We’re hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer’s infrastructure, and holding a technical conversation with a CISO.
Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You’d be one of the first customer-facing engineers — shape how the POC motion runs, don’t inherit a process.
The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you’ll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.
- Own the full POC lifecycle — scoping, on-site setup inside the customer’s environment, running the autonomous pentest, interpreting findings, and delivering measurable business value
- Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia
- Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally
- Drive onboarding and evaluation in real customer environments — not sandbox demos
- Work with cybersecurity consultancies and channel partners to extend reach
- Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you’re the signal
- Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this
- 2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly
- Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks
- Real technical depth — comfortable reading architecture, running tools inside a customer’s infrastructure, interpreting findings, and defending them in a technical conversation
- Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required
- Excellent communication — able to simplify complex technical detail for CISOs and security architects
- Advanced English (C1)
- Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process
- Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU)
- Ability and willingness to travel in EU and Asia for on-site customer engagements
- A “converted developer” background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role
- Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ)
- Experience with channel partners or cybersecurity consultancies
- Prior work at an Israeli-headquartered tech company
- Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers
- High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer
- Variable compensation tied to what you actually ship — POC conversion, not activity metrics
- Direct customer-facing exposure to top-tier security leadership across Europe and Asia