Cybersecurity Services Technical Sales Specialist

Cybersecurity Services Technical Sales Specialist

 

Company: O2Cyber
Location: U.S.-based (Remote)
Employment Type: Full-time
Industry Focus: Healthcare and/or Banking

About O2Cyber

O2Cyber is a fast-growing cybersecurity services company focused on delivering advanced security solutions across multiple sectors, including healthcare and banking. Our mission is to help organizations proactively manage and mitigate cyber risk through tailored, modern, and AI-enabled security services. Visit o2cyber.com to learn more.

Role Overview

We are seeking a Cybersecurity Services Technical Sales Specialist to lead the charge in client acquisition and revenue growth. This individual will be responsible for generating leads, understanding client needs, articulating our service offerings, and closing deals. A solid understanding of the cybersecurity landscape and the ability to communicate complex technical offerings to business and technical stakeholders is critical.

Key Responsibilities

  • Proactively generate, qualify, and convert sales leads
  • Deliver compelling client presentations and demos across industries, particularly in healthcare and banking
  • Understand and effectively communicate cybersecurity services as listed on o2cyber.com, including vulnerability management, SOC, IAM, penetration testing, and more
  • Collaborate with internal security architects and consultants to shape tailored solutions
  • Own and manage the full sales cycle: from discovery to proposal to close
  • Maintain CRM records and track pipeline progression to meet or exceed quota

Qualifications

  • 3–5 years of experience in cybersecurity sales, technical sales, or a related client-facing role
  • Strong understanding of security frameworks such as NIST, HIPAA, ISO 27001
  • Familiarity with enterprise security needs in healthcare and/or financial services
  • Excellent communication and presentation skills
  • Proven ability to close deals and meet sales targets
  • Security certifications such as CISSP, CISM, CEH are a strong plus

Compensation

  • Base Salary: $100,000 – $150,000 (commensurate with experience)
  • Commission: Performance-based incentives

What We’re Looking For

  • A self-starter with a hunter mentality
  • Someone who thrives in a fast-paced, high-growth environment
  • An individual who can build strong client relationships and drive business outcomes
  • A team player who collaborates across functions to deliver client success

Growth Opportunities

This is a unique opportunity to be a key player in a growing cybersecurity firm. Your success will directly impact the company’s growth trajectory. As we expand, you’ll have the opportunity to shape sales strategy, influence service development, and grow with the organization.

 

Job Category: Sales Specialist
Job Type: Full Time
Job Location: Remote (US based)

Apply for this position

Allowed Type(s): .pdf, .doc, .docx
Scroll to Top

Level 4: Cyber Security Incident Response Process (CSIRP)

At the SOC’s most advanced level are managers and chief officers and they will be more engaged and execute this process. This group oversees all SOC team activities and is responsible for hiring and training, plus evaluating individual and overall performance. Level 4's step in during crises, and, specifically, serve as the liaison between the Security team and the rest of the organization. They are also responsible for ensuring compliance with organization, industry and government regulations.

Level 3: Proactive security operations

The security managers are informed and specialist crew are involved and begin moving from reactive to proactive security actions. Personnel are likely expert security analysts who are actively searching for vulnerabilities within the network and hunting for threats. They will use advanced threat detection tools to diagnose weaknesses and make recommendations for overall security improvement. Within this group, you might also find specialists, such as forensic investigators, compliance auditors or cybersecurity analysts. They will decide to escalate Level 4.

Level 2: Cyber Incident Remediation

These personnel can quickly get to the root of the problem and assess which part of your infrastructure is an issue or at risk. They will follow a well defined playbook process and makes decision to remediate the problem based on knowledge of the issue and environments. They will flag certain issues for additional investigation outside of the incident response protocol and when to escalate to Level 3.

Level 1: First responders

The first line of incident responders are group of security analysts who will be eyes on glass 24x7 and watch for alerts. They are primarily tasked to look at the urgency of an alert, can it be solved within their confines which is automated playbook / orchestration or follow up on established playbooks. Based on the above they play a role to escalate to Level 2. They are also responsible to run statistics and SOC reports for review. Behavioral analytics and AI based beta models are adopted for advanced needs to act as L1.