What You Will Do:
- Identify, engage, and close net‑new enterprise and mid‑market customers in the UAE
- Build and maintain a 3–5x qualified pipeline against quota
- Own the full sales cycle from prospecting and discovery through negotiation and close
- Map target accounts across key UAE sectors:
- Government & Semi-Government
- BFSI
- Oil & Gas / Energy
- Large Enterprise & Conglomerates
- Develop territory plan aligned to UAE buying cycles and budgets
- Build CXO/CISO relationships and position cybersecurity as a business risk conversation
- Run value-based selling vs product pitching
- Navigate complex buying groups and procurement frameworks
- Lead large deal cycles (typically $50K–$500K+ ACV)
- Manage RFP/RFI processes common in UAE public and enterprise sectors
- Ensure strong forecasting accuracy and pipeline hygiene
- Apply the Sales Methodology (MEDDPICC) consistently during sales cycle
- Partner closely with regional channel partners, distributors, and system integrators Operate as a collaborative overlay, driving shared success with Account Executives and cross‑functional teams
What You Will Bring:
Bachelor’s degree in Business, Technology, Information Security, or related discipline
10+ years of enterprise technology sales experience, with a strong focus on new business
5+ years selling into UAE Government and/or Enterprise accounts
Proven success closing complex, high‑value new‑logo deals in cybersecurity or enterprise SaaS
Existing relationships or a strong, credible network within UAE enterprise accounts, with the ability to engage senior stakeholders and accelerate deal entry
Deep understanding of cybersecurity solutions and services including MDR, XDR, Endpoint, Firewall, Cloud Security, and Zero Trust
Strong command of value‑based selling and enterprise sales methodologies
Proficient with CRM and forecasting tools such as Salesforce, Clari, and Power BI
Exceptional communication, negotiation, and executive presentation skills
Highly self‑driven, disciplined, and comfortable operating autonomously in a fast‑paced environment
English – fluent (mandatory)
Arabic – preferred (spoken)
Skills Required
- Bachelor's degree in Business, Technology, Information Security, or related discipline
- 10+ years of enterprise technology sales experience
- 5+ years selling into UAE Government and/or Enterprise accounts
- Proven success closing complex, high-value new-logo deals in cybersecurity or enterprise SaaS
- Existing relationships within UAE enterprise accounts
- Deep understanding of cybersecurity solutions including MDR, XDR, and Zero Trust
- Strong command of value-based selling
- Proficient with CRM and forecasting tools
- Exceptional communication and negotiation skills
- Fluent in English
- Arabic - preferred
Sophos Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Sophos and has not been reviewed or approved by Sophos.
-
Leave & Time Off Breadth — Time away is positioned as broad, with company-wide wellness days plus dedicated learning days and paid volunteer time.
-
Parental & Family Support — Family-related leave appears more comprehensive than baseline offerings, including paid parental leave, caregiver leave, and extended bereavement leave.
-
Wellbeing & Lifestyle Benefits — Wellbeing support is emphasized through always-available assistance resources and a Calm subscription, suggesting a lifestyle-oriented benefits approach.
Sophos Insights
What We Do
Cybersecurity Evolved. As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.








