hero

Explore open opportunities in our portfolio companies

Vertex Ventures Israel
Vertex Ventures Israel
52
companies
384
Jobs

Technical Account Manager

Cymulate

Cymulate

IT, Sales & Business Development
Madrid, Spain · Remote
Posted on Friday, June 21, 2024

Make Your Mark

Cymulate’s Continuous Security Validation enables companies to challenge, assess and optimize their cyber-security posture against the evolving cyberthreat landscape, simply and continuously.

With world-class clients like YMCA, Brinks, and EuroNext we strive to bring the highest level of service to everything we do. Our team is made up of the very best people for the job and as we grow, we’re always on the lookout for people with the skills, experience, and personality that will let us both shine. With high scores on Gartner and Glassdoor, our clients and employees have let us know what they love about us.

What you will do:

  • Serve as the primary contact liaison for technical questions or escalations, collaborating with Support, Product Management, and other relevant teams
  • Help customers develop success plans, outlining critical goals and key performance indicators, and provide guidance in achieving these objectives. Measure customers’ achievement of these key performance indicators and report those both internally and externally
  • Collaborate with Cymulate Account management teams to secure contract renewals
  • Assist in identifying opportunities for expanding Cymulate’s usage across the customer’s organization
  • Lead POCs for upsells and participate in pilot results presentations, QBR’s and ABR’s with key accounts

What you will have:

  • 3-5 years of experience in customer success/ project management role with a proven track record of success, particularly in managing major accounts
  • Comfortability speaking and reading in English and Spanish
  • Technical experience in the cybersecurity field with good analytical and project management skills
  • Proactive approach to problem solving with the ability to make independent decisions
  • Identify problems and address them internally to drive resolution with tech support team
  • Proven track record of building and maintaining relationships with enterprise clients, driving customer success, and exceeding performance targets
  • Excellent communication and interpersonal skills, with the ability to effectively engage with stakeholders at all levels of an organization
  • Ability to multi-task and thrive in a fast-paced environment

What you will have experience with:

  1. Cybersecurity Practices: Knowledge of cybersecurity practices to protect client data is essential.
  2. Network Security: Understanding of network protocols, firewalls, intrusion detection systems, and other technologies used to protect data in transit.
  3. Data Security: Familiarity with encryption, tokenization, and key management principles, as well as the use of security measures such as DLP (Data Loss Prevention), IAM (Identity and Access Management), and PAM (Privileged Access Management).
  4. Cloud Technologies and SaaS Metrics: As businesses increasingly rely on cloud services, mastering cloud technologies and understanding SaaS metrics is crucial.
  5. Infrastructure Security: Understanding of how to protect the infrastructure of an organization, including its network, servers, and databases.
  6. Incident Response: Ability to respond to security incidents effectively and efficiently, minimizing impact and recovering normal operations as quickly as possible.
  7. Security Engineering: Knowledge of designing and implementing secure systems to prevent security breaches.
  8. Security Operations: Familiarity with the day-to-day activities involved in maintaining security, such as monitoring for and responding to security incidents.
  9. Security Architecture: Understanding of how to design a system’s structure to ensure it is secure from threats.
  10. Cloud Security: Knowledge of the unique security challenges associated with cloud computing and how to address them.
  11. Blue Teaming/Red Teaming: Experience with defensive (blue team) and offensive (red team) security practices to identify vulnerabilities and strengthen defenses.
And always, continuous learning and staying updated with the latest trends and technologies in these areas is key in the rapidly evolving field of cybersecurity.