SafeBreach is a pioneer in the emerging category of Breach and Attack Simulation (BAS). The company's groundbreaking platform provides a "hacker's view" of an enterprise's security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes breach methods with an extensive and growing Hacker's Playbook™ of research and real-world investigative data. With headquarters in Sunnyvale, CA, the company is funded by Sequoia Capital, Deutsche Telekom Capital, Hewlett Packard Pathfinder, PayPal and investor Shlomo Kramer.
This highly visible and impactful role of Customer Success Manager (CSM), will be responsible for post-sales consulting, product implementation/deployment of SafeBreach platform, ongoing technical support and increase usage of SafeBreach platform by building relationship with all of customer accounts primarily focused on customers and prospects within USA. This position will require consultants to interface with customers and partners to offer in-depth product and technology consulting related to SafeBreach breach simulation platform, general hacker attack methods and techniques, key exploits used during simulation, make customers understand the breaches found and help them mitigate breaches in their environment. The successful candidate must be a self-starter, great customer advocate, capable of being highly productive with customers, delivering multiple quality customer engagements and deployments, able to handle technical support and deliver excellent customer satisfaction. Another key responsibility for this role is to develop bonding and continuous relationship with customers to achieve 0% churn rate resulting in continuous renewal and up sell opportunities for SafeBreach.
This is an individual contributor role, and does not have any managerial function(s), but has lots of potential to grow into building a team.
Key responsibilities Summary:
This position requires strong technical skills and solid experience working with Cloud technologies, Application Proxies, Internet Security, Networking, data security and other data center Technologies.