In Tech Sales? Look for jobs...

In Tech Sales? Look for jobs...

I hope I'm not saying anything revolutionary here, but you'd be surprised how many people don't use this one simple tactic to learn more about their clients/customers before blindly sending them a "I want to talk to you about cybersecurity" e-mail.

Sales person: "I want to sell cyber security technology to this customer."

Me: "What technology do they currently have in place? What are their business objectives? What are their goals?"

Sales person: "I don't know, they won't take a meeting with me. :("

Me: "Do some homework, go look at their job openings and see where they need help and what you can learn."

Let's go through a hypothetical here. Here's an opening from a hometown company:

No alt text provided for this image

So what can we learn from looking at this opening?

  1. They need A LOT of help on the application security side of things. It's listed 1st and 2nd (vulnerability management included). They also don't realize its "CI/CD" pipeline, so security and DevOps probably don't have much interaction today. Ok, it could be a typo, but let's be honest, 90% of the app sec conversations I'm having don't include one team or the other. Their main tools are Rapid7, Sonarqube, JFrog, and Burpsuite. So they have a decent toolset in place today, but it's geared towards security/technical teams and not DevSecOps minded folks. Probably run from behind a security curtain and lobbed over to dev teams. (I should rant about why security is the most hated team in another blog later....)
  2. They're probably a bit behind on cloud adoption/migration as there is no mention of containers (besides the randomly thrown in JFrog reference), AWS/GCP/Azure, serverless infrastructure, etc. So cloud discussions could go a couple ways: "We're staying away from the cloud, because ewww" or "We're looking to digitally transform ourselves by moving services/apps to the cloud". The Tetration piece is a tell as well.
  3. They have a Cisco EA..... Or at least they should.
  4. They're short-staffed and need "real" help, not someone to sell them more tools they can't manage. This opening requires someone who knows Vulnerability Management, Application Security, Possibly DevSecOps, DNS/CASB, Endpoint Security, Network Security, Network Access Control, and Email Security. If you try to sell one more tool to this customer, this poor security engineer's back will break. Possibly related, the reason why this job is open in the first place....

So what helps this customer? An email saying "We sell things"? Maybe, just maybe something pointed detailing how you can help solve the real problems they're having. I bet if you answered these questions in an email, your response likelihood would dramatically increase.

  1. How can you help automate application, code, and pipeline security? Can you do it with fewer resources? Can you do it with fewer tools?
  2. How can you accelerate their move to abstracting apps and services from code and technology? Can you automate migrations? Can you reduce consumption costs?
  3. How can you help them get the most use out of all those Cisco tools? Big hint here.... SecureX
  4. How can you make this engineer's job easier managing what seems like 40-50% of a security tool stack for a Fortune500 company? Is there expertise or services you can provide?

LinkedIn posts, word of mouth, and curated lists are great. But go to the source. They're telling you what they need in their job postings. Take a look, you might be surprised at what you can find and ways you can help your clientele.

要查看或添加评论,请登录

Ben Boyd的更多文章

  • Revolutionizing Blue Team Operations? The Disruption of XDR

    Revolutionizing Blue Team Operations? The Disruption of XDR

    In the ever-changing, new acronym generating landscape of cybersecurity, has the emergence of Extended Detection and…

    2 条评论
  • ???? Starting the Art of Prompt Engineering: A Thought Experiment for Cybersecurity Blue Teams ?????

    ???? Starting the Art of Prompt Engineering: A Thought Experiment for Cybersecurity Blue Teams ?????

    In the ever-evolving world of cybersecurity, staying ahead of threats is not just a goal; it's a necessity. That's…

    1 条评论
  • Who's Knocking At Your Door?

    Who's Knocking At Your Door?

    We have to present a public face to do business in this world. And soon we'll have to present a metaverse image as…

    1 条评论
  • Stop calling me agnostic...

    Stop calling me agnostic...

    “We are vendor agnostic” Ever hear your VAR say something like that? Since 2010, I’ve heard colleagues and co-workers…

    17 条评论
  • GoDaddy, Tribune and Questions About Phishing

    GoDaddy, Tribune and Questions About Phishing

    Bad guys don't care about your feelings, the pandemic, your job, or Christmas. In fact, bad guys hunt for prey and…

    6 条评论
  • Is this email working??

    Is this email working??

    I'm often asked to help “craft” the perfect e-mail for my sales team to help with thier unsolicited attempts at…

    3 条评论
  • Daily Goals

    Daily Goals

    One of the habits I picked up at a young age was learning from people who know more than me. A lot of people know more…

    1 条评论
  • Security Whack-a-Mole & Partnerships

    Security Whack-a-Mole & Partnerships

    Maybe I've been watching too many Sopranos reruns, but I've been using the term "whack" way too much in my…

    2 条评论
  • Equifax Rant #7 of 7 - Accountability and Responsibility

    Equifax Rant #7 of 7 - Accountability and Responsibility

    The median salary for a CISO is $215k base/$260k total. The top 25% make more than $250k/$315k.

  • Equifax Rant #6 of 7 - Identity, Access, and Privilege

    Equifax Rant #6 of 7 - Identity, Access, and Privilege

    Where to start on these 3 topics? So much words and so little blog! When a hacker is inside of your network snooping…

    1 条评论

社区洞察

其他会员也浏览了