Key technologies and capabilities for this role
Common questions about this position
For US-based employees, the estimated base salary range is $121,350 - $173,325 - $225,300. Base salaries for other locations are competitive for the employee's home location. This role may also be eligible for the SailPoint Corporate Bonus Plan, role-specific commission, and potential equity participation.
The role is ideally in Austin, TX, but could be flexible for the perfect candidate. Minimal travel will be required for conferences and team building activities.
Candidates need 5-10 years in management consulting, investment banking, or corporate strategy, preferably at high growth SaaS companies in cybersecurity. Key skills include market research, systematic outreach, build vs. buy vs. partner analysis, due diligence, deal structuring, negotiations, and tiger team leadership.
This is a high visibility individual contributor role in building a new team from scratch, working closely with the President, CTO, CGO, and COO, and leading cross-functional tiger teams.
Please do not submit a resume over 1 page in length. Strong candidates will have 5-10 years of relevant experience in strategy roles at high-growth SaaS companies.
Provides identity security solutions for enterprises
SailPoint provides identity security solutions that help organizations manage and protect digital identities. Its main products, including IdentityIQ, IdentityNow, and File Access Manager, assist businesses in ensuring compliance with regulations, reducing risks, and controlling access to sensitive information. These products work by giving organizations visibility into who has access to what data, allowing them to manage permissions effectively. SailPoint stands out from competitors by utilizing advanced technologies like artificial intelligence and machine learning to enhance its identity governance capabilities. The company's goal is to be a trusted partner for enterprises in navigating the complexities of identity security, ensuring that they can securely manage access to their critical information.