Full-Time

ELK/Data Engineer

Ts/Sci

Posted on 4/15/2025

SMX

SMX

1,001-5,000 employees

Provides technology solutions for defense sector

Compensation Overview

$110.9k - $184.8k/yr

Mid, Senior

Fort Belvoir, VA, USA

In Person

This is a full-time onsite position.

US Top Secret Clearance Required

Category
Data Management
Data Analysis
Data Engineering
Data & Analytics
Required Skills
TCP/IP
Splunk
Kibana
Linux/Unix
Requirements
  • Active Top Secret (TS) security clearance with eligibility for SCI and NATO read-on before starting work.
  • Meet DoD 8140 / 8570.01-M requirements for a privileged user on a TS/SCI information system before commencing work.
  • CISSP, CISM, or equivalent certification.
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field OR 10+ Years experience with Enterprise SIEM Data Observability and Reporting (Splunk/Elastic)
  • Thorough understanding of cybersecurity principles, best practices, and emerging threats.
  • Proficiency in vulnerability scanning and cybersecurity tools, including Tenable.
  • Security Information and Event Management (SIEM) systems: Splunk, Elastic, Logstash, Kibana (ELK)
  • Data broker technologies: Cribl, Confluent
  • Operating Systems Security Events: Windows, Linux
  • Networking protocols: TCP/IP, DNS, DHCP, HTTP/HTTPS
  • Cybersecurity tools and technologies: IDS/IPS, firewalls, host based security, threat intelligence platforms, vulnerability management tools
  • Advanced knowledge of Security Incident and Event Management (SIEM) tools, vulnerability management, compliance, and cybersecurity principles.
  • Strong problem-solving skills to assess vulnerability risks and recommend effective remediation strategies.
  • Ability to convey technical findings clearly and succinctly to both technical and non-technical audiences.
  • Adept at collaborating with IT, security, and cross-functional teams to ensure timely and effective vulnerability remediation.
  • Meticulous in documenting and reporting vulnerabilities, ensuring compliance and audit readiness.
  • Knowledge of DoD, Army, and IC regulations, standards, and compliance requirements.
  • Keeps current with evolving threats, vulnerabilities, and cybersecurity mitigation techniques.
Responsibilities
  • Generate detailed automated reports on identified vulnerabilities, outlining their severity, potential impact, and recommended remediation steps.
  • Assess vulnerability assessment results and prioritize vulnerabilities based on their criticality, potential impact, and ease of exploitation.
  • Maintain accurate records of vulnerability assessments, reports, and remediation efforts for audit and compliance purposes.
  • Work closely with IT teams to oversee the application of security patches and updates that address identified vulnerabilities.
  • Collaborate with incident response teams to address vulnerabilities that have been exploited or may be exploited during a security incident.
  • Collaborate with cross-functional teams, including regional support groups, to ensure the swift resolution of vulnerabilities.
  • Stay updated on the latest threat intelligence, new vulnerabilities, and mitigation strategies, particularly in DoD, Army, and IC environments.
  • Participate in security awareness programs to educate employees on vulnerability reporting and the use of automated reporting tools.
  • Design and develop data pipelines and architectures to ingest, process, and analyze large datasets from various cybersecurity sources, including network logs, system calls, and threat intelligence feeds.
  • Develop and implement data visualization and dashboarding solutions to provide real-time insights and situational awareness to cybersecurity analysts and stakeholders.
  • Collaborate with cybersecurity teams to integrate data-driven solutions with existing security tools and systems, including SIEMs, IDS/IPS, and threat intelligence platforms.
  • Ensure compliance with DoD, Army, and IC regulations, task orders, bulletins, and standards related to vulnerability management.
  • Clearly convey findings and recommendations to both technical and non-technical stakeholders, including management.
Desired Qualifications
  • Advanced certifications such as Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), and GIAC Vulnerability Assessment Professional (GVAP).
  • Experience in a DoD, Army, or Intelligence Community environment with a focus on vulnerability management.
  • Familiarity with automation tools and scripting languages (such as Python and PowerShell) to improve vulnerability reporting processes.

SMX Tech provides technology solutions aimed at improving business operations and mission capabilities, primarily in the technology and defense sectors. Their offerings include a platform and capability enhancement services that help clients, such as government agencies and defense contractors, achieve operational efficiency and mission success. SMX Tech generates revenue through long-term contracts and partnerships, exemplified by their recent agreements with Fusion Technology and Torchlight AI. The company is distinguished by its commitment to quality, holding several certifications like CMMI Maturity Level 3 and ISO 9001, which ensure their solutions meet high standards. Additionally, SMX Tech has been recognized as a top workplace, reflecting their focus on employee satisfaction and a positive work environment.

Company Size

1,001-5,000

Company Stage

Acquired

Total Funding

N/A

Headquarters

Hollywood, Maryland

Founded

1995

Simplify Jobs

Simplify's Take

What believers are saying

  • Growing demand for ISR due to geopolitical tensions boosts SMX's market potential.
  • Increased government spending on digital transformation aligns with SMX's service offerings.
  • SMX's acquisition of cBEYONData enhances their financial analytics and data visibility capabilities.

What critics are saying

  • Increased competition in ISR could impact SMX's market share.
  • Rapid technological changes in cloud computing may challenge SMX's solution updates.
  • Integration challenges from cBEYONData acquisition could disrupt SMX's operations.

What makes SMX unique

  • SMX offers advanced C5ISR and computing solutions for defense and technology sectors.
  • The company holds prestigious certifications like CMMI Maturity Level 3 and ISO 27001.
  • SMX's strategic partnerships, like with DZYNE Technologies, enhance their ISR capabilities.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Paid Vacation

401(k) Retirement Plan

Remote Work Options

Company News

GovCon Wire
Jul 3rd, 2025
Michael Lehr Joins SMX as Space & Intel SVP

Government technology firm SMX has appointed Michael Lehr, an aerospace and defense industry veteran, as senior vice president of space and intel.

The Tech Outlook
Jun 9th, 2025
SMX Welcomes Scott Barr as Chief Operating Officer to Accelerate Next Phase of Growth

SMX welcomes Scott Barr as Chief Operating Officer to accelerate next phase of growth.

Intelligence Community News
May 8th, 2025
SMX and DZYNE Technologies partner to advance ISR

On May 5, SMX announced a strategic partnership with DZYNE Technologies to advance the future of intelligence, surveillance, and reconnaissance (ISR).

GovCon Wire
Apr 2nd, 2025
SMX's Peter LaMontagne Receives 2025 Wash100 Award

SMX's Peter LaMontagne receives 2025 Wash100 Award.

GlobeNewswire
Feb 11th, 2025
Smx Announces Acquisition Of Cbeyondata

HERNDON, Va., Feb. 11, 2025 (GLOBE NEWSWIRE) -- SMX, a leader in next-generation mission support, digital transformation, and IT solutions, today announced the acquisition of cBEYONData. cBEYONData is a provider of implementation, design, and managed service capabilities, as well as a proprietary portfolio of budget management and financial analytics solutions that provide real-time data visibility and transparency to customers within the Department of Defense (DoD) and federal civilian agencies. Together, SMX and cBEYONData (collectively the “Company”) are well-positioned to support customers across the public sector, helping them achieve enhanced visibility, operational efficiency, and financial transparency, each key priorities of Congress and the new administration.The acquisition creates a leading provider of differentiated digital transformation capabilities, offering a tailored set of solutions that help government customers manage their increasingly complex financial, planning, and analytical needs. Expertise spans across top financial platforms like Oracle, SAP, and Momentum, while ensuring enhanced scalability, flexibility, and security driven by the Company’s strong relationships with leading cloud infrastructure providers such as Amazon Web Services, Microsoft Azure, and Google Cloud.Combined, the Company’s deepened capabilities provide meaningful growth and cross-selling opportunities across its base of complementary customers driven by its end-to-end portfolio of specialized enterprise data and system solutions. One example is CFO Control Tower®, a software suite designed to seamlessly integrate with government ERP systems and provide real-time financial data analytics, robust budget planning capabilities, and enhanced collaboration and automation tools

INACTIVE