Copy of Security Consultant
MazeFull Time
Junior (1 to 2 years)
Key technologies and capabilities for this role
Common questions about this position
This is a full-time position.
This information is not specified in the job description.
The role requires expertise in Proofpoint Data Security products including DSPM, ITM (On-Premise and SaaS), Email DLP, Endpoint DLP, CASB, SaaS Isolation, and AAC, along with skills in service delivery, customer success, information security models, best practices, operational strategies, and communication with technical and executive stakeholders.
Proofpoint is guided by BRAVE core values: Bold in how we dream and innovate, Responsive to feedback, challenges, and opportunities, Accountable for results and best-in-class outcomes, Visionary in future-focused problem-solving, Exceptional in execution and impact. They emphasize a global team that breaks barriers to redefine cybersecurity with a human-centric approach.
The ideal candidate has demonstrated ability to ensure successful service delivery and customer success, expertise as subject matter experts in information security, and confidence in collaborating with technical resources, analysts, project sponsors, and executives.
Cybersecurity solutions for email and digital communication
Proofpoint specializes in cybersecurity, focusing on protecting organizations from advanced threats and compliance risks. The company offers a range of solutions that secure email, social media, and other digital communication channels against cyber threats like phishing, malware, and ransomware. Its products work by utilizing advanced technologies, including machine learning and artificial intelligence, to detect and respond to threats in real-time. Proofpoint differentiates itself from competitors by providing user-friendly solutions that easily integrate into existing IT systems, along with subscription-based services that allow clients to select service tiers tailored to their needs. The company's goal is to enhance the cybersecurity defenses of various organizations, from large enterprises to small businesses, ensuring their digital communications remain secure.