Account acquisition and Management: Acquire new clients and engage with existing clients for retention.
Build proposition, solutions, and service lines for industry sectors, specific problems, and arrange capabilities/ offerings around them.
Building a trusted relationship with clients as a Trusted Advisor for Cyber Security from the perspective of products, solutions, services, practices and innovation.
Mapping opportunities in the ongoing developments, making plan, and actively engage for realizing the plans.
Identifying and analyzing client challenges and specific technical and business requirements; Content development of customer-specific cyber security roadmaps.
Advising the clients on the Cyber Security portfolio & the identification of relevant stakeholders within client organisation for further traction on DSCI initiatives.
Translating requirements and proposed solutions into concrete service offerings of DSCI.
Create forums, events, communities, initiatives to engage with stakeholder in cyber security industry.
Track leads, progress against each of them, and their conversion.
Qualifications
University education (Bachelor of Engineering preferably CS/ Electronics, MBA) with 7 to 10 years of professional experience in the field of cyber security.
Specialist know-how in the field of cyber security.
Deeper comprehension of security technology market, architectures, and emerging technology solutions
Proven success in presales and/or consulting in the area of cyber security.
Experience in Value-Selling Methodology, Consultative Conversations and Ability to comprehend and aggregate client challenges.
High customer orientation, entrepreneurial spirit, intuition, communication and team skills, high result and quality orientation.
Independent, self-reliant, structured way of working.
Strong industry experience with excellent network.
Fluent English in written and spoken form.
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.