What You Will Do
- Serve as the cyber risk trusted advisor for your customers. You will simplify complex vulnerabilities, explain real-world attack scenarios, and guide customers toward the right cyber risk mitigation decisions.
- Lead Cyber Risk Advisory Sessions with customers where you will contextualize and prioritize vulnerability and exposure results, cyber risk trends, and overall security posture with the goal of facilitating positive security outcomes for your customers.
- Provide prioritized, context-driven cyber risk remediation recommendations, helping customers focus on the vulnerabilities most likely to be weaponized by the threat actors.
- Assist in monitoring customer environments for critical vulnerabilities, exposures, and emerging threats, escalating and advising on timely remediation.
- Ensure that our Managed Risk service translates into measurable reductions in your customers’ overall attack surface.
- Build professional, trust-based relationships with customers.
- Continuously develop your skills through mentorship and hands-on experience.
What You Will Bring
- 2-3 years of experience in cybersecurity or related IT fields.
- Strong knowledge of enterprise networking concepts (routing, switching, VLANs, firewalls, VPNs, and remote access technologies).
- Strong knowledge of vulnerability management, attack surface management (reduction), and common security frameworks (NIST, CIS, ISO, etc.).
- Hands-on experience with EASM/IASM tools, vulnerability scanning platforms, and remediation workflows.
- Excellent communication and advisory skills, with the ability to simplify technical findings for executives while going deep with technical teams.
- Proven ability to prioritize and manage multiple customer relationships, balancing consultative guidance with timely escalation of critical risks.
- A proactive, problem-solving mindset and the drive to help customers reduce their overall cyber risk.
Nice to have
- Industry certifications such as CompTIA Network+ or equivalent networking credentials, alongside security certifications such as CISSP, CISM, OSCP, CEH, or Security+.
- Hands-on experience working with Tenable Nessus and/or the Tenable One platform.
- Background in Incident Response, Threat Intelligence, or Red/Blue Team operations.
- Knowledge of cloud security (AWS, Azure, GCP) and securing hybrid and cloud environments.
- Prior experience in a customer-facing consultancy or advisory role with the ability to bridge networking and security conversations.
Skills Required
- 2-3 years of experience in cybersecurity or related IT fields
- Strong knowledge of enterprise networking concepts
- Strong knowledge of vulnerability management and attack surface management
- Hands-on experience with EASM/IASM tools and vulnerability scanning platforms
- Excellent communication and advisory skills
Sophos Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Sophos and has not been reviewed or approved by Sophos.
-
Leave & Time Off Breadth — Time away is positioned as broad, with company-wide wellness days plus dedicated learning days and paid volunteer time.
-
Parental & Family Support — Family-related leave appears more comprehensive than baseline offerings, including paid parental leave, caregiver leave, and extended bereavement leave.
-
Wellbeing & Lifestyle Benefits — Wellbeing support is emphasized through always-available assistance resources and a Calm subscription, suggesting a lifestyle-oriented benefits approach.
Sophos Insights
What We Do
Cybersecurity Evolved. As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.







