintain, and deploy the cyber OT&E toolset and flyaway kits in support of mission.
- Administer and maintain the cyber test infrastructure, including installing patches, hardening systems, reviewing system logs, monitoring system activity, maintaining physical security of all associated hardware, and disabling unnecessary service.
- Design, implement, and administer enclaves supporting penetration test team with implementation of computer network security, military system specifications, and DoD cybersecurity in accordance with Information Assurance Vulnerability (i.e. IAVA, IAVB) notices, STIG, Tasking Orders, Warning Orders, Fragmentary Orders, and security architecture policies.
- Apply virtual hosting and server technology into network architectures.
- Configure network infrastructure to support test team user environments used for testing as well as on‑keyboard training evolutions.
- Support the planning/engineering and acquisition of hardware and software.
- Brief government leadership weekly.
- Knowledge of the organization's enterprise information security architecture system.
- Knowledge of network access, identity, and access management (e.g., PKI).
- Knowledge of network design processes, including security and operational objectives.
- Knowledge of network security architecture concepts, including topology, protocols, and principles (e.g., defense‑in‑depth).
- Knowledge of cybersecurity principles and organizational requirements (e.g., confidentiality, integrity, availability, authentication, non‑repudiation).
- Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).