Responsibilities
- Develop and scale relationships with executive decision-makers across Major Metros: New York City, Boston, Philadelphia, Washington D.C. (Regional/Local), Charlotte, Atlanta, and Miami.
- Develop and scale relationships with executive decision-makers across State Capitols: From Augusta and Albany to Richmond, Raleigh, and Tallahassee.
- Develop and scale relationships with executive decision-makers across Higher Ed & K-12: Ivy League institutions, major state university systems (e.g., SUNY, UNC, UF), and the nation’s largest school districts.
- Align security and identity solutions with varied regional priorities such as Innovation Agendas: Supporting initiatives like NY’s Empire AI and the Southeast’s growing cybersecurity corridors.
- Align security and identity solutions with varied regional priorities such as State Resilience: Driving 'Whole of State' frameworks to protect interconnected local jurisdictions.
- Align security and identity solutions with varied regional priorities such as Citizen Experience: Modernizing digital identity for secure access to state and municipal services.
- Navigate the complex web of East Coast purchasing, including NASPO ValuePoint, NY OGS, MA CommBUYS, GSA Schedule 70, and Florida’s STC.
- Proactively hunt for net-new opportunities while managing a high-volume, fragmented territory through diligent CRM forecasting.
- Maintain a consistent, visible presence across the coast, requiring frequent travel to engage with state CIOs, CISOs, and procurement leads.
Benefits
- Medical, Dental, Vision, Life Insurance
- 401K
- Unlimited PTO
- Sick Time
- Holiday Parties
- Daily Catered Lunches
- Employee Recognition Programs
- Team Socials
Work Arrangement
Remote (Country)
Additional Information
- Complete security & privacy literacy and awareness training during onboarding and annually thereafter
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Data Classification, Retention & Handling Policy
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Incident Response Policy/Procedures
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Business Continuity/Disaster Recovery Policy/Procedures
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Mobile Device Policy
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Account Management Policy
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Access Control Policy
- Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): Personnel Security Policy