For Candidates
For Candidates

I am...

dollar sign

Cybersecurity Sales Talent

Tabs

Technical Talent

Have you ever?

01
02
03
04
/
04
Abstract Diamond
01
/
04
Started a new job, only to find it wasn't what you were expecting?
Abstract Sunset
02
/
04
Wasted time with recruiters that ghost you or bring you jobs that don't fit?
how we work
03
/
04
Submitted a bunch of job applications with little to no response or feedback?
how we work
04
/
04
Wondered where to go for data-backed career advice?

You Have Found The Right Place

We take long term perspective, and want to be a resource throughout your career, not just to fill an open rec today
We want you to find incredible opportunities that are a good fit for you, whether they come from within or outside our jobs network
We look deeper than what’s on your resume, and want to get to know your personality, aspirations, and what makes you tick
Our goal: help you find work you love

How It Works

Cyber Lake
01.
Join Crux
Abstract
02.
Help us get to know you
Abstract Lightbulb
03.
Access jobs custom tailored to you
Abstract Cyber City
04.
Receive ongoing career resources and guidance
service
05.
Find work you love
Abstract Heart
05.
Find work you love

Recent Jobs

Managing Director Americas Head of Information Security
BNP Paribas
State
New Jersey
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
290.00
-
Not disclosed
350
Chief Information Security Officer
Trupanion
State
Washington
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
200.00
-
Not disclosed
250
Deputy CISO
New Relic
State
Oregon
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
202.00
-
Not disclosed
252
1665755678671.jpeg
On-site
State
Virginia
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Security Operations
Salary ($K)
103
-
224
Not disclosed
Protect and Defend
103

Description

US Citizenship with preference for TS/SCI and FSP

Are you interested in securing a large-scale distributed SaaS environment? Oracle's SaaS Cloud Security team is building new technologies that operate at high scale in our broadly distributed multi-tenant cloud environment. The Detections and Response Team plays a key role in enabling Oracle's Security vision, minimizing security incident-based losses and disruptions, facilitating efficient recovery from such incidents, and ensuring the implementation of controls to mitigate associated risk.

SaaS Cloud Security is looking for seasoned security analysts that possess and maintain a US Government Top Secret SCI w/ Polygraph Security Clearance to join our efforts in reshaping the cloud services landscape across industry verticals and solve difficult problems by designing and building innovative new systems to revolutionize the security of Oracle's SaaS portfolio of products.

The SaaS Cloud Security organization is responsible for securing enterprise-grade software services on behalf of our 25,000 customers, processing over 60 billion transactions per day.

We are building a global team of analysts that can work autonomously to carry out activities in the areas of detection and response to protect the Oracle SaaS environment. The team will be able to, collectively cover, the breadth and depth of: monitoring for Indicators of Compromise, being up to date with the latest third-party Threat Intelligence, responding to identified incidents including attack remediation, evidence collection and forensics. The team will also support the continual improvement of processes and technology used for maximizing automation of detection and response for SaaS.

Career Level - IC4

  • Perform hands-on activities including network and log analysis, malware analysis and threat hunting.
  • Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions.
  • Develop scripts, processes and content to improve response capabilities.
  • Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products.
  • Evaluate and recommend new and emerging security solutions and technologies to issues.
  • Effectively communicate security concepts with both technical and non-technical individuals.
  • Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response.
  • Deliver self-service security metric data of discovery, triage and trending analysis of team findings.
  • Author post mortem reports to be provided to senior leadership following an intrusion or red team engagement.
  • Participate in planning, designing, and executing tabletop exercises cross-functionally across Oracle for SaaS security incident planning.
  • Help define Threat Hunting use cases.
  • Participate in Red/Blue team activities.

Required Qualifications

  • Bachelor’s Degree in Computer Science, Information Assurance, Security, Management Information Systems, Risk Management, or equivalent work experience acceptable.
  • 4+ years of related cybersecurity architecture, engineering, SOC work experience (monitoring, incident response, forensics).
  • Strong understanding of typical intrusion life cycle, including privilege escalation, persistence, and lateral movement techniques.
  • Strong understanding of host and network Incident Response processes, tasks, tools, and industry operational best practices.
  • Understanding of MITRE ATT&CKTM knowledge base.
  • Strong and hands-on forensics experience/knowledge on Linux and Windows Operating Systems.
  • Excel customer service skills are required.
  • Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focus.
  • Excellent written and verbal communications, including presentation skills, are important to be successful in this role.
  • Proven ability to effectively communicate with all levels of the organization, as well as with external parties.

Preferred Qualifications

  • 2+ years of experience as an Incident Response or DFIR Analyst.
  • 2+ years of Python scripting experience preferred.
  • Degree in computer science or related field.
  • 4-8+ years of experience within the security department of a large cloud or Internet software company.
  • Ideal candidate should possess at least two of the following certifications:
  • SANS GIAC Cyber Threat Intelligence (GCTI)
  • SANS GIAC Network Forensic Analyst (GNFA)
  • SANS GIAC Certified Forensic Analyst (GCFA)
  • SANS GIAC Certified Forensic Examiner (GCFE)
  • SANS GIAC Certified Incident Handler (GCIH)
  • SANS GIAC Certified Intrusion Analyst (GCIA)
  • SANS GIAC Reverse Engineering Malware (GREM)
  • Certified Information Systems Security Professional (CISSP)
  • Offensive Security Certified Professional (OSCP)

Disclaimer:

Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.

Range and benefit information provided in this posting are specific to the stated locations only

US: Hiring Range: from $103,300 to $223,500 per annum. May be eligible for bonus and equity.

Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle’s differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.

Oracle US offers a comprehensive benefits package which includes the following:

  1. Medical, dental, and vision insurance, including expert medical opinion
  2. Short term disability and long term disability
  3. Life insurance and AD&D
  4. Supplemental life insurance (Employee/Spouse/Child)
  5. Health care and dependent care Flexible Spending Accounts
  6. Pre-tax commuter and parking benefits
  7. 401(k) Savings and Investment Plan with company match
  8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
  9. 11 paid holidays
  10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
  11. Paid parental leave
  12. Adoption assistance
  13. Employee Stock Purchase Plan
  14. Financial planning and group legal
  15. Voluntary benefits including auto, homeowner and pet insurance

The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.

No items found.
image.png
On-site
State
North Carolina
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Administrative
Salary ($K)
-
Not disclosed

Summary

Securiti solves challenges across governance, privacy, and security. With a foundation in data understanding and a team that was responsible for developing and deploying the market leading CASB & DLP technology, we were able to create a platform from the ground up that leverages automation and workflows to solve complex privacy, data, and security business challenges with a simplified interface promoting collaboration across the business. Ease of use, quick to deploy and customizable are all reasons why companies select Securiti versus stitching multiple vendors together to address their challenges.

Company Overview

As a CSM (Customer Success Manager) at Securiti, you will use your skillset to build key relationships, working closely with Directors/Managers of Data Security/Privacy/Governance, Data Engineers, Security Architects, and Privacy teams to implement best-in-class modules from Securiti’s Data Command Center. The CSM works with large enterprise and strategic customers and is accountable for ensuring these customers adopt and realize the recurring value from the Securiti Data Command Center. Your results will be increased customer satisfaction, value, retention, and expansion of the Securiti platform footprint.

  • Own and drive onboarding, adoption, and advocacy across a portfolio of customers.
  • Work with customers to build success plans, establish critical goals, and aid customers in achieving their objectives.
  • Design and execute a value roadmap for each customer in your portfolio.
  • Establish regular cadence calls (Weekly, Monthly, Quarterly) with each assigned customer.
  • Conduct Quarterly business reviews to ensure successful outcomes from Securiti solutions.
  • Review executive dashboards and program status, continually measuring and monitoring customer health metrics and KPIs.
  • Solidify your position as a trusted advisor/strategic advisor with all customers and drive continued value of our products and services.
  • Partner with Securiti Account Team (Account Executives, Solution Architects, Sales Engineers, and Training) to find opportunities for new usage of Securiti across organizational functions, and build contract renewal, upsell, and cross-sell opportunities.
  • Define success plans for at-risk customers and execute them in collaboration with the functional team.
  • Act as the voice of the customer internally to advocate customers’ needs.
  • Leverage internal tools to archive customer activity and other key data points.
  • Identify and communicate areas for improvement in the customer experience including both product and process.

Required Qualifications

  • 5+ years relevant work experience in customer success, consulting, post-sales technical account management or similar roles.
  • Strong consulting, project management and/or business analyst skills with proven results working as a trusted advisor to drive business value for customers, including the ability to interact with client teams at various levels of technical and non-technical depth.
  • Excellent written and verbal communication skills - able to simplify complex topics in a friendly and approachable manner for both executive and end-user audiences.
  • Strong knowledge of SaaS and Multi-cloud (AWS, Azure, GCP) architectures, as well as the traditional on-premise model
  • Solid understanding of complementary data security concepts, such as data discovery, DLP, encryption/tokenization, data masking, access control, rights management
  • Familiarity with various types of structured and unstructured data systems across SaaS, Multi-cloud and traditional, self-managed systems
  • Fundamental technological knowledge of networking environments
  • Experience installing and supporting enterprise software on Windows and UNIX platforms.

Preferred Qualifications

  • Previous experience with a Cyber/data security solutions company and/or an enterprise software company working with large enterprise customers is highly desired.
  • Prior experience with Securiti Software solutions is preferred or relevant experience with enterprise applications, security management, systems management, identity management, and/or policy management solutions.
  • Up to 30% travel

NA

No items found.
cato-networks-squarelogo-1565649209805.webp
On-site
State
California
Remote Elig.
On-site
Not disclosed
Seniority
Senior
Domain
Sales
Salary ($K)
280
-
380
Not disclosed
280

Welcome to the future of cloud networking and security!

Cato Networks is the first company to converge enterprise networking and security into one centralized and global service that is delivered by cloud. Cato’s unique technology inspired a brand-new product category, later named “SASE” by Gartner.

Cato is the brainchild of networking and security pioneers Shlomo Kramer (Check Point, Imperva) and Gur Shatz (Incapsula.) Cato Networks has raised $773 million dollars since 2015, achieving Centaur status with $200M+ in ARR, and a valuation of $3 billion dollars.

This is your opportunity to get on the rocket ship and join a company that is building a cutting-edge enterprise network and secure cloud platform and is on a fast track to becoming the worldwide market leader – don’t miss it!

If you are a high-energy, high activity Sales Representative with a track record of success and a keen interest in working with market innovators and thought leaders, join Cato Networks as a Regional Sales Director. We’ve developed network security as a service and secure, global SD-WAN (software-defined WAN) into a single, groundbreaking cloud-native carrier architecture called the Cato Cloud, the world’s first Secure Access Services Edge (SASE) platform. We are well funded from global leading VC’s, lead by recognized innovative leadership and growing quickly as we revolutionize networking and security to meet the critical needs of digital business.

  • As a Regional Sales Director, you will own a region, generating new business within the Inland Empire. In this role, you will lead revenue generation, develop new opportunities, manage the pipeline, build & execute account strategies, close large enterprise-level deals, and lead customer expansion for our networking and security solutions.
  • You will strategize and engage with enterprise-level customer IT executives creating a significant impact at a great company while building your sales career.
  • Reporting to Area Sales Director, Southern California with 40% travel.

Requirements

  • A true hunter with a strong track record of consistent Enterprise sales overachievement.
  • Track record of navigating large, complex deals and consistently achieving and exceeding quota.
  • Experienced in vendor technology sales (SaaS, Security, Networking) selling enterprise solutions/services to CISO’s & CIO’s.
  • Experience working for up-start, hyper-growth companies.
  • Deep understanding of a channel centric go to market approach, skilled at establishing and leveraging new and existing strategic alliance partner relationships.
  • A team player, able to work effectively cross functionally with senior management and corporate counsel.
  • Skilled at influencing stakeholders with compelling presentation and negotiation styles, successful at building and maintaining trusting relationships with associates and customers.
  • Committed to driving issues and contracts to close, demonstrating persistency despite obstacles while conveying a sense of urgency.
  • Background or education in engineering is an advantage.

A reasonable estimate of the salary for this role, at the time of posting, is $280,000-380,000. Cato operates from a high place of trust and transparency; we are happy to state the pay range for our open roles to best align with your needs. Exact compensation may vary based on skill set, experience, location, training, and certifications. If your requirements fall outside of this range, you are still welcome to apply.

As an EEO/Affirmative Action Employer all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status.

No items found.
Managing Director Americas Head of Information Security
BNP Paribas
State
New Jersey
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
290.00
-
Not disclosed
350
Chief Information Security Officer
Trupanion
State
Washington
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
200.00
-
Not disclosed
250
Deputy CISO
New Relic
State
Oregon
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
202.00
-
Not disclosed
252