Armis Federal is seeking a Sales Engineer (SE) to provide deep technical support for the Account Executive focused on the Department of Defense's European COCOMs and Foreign Military Sales (FMS). This role involves leveraging deep technical expertise in engagements with theater commands and mission owners. Key responsibilities include designing, demonstrating, and deploying the Armis platform within complex IT/OT/IoT environments to guarantee measurable mission-level value for our customers. What you'll do: Deliver technical demonstrations of the Armis platform tailored to DoD Combatant Commands and FMS mission needs Deploy and manage proof-of-value (POV) installations, owning the technical process end-to-end across labs, training ranges, and operational environments Troubleshoot complex networking and integration challenges, including SaaS, on-prem, and hybrid deployments Provide technical leadership during command-level engagements, conferences, and exercises, supporting Armis’s positioning in Zero Trust and mission resilience Collaborate closely with the AE and partner ecosystem to develop solutions aligned to COCOM requirements and acquisition pathways Produce technical documentation, diagrams, and written responses for customer queries, RFPs, and mission documentation Travel up to 40% across Europe, with additional travel to global COCOM and US sites as required What we expect: Education & Clearance: BS in Computer Science, Engineering, Cybersecurity, or related discipline (or equivalent experience/certifications) Active TS/SCI Clearance Technical Skills: Proven experience engineering cybersecurity solutions (SaaS and on-premises) into DoD and FMS networks Strong understanding of networking fundamentals: routing, switching, VLANs, subnets, ports and protocols, and port configuration Hands-on expertise with RHEL and Linux administration, containers, bare-metal builds, and system integration Proficiency with REST APIs, scripting, and automation (Python preferred; Bash or PowerShell acceptable) Familiarity with ATO/IATT Working knowledge of cybersecurity frameworks such as: NIST 800-82, RMF, DISA STIGs, etc. Familiarity with Application Security and CI/CD pipelines Familiarity with Security Operations Center activities to include Threat Hunting and adversary tactics techniques and procedures Understanding of Vulnerability Management programs and solutions including ACAS, Tenable/Nessus, CVEs, patch management, and CISA KEV catalog OT/ICS experience considered a strong plus