
New
Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work.
Saviynt is looking for a professional, highly motivated and energetic Account Executive to drive regional enterprise sales for our disruptive IaaS Cloud Security, Access Governance & Privileged Access Management solutions in Wisconsin, Iowa, Minnesota, some of Illinois.The AE will combine good working knowledge of (IaaS & SaaS) Identity, Cloud Security orPAM technology with prospecting and sales skills.This person is ultimately responsible for the entire enterprise sales cycle within their territory and meeting or exceeding territory quota.
Account Executives are the primary interface to both Prospects and Customers and responsible for actively driving and managing day to day prospecting & selling activity in the region. This activity includes opportunity Discovery, Demo, RFP/RFI, Evaluation & POC stages of the sales process, working in conjunction with SE & Product Management Teams to identify & close new deals.
WHAT YOU WILL BE DOING:
WHAT YOU BRING:
Additional Information
If required for this role, you will:
- Complete security & privacy literacy and awareness training during onboarding and annually thereafter
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to):
> Data Classification, Retention & Handling Policy
> Incident Response Policy/Procedures
> Business Continuity/Disaster Recovery Policy/Procedures
> Mobile Device Policy
> Account Management Policy
> Access Control Policy
> Personnel Security Policy
> Privacy Policy
Posted 4 days ago
Identify unauthorized access
Gather evidence of monitoring
Posted 9 days ago
Safeguard the modern workplace from evolving cyber threats.
Utilize AI technology to proactively address security challenges.
Posted 9 days ago
Ensure the security of RemoteMore platform and user data.
Design and implement robust security measures.
Posted 9 days ago
Train AI systems for security weaknesses
Conduct ethical code injection attacks
Posted 26 days ago
- Implement security measures to protect Figma's design platform - Conduct security assessments to
dentify vulnerabilities - Respond to and mitigate security incidents - Ensure compliance with
Posted 31 days ago
* Oversee information security controls compliance * Conduct technical assessments and
Collaborate with stakeholders to maintain security posture * Drive infosec audits and ensure
Posted 31 days ago
Ensure secure application and system architectures are in place Collaborate with teams to integrate
security into design processes Perform threat modeling and evaluate potential risks Maintain
Posted 35 days ago
Interact with decision-makers | Identify qualified sales opportunities | Maintain detailed records
Achieve revenue objectives | Work with resellers and
Posted 35 days ago
Train AI systems, Identify security weaknesses, Ethical hacking, Cloud security, Compensation based
on
Posted 40 days ago
Understand customer pain points, Educate decision-makers, Create strategic plans, Overachieve
e goals, Collaborate with Sales
Posted 43 days ago
- Design and implement scalable security solutions - Lead collaborative design and implementation -
Implement automated security processes - Provide specification documentation - Conduct routine
Posted 53 days ago
Improve product security posture through threat modeling and secure implementation Enhance security
assurance activities such as pentests and vulnerability assessments Drive security tool adoption
Posted 63 days ago
. Enhance cybersecurity measures through proactive security assessments. •
. Conduct penetration testing to identify vulnerabilities and threats. •