Back to All Positions

Solutions Architect

Location: Remote
<div class="content-intro"><p>Axis Security is pioneering a game-changing approach to Zero Trust Network Access.&nbsp; Axis Security’s Application Access Cloud makes application access amazingly simple. Built on a zero-trust approach, users are securely connected to apps, while avoiding the need for VPNs, VDI’s, agents, or appliances.&nbsp;</p> <p>&nbsp;</p></div><div class="content-intro"> <p>Axis Security is pioneering a game-changing approach to Zero Trust Application Access. &nbsp;Axis Security’s Application Access Cloud makes private app access amazingly simple. Built on a zero-trust approach, users are securely connected to private apps, while avoiding the need for VPNs, agents, or appliances.&nbsp; Users never touch the network or applications themselves, providing organizations with reduced risk, greater visibility, and increased productivity.</p> <p>There are a lot of security companies out there, but no one is doing what Axis is doing: giving our customers the ability to deliver the safest way to connect users to private applications. As a result, we’re seeing phenomenal growth as some of the top companies in the world adopt our platform. We have top tier venture funding, an amazing team who will fight beside you to accomplish the impossible, and we offer great benefits and stock options.</p> </div> <p><strong>Our Culture</strong></p> <ul> <li>We work to get better every day including weekly sales enablement</li> <li>We strive to be trusted and respected by customers</li> <li>We seek to understand before seeking to be understood</li> </ul> <p><strong>Position Summary</strong></p> <p><span style="font-weight: 400;">The Solutions Architect will lead technical adoption of the Axis Security solution from discovery and demo to close and delivery of customer project(s). This person will have a mix of social intelligence as well as technical acumen aligned with customer environments and solutions architecture.</span></p> <p><strong>Responsibilities</strong></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Product demos and helping build a compelling demo environment</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Prospect education and recommendations</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Customer POC’s and proof of value</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Customer support and architecture</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Customer project plans, requirement building, and RFP responses</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Help achieve company goal / quota attainment</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Work with PM team to help drive product requirements based on customers</span></li> </ul> <p><strong>Required Skills</strong></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Ability to learn new technologies quickly</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Ability to set up POCs and build demos working with prospective customers</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with networking and network security - Firewalls, IPSEC, SSL-VPN, NAT, GRE</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with cloud platforms - AWS, Azure, GCP</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Linux - Ability to do network connectivity and permissions commands</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with containers - Docker, Kubernetes</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Operational knowledge of networking protocols - understanding of the various layers, TCP/IP, UDP, DNS, TLS, HTTP/S</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with cloud security and permissions systems - VPC, Security Groups, IAM</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Understanding of identity and access technologies - SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">7+ years of experience in technical positions</span></li> </ul> <p><strong>Beneficial Experience</strong></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Knowledge of the Zero Trust ecosystem and competitors</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with endpoint security software - Antivirus, DLP, IPS, NAC, etc.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Experience with WAF and CASB solutions</span></li> </ul><div class="content-conclusion"><div>&nbsp;</div> <div>All qualified applicants will receive consideration for employment without regard to race, color, religion, sex or national origin.</div></div>
Back to All Positions
Think you know someone perfect for this role?
Share it with them!
TwitterFacebookLinkedIn
Copyright © 2021 Axis Security. All rights reserved. Privacy Policy