Are you passionate about making a positive impact and protecting the world from cybercriminals? If so, you may be a natural Venafi Warrior!
How you’ll be protecting the world:
As a Customer Success Manager at Venafi, you’ll be part of a ground-breaking team on our product portfolio. It’s up to us to educate customers on the value of machine identity management and what it can do for them. We are the experts: we dive in deep to understand what it takes to achieve the business outcomes for the customer. We work to ensure that they understand their opportunities and that all of their business goals with Venafi get met—no more outages!
You will actively manage a group of customers on their journey from getting implemented onwards. You’ll be the guide to our customers in understanding why machine identify management is important, and how they can creatively address their security needs. Venafi Customer Success Managers wield proven expertise building deep relationships and translating large, complicated customer environments into straightforward, measurable solutions.
Key Result Areas:
The ideal Venafi Warrior will be armed with:
What sets you apart?
More About Venafi:
Venafi is the undisputed leader in Machine Identity Management. Why? Because we created the category and are light years ahead of anyone that would consider competing! Gartner has recognized Venafi as number one in our space and as it turns out, one is NOT the loneliest number!
Venafi is the inventor of the technology that secures and protects machine identities. The Venafi platform provides visibility, intelligence, and automation for SSL/TLS, IoT, mobile, cloud native, Kubernetes, and SSH machine identity types. Many of the largest organizations in the world use Venafi. Billions of dollars have been spent protecting usernames and passwords and almost nothing managing machine identities—organizations are just now realizing that managing and protecting machine identities is as important as managing usernames and passwords. The bad guys know this and are using stolen or forged machine identities in their cyberattacks. In fact, Gartner says 50% of network attacks will use machine identities.
Come help us protect the world!
#LI-Remote
#LI-HA
...IRS CAREERS? Visit us on the web at This job is open to ~ Recent graduates Individuals who have graduated from an accredited... ...: A bachelor's degree or equivalent degree at an accredited college or university in computer science, engineering, information science...
...Job Description: Nanny/Housekeeper Location: Basking Ridge, NJ 07920 Hours: 7:00 AM - 3:00 PM, Monday - Friday Position:... ...shopping, picking up dry cleaning). Qualifications: Prior experience as a nanny or housekeeper is required. Must be organized,...
...Job Description Job Description Top Skills' Details 1. EndPoint Security Experience with Crowdstrike and Tanium - Crowdstrike is the most important tool but if they have both, that would be better. 2. Administrative Ability with a Mixture of Mac OS or Windows OS...
...WE WILL PAY TO TRAIN!! Consider a career in automotive sales with Smith Haven Auto Group, an award winning dealership that excels due to our professional sales process. Our high customer and employee satisfaction scores are because of how we do business. We are seeking...
...SUMMARY To provide NDT and quality-assurance support to the assigned projects and programs to ensure product meets customer quality requirements. POSITION DUTIES : Essential functions of the position include, but are not limited to: RT, PT, MT, UT, EC, VT...