Job Description
As a Technical Product Manager, you will be responsible for defining and implementing the product roadmap for Awake’s Threat Detection and Content Management technologies. You would work very closely with Awake’s Threat Research and Labs Teams, customers, and engineering teams to define solutions that would broaden and improve the efficacy of Awake Security Platform’s threat detections. You would also partner with the product marketing and sales teams as a key member of the GTM Team.
Responsibilities
Develop product roadmap for key modules of the Awake Security Platform that pertain to Awake’s threat detection technology and content management.
Partner with the threat research and labs team to prioritize areas of research and delivery of threat content.
Lead productization of detection focused features like AVA, Situations,etc.
Work with engineering to identify what technologies (malware analysis, reputation services, etc.) that need to be procured or developed for faster delivery to market.
Work across cross-functional teams (Engineering, Marketing, Research, Sales and UX) from concept to implementation.
Identify technology partners and drive integrations to maximize benefits for the customer base.
Represent the product to customers and at field events such as conferences, seminars, etc.
Perform competitive analysis and develop content for sales and marketing teams.
Requirements
BS in computer/electrical/software engineering or similar fields.
Excellent understanding of the latest cybersecurity trends, common attack TTPs, and the general threat landscape.
Good knowledge of the working of SOC
Good understanding of threat research and incident response methodologies and tools.
At least 2 years of direct experience in product management of cybersecurity or network visibility tools
At least 5 years of experience working on technologies pertaining to cybersecurity, cloud computing, and/or data science.
Excellent analytical and customer-facing skills.
Strong understanding of concepts pertaining to networking, databases, virtualization, and/or cloud security.
Additional Information
All your information will be kept confidential according to EEO guidelines.