About CyberArk:
CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit our CyberArk blogs or follow us on X, LinkedIn or Facebook.
As a Competitive Researcher, your role will be to know CyberArk’s products and be the leading expert on the other competing products in the market. The role involves in-depth technological research of the features and properties of competing products, comparing them to CyberArk products, and identifying the advantages of CyberArk products.
Everything in accordance with legal and ethical compliance guidelines.
You will also be responsible for staying up to date with the latest trends and developments in the cybersecurity industry. Additionally, you will collaborate with various teams within CyberArk to provide insights and recommendations based on your research. Your findings will play a crucial role in shaping the future direction of CyberArk's product development and marketing strategies.
There are several interesting aspects of the role that will be detailed personally to suitable candidates only.
The role is technological, interesting, educational, and has a significant impact on the company and its products and sales.
#LI-OS1
QualificationsWhat You Need to Succeed
Previous experience in competitive \ technological \ cyber research or similar field. Be able to manage the IT aspect of software products, including network installation, configuration and deployments. Strong technical knowledge in a wide range of technologies, such as AWS, Azure, VMware, SSO, MFA, browsers, endpoint management, etc. Know attacking tools and attacker techniques and know the possible defenses against each of them, including simulating attacks. Deep understanding of security products and the cyber market. High analytical skills and ability to draw data-driven conclusions. Ability to work independently and as part of a team. Excellent written and verbal English communication skills.Highly motivated to succeed with a proactive approach, who is eager to make a significant impact on the company. Additional InformationHow You’ll Stand Out
Proven experience in competitive intelligence research in the Cyber Security or Identity fields. Proven experience in Security Research with vast technical knowledge. Proven IT experience, with knowledge in designing, building, and maintaining diverse technological environments, including software installation, configuration and deployment.