New

Cybersecurity Engineer, Senior Manager

San Antonio, Texas

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

 

Cybersecurity Engineer, Senior Manager

Two Six Technologies is seeking a visionary Cybersecurity Engineer, Senior Manager to architect, build, and defend the highly secure environments that power our advanced R&D initiatives. We are looking for a true security architect who can seamlessly bridge the gap between rigorous government security frameworks (NIST, STIGs, CMMC) and complex operational engineering. In this role, you will lead the strategic design of our secure infrastructure, guide DevSecOps integration across software projects, and engineer pragmatic, intent-based security solutions. If you excel at deconflicting stringent compliance mandates with real-world engineering challenges, and thrive in a role that spans infrastructure defense, network architecture, and application security, we want you to lead our team.

Preferable locations are San Antonio TX and Arlington VA. The role is considered hybrid, and would require at least 3 days a week in the office at either location.

 

Key Responsibilities

  • Strategic Security Architecture: Architect custom security solutions that deconflict stringent government compliance requirements with critical operational needs. Move beyond standard "box checking" to design risk-optimized, tailored controls.
  • Intent-Based Engineering: Engineer alternative technical solutions when literal remediation causes operational failure. Leverage deep system knowledge and industry best practices to meet the core security intent of a framework while maintaining system functionality.
  • Design & Implementation: Lead the hands-on technical development, configuration, and deployment of secure IT infrastructure and custom security tools, ensuring all architectures are defensible during an audit.
  • Threat Defense & Mitigation Strategy: Develop high-level strategies, playbooks, and architectures for threat detection and incident response. Oversee the vulnerability mitigation lifecycle, guiding the team's efforts so that day-to-day monitoring is handled by staff while the Lead focuses on proactive, structural defense improvements.
  • Collaborative Security: Partner with development and IT teams to seamlessly integrate security and compliance into CI/CD pipelines and software development lifecycles while supporting innovation.
  • Team Leadership & Mentorship: Direct a small team of security professionals across multiple projects. Mentor junior team members on how to balance strict compliance auditing with pragmatic, operational engineering solutions.

Required Skills & Qualifications

  • Education: Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or comparable experience.
  • Leadership: Experience managing small interactive teams.  Candidates will be required to task junior reports, and should have strong mentorship skills.
  • Strategic Risk & Compliance Mastery: Deep understanding of NIST 800-171, NIST 800-53b, CMMC, and DISA STIGs. Proven ability to interpret the underlying risk objective of a control to engineer solutions that satisfy auditors without breaking operations.
  • Advanced Systems Expertise: Deep technical mastery of operating systems (primarily RHEL/Linux). Must possess the system-level knowledge (e.g., Linux internals, process management) required to design custom, defensible security configurations backed by vendor documentation when standard STIG guidance is insufficient.
  • Operational Deconfliction: A highly analytical mindset with a track record of identifying conflicts between security mandates and operational uptime, and successfully architecting "semi-custom" solutions that keep risk to an acceptable minimum.
  • Network Security Architecture: Strong architectural understanding of secure network paradigms (e.g., Zero Trust, macro/micro-segmentation) and fundamentals. Ability to guide the implementation of complex boundary defenses and validate network security controls.
  • Application Security & Code Analysis: High technical competency in application security principles. Must be capable of analyzing SAST tool outputs, architecting defensible arguments for false positives to present to customers, and providing strategic guidance to developers on resolving legitimate vulnerabilities.
  • Security Automation: Strategic approach to automating repetitive security operations using scripting and CI/CD pipelines. Proven ability to build self-sustaining security workflows that free up engineering staff to focus on high-complexity problems.
  • Clearance:  Eligibility to obtain and maintain a security clearance up to TS/SCI. 

Preferred Experience

  • Advanced Code Review: Practical experience reading, reviewing, and defending SAST findings in compiled languages such as Java, Golang, or C and/or interpreted languages like Python or NodeJS.
  • DevSecOps & Containerization: Hands-on experience architecting secure CI/CD pipelines and software development workflows utilizing platforms like Jenkins, GitHub, or GitLab. Familiarity with securing OCI-compliant container ecosystems (e.g., Docker) is highly desirable.
  • Virtualization & Cloud Architecture: Experience securing, architecting, or managing hyperconverged virtual infrastructure (specifically VMware or Proxmox) and/or cloud-native enterprise environments (e.g., AWS).
  • Enterprise Boundary Defense: Practical experience engineering, deploying, or migrating advanced enterprise firewall and network security solutions (e.g., Fortinet).
  • Specialized Enclaves & R&D Networks: Proven experience designing, auditing, or managing compliance for research and development (R&D) environments, specifically involving the creation or maintenance of CMMC Level 2 compliant networks.
  • AI Security Oversight: Experience implementing security guardrails for teams using AI-assisted coding tools (e.g., Cursor, GitHub Copilot, Gemini).
  • Automated Compliance: Ability to translate security mandates into Policy-as-Code to ensure rapid, AI-generated deployments remain compliant with NIST/CMMC frameworks.
  • AI Risk Assessment: Practical understanding of the OWASP Top 10 for LLMs and how to mitigate risks related to prompt injection and AI-generated code vulnerabilities.
  • Clearance:  Active TS/SCI clearance

Clearance Requirements:

  • This position requires eligibility to obtain and maintain a security clearance up to TS/SCI

#LI-MS1

#Hybrid

 

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range

$163,500 - $225,400 USD

Apply for this job

*

indicates a required field

Phone
Resume/CV

Accepted file types: pdf, doc, docx, txt, rtf

Cover Letter

Accepted file types: pdf, doc, docx, txt, rtf


Select...
Select...

For more information on clearances, review this document

Select...
Select...
Select...
Select...
Select...
Select...

Voluntary Self-Identification

For government reporting purposes, we ask candidates to respond to the below self-identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.

As set forth in Two Six Technologies’s Equal Employment Opportunity policy, we do not discriminate on the basis of any protected group status under any applicable law.

Select...
Select...
Race & Ethnicity Definitions

If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:

A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.

A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.

An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.

An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.

Select...

Voluntary Self-Identification of Disability

Form CC-305
Page 1 of 1
OMB Control Number 1250-0005
Expires 04/30/2026

Why are you being asked to complete this form?

We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years.

Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:

  • Alcohol or other substance use disorder (not currently using drugs illegally)
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
  • Blind or low vision
  • Cancer (past or present)
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or serious difficulty hearing
  • Diabetes
  • Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
  • Epilepsy or other seizure disorder
  • Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
  • Intellectual or developmental disability
  • Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
  • Missing limbs or partially missing limbs
  • Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
  • Nervous system condition, for example, migraine headaches, Parkinson’s disease, multiple sclerosis (MS)
  • Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
  • Partial or complete paralysis (any cause)
  • Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
  • Short stature (dwarfism)
  • Traumatic brain injury
Select...

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.