Are you passionate about making a positive impact and protecting the world from cybercriminals? If so, you may be a natural Venafi Warrior!
How you’ll be protecting the world:
As a Customer Success Manager at Venafi, you’ll be part of a ground-breaking team on our product portfolio. It’s up to us to educate customers on the value of machine identity management and what it can do for them. We are the experts: we dive in deep to understand what it takes to achieve the business outcomes for the customer. We work to ensure that they understand their opportunities and that all of their business goals with Venafi get met—no more outages!
You will actively manage a group of customers on their journey from getting implemented onwards. You’ll be the guide to our customers in understanding why machine identify management is important, and how they can creatively address their security needs. Venafi Customer Success Managers wield proven expertise building deep relationships and translating large, complicated customer environments into straightforward, measurable solutions.
Key Result Areas:
The ideal Venafi Warrior will be armed with:
What sets you apart?
More About Venafi:
Venafi is the undisputed leader in Machine Identity Management. Why? Because we created the category and are light years ahead of anyone that would consider competing! Gartner has recognized Venafi as number one in our space and as it turns out, one is NOT the loneliest number!
Venafi is the inventor of the technology that secures and protects machine identities. The Venafi platform provides visibility, intelligence, and automation for SSL/TLS, IoT, mobile, cloud native, Kubernetes, and SSH machine identity types. Many of the largest organizations in the world use Venafi. Billions of dollars have been spent protecting usernames and passwords and almost nothing managing machine identities—organizations are just now realizing that managing and protecting machine identities is as important as managing usernames and passwords. The bad guys know this and are using stolen or forged machine identities in their cyberattacks. In fact, Gartner says 50% of network attacks will use machine identities.
Come help us protect the world!
#LI-Remote
#LI-HA
...support our residents' daily living activities. We offer on-demand pay, flexible scheduling, and a supportive work environment.... ...for residents Requirements: - Active CNA certification - High school diploma or equivalent - Ability to work all shifts, including...
...nail heads with roofing cement or caulking to prevent water leakage and rust Cut roofing paper to size using knives and nail or staple roofing paper to roofs in overlapping strips to form bases for other materials Install partially overlapping layers of material...
...Estheticians as well as provides a variety of services and continuing education courses for licensed professionals. About the Business Manager Position : Atelier Esthetique Institute of Esthetics, a licensed and accredited post-secondary career school, is seeking a full...
...and trains host homes as well as provides support for youth who have entered the Connections Program. The Host Homes Specialist will work to create a supportive and welcoming environment for both youth and host home families. Cocoon House is committed to continually...
...visitors to the ambulatory clinic at ease. As an integral member... ...better for others. The RN Staff Nurse Ambulatory-Clinic is... ...and Scope of Practice for the Registered Nurse. The RN Staff Nurse Ambulatory... ...care for patients in an outpatient breast imaging center. The Breast...