~Deploy the solution for the newly acquired customers as per the defined scope of work. Act as a single point of contact for all deployment-related activities.
~Providing product demonstrations and showing the value add of Indusface ‘s solutions as and when required.
~Participate in prospect visits, providing product demonstrations both in-person as well as remotely and showing the value of Indusface ‘s solutions as per the requirement.
~Manage the technical needs of the existing strategic customer base and ensure that any escalations are amicably handled.
~Contribute towards building technical collaterals (Whitepaper/Case Studies/Blogs).
~Analyze and troubleshoot deployment issues in a timely manner. Expertise to identify and resolve technical issues.
~Own the deployment-related inquiries/technical issues and act as a primary point of contact.
~Conduct strategic customer training periodically. Including new feature training for existing customers.
~Conduct review meetings with the strategic customers periodically to highlight the solution ROI and enable them on the new feature releases.
~Maintaining personal technical level proficiency & apply them to find out specific use cases or technical solutions for target accounts.
~Act as a Voice of Customer and input the on-field feature/enhancement requirements to product team.
~Work closely with Managed Security team to promptly deliver the customer requirement.
~Provide technical assistance to Sales Engineers as and when required.
~Work independently and as a vital member of the Presales team.
~Technical Relationship building with the customers.
~Problem Solving ability to solve security, compliance, and data protection problems through our technology stack.
~Exceptional verbal and written communication skills.
~Presentation skills with high degree of comfort with both large and small audiences.
~Customer focus “I will get it done” approach to solving customer challenges.
~Trusted technical advisor. Ability to build strong relationships with senior security stakeholders and quickly build credibility and be viewed as a trusted advisor.
~Understanding of the Application Security, MXDR, Red Teaming, VAPT, Cloud Security
~Understanding of the cloud technologies AWS, AZURE etc.
~Understanding the working of TCP, UDP, TLS etc.
~Understanding of the DNS technology.
~Solid understanding of HTTP Protocol.
~Understanding of the Application-level vulnerabilities OWASP, SANS etc.