np. Python, Warszawa, Startup

Cyber Sales Engineer

location-pointer-icon Europa
B2B
Sales
remote

We’re hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer’s infrastructure, and holding a technical conversation with a CISO.

About the Product

Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You’d be one of the first customer-facing engineers — shape how the POC motion runs, don’t inherit a process.

The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you’ll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.

What You’ll Be Doing

  • Own the full POC lifecycle — scoping, on-site setup inside the customer’s environment, running the autonomous pentest, interpreting findings, and delivering measurable business value
  • Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia
  • Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally
  • Drive onboarding and evaluation in real customer environments — not sandbox demos
  • Work with cybersecurity consultancies and channel partners to extend reach
  • Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you’re the signal
  • Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this

What We Expect

Must-have

  • 2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly
  • Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks
  • Real technical depth — comfortable reading architecture, running tools inside a customer’s infrastructure, interpreting findings, and defending them in a technical conversation
  • Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required
  • Excellent communication — able to simplify complex technical detail for CISOs and security architects
  • Advanced English (C1)
  • Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process
  • Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU)
  • Ability and willingness to travel in EU and Asia for on-site customer engagements

Nice to have

  • A “converted developer” background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role
  • Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ)
  • Experience with channel partners or cybersecurity consultancies
  • Prior work at an Israeli-headquartered tech company

Why This Role Is Worth Your Time

  • Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers
  • High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer
  • Variable compensation tied to what you actually ship — POC conversion, not activity metrics
  • Direct customer-facing exposure to top-tier security leadership across Europe and Asia
Newxel
Outstaff
< 10
Branża
Adtech/Advertising, Big Data, Embedded, GameDev, Fintech/Banking
Założona
2017

Ta strona używa plików cookie, aby zapewnić Ci lepsze wrażenia podczas przeglądania.

Dowiedz się więcej o tym, jak używamy plików cookie i jak zmienić preferencje dotyczące plików cookie w naszej Polityka plików cookie.

Zmień ustawienia
Zapisz Akceptuj wszystkie cookies