
PTBOX | Cyber Sales Engineer
Newxel • Europe
Posted: April 23, 2026
Job Description
We're hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer's infrastructure, and holding a technical conversation with a CISO.
About the Product
Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You'd be one of the first customer-facing engineers — shape how the POC motion runs, don't inherit a process.
What You'll Be Doing
Own the full POC lifecycle — scoping, on-site setup inside the customer's environment, running the autonomous pentest, interpreting findings, and delivering measurable business value.
Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia.
Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally.
Drive onboarding and evaluation in real customer environments — not sandbox demos.
Work with cybersecurity consultancies and channel partners to extend reach.
Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you're the signal.
Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this.
What We Expect
Must-have:
2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly.
Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks.
Real technical depth — comfortable reading architecture, running tools inside a customer's infrastructure, interpreting findings, and defending them in a technical conversation.
Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required.
Excellent communication — able to simplify complex technical detail for CISOs and security architects.
Fluent English (C1+).
Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process.
Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU).
Ability and willingness to travel in EU and Asia for on-site customer engagements.
Nice to have:
A "converted developer" background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role.
Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ).
Experience with channel partners or cybersecurity consultancies.
Prior work at an Israeli-headquartered tech company.
The Stack:
The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you'll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.
Why This Role Is Worth Your Time
Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers.
High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer.
Variable compensation tied to what you actually ship — POC conversion, not activity metrics.
Direct customer-facing exposure to top-tier security leadership across Europe and Asia.
Additional Content
We're hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer's infrastructure, and holding a technical conversation with a CISO.
About the Product
Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You'd be one of the first customer-facing engineers — shape how the POC motion runs, don't inherit a process.
What You'll Be Doing
Own the full POC lifecycle — scoping, on-site setup inside the customer's environment, running the autonomous pentest, interpreting findings, and delivering measurable business value.
Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia.
Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally.
Drive onboarding and evaluation in real customer environments — not sandbox demos.
Work with cybersecurity consultancies and channel partners to extend reach.
Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you're the signal.
Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this.
What We Expect
Must-have:
2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly.
Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks.
Real technical depth — comfortable reading architecture, running tools inside a customer's infrastructure, interpreting findings, and defending them in a technical conversation.
Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required.
Excellent communication — able to simplify complex technical detail for CISOs and security architects.
Fluent English (C1+).
Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process.
Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU).
Ability and willingness to travel in EU and Asia for on-site customer engagements.
Nice to have:
A "converted developer" background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role.
Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ).
Experience with channel partners or cybersecurity consultancies.
Prior work at an Israeli-headquartered tech company.
The Stack:
The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you'll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.
Why This Role Is Worth Your Time
Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers.
High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer.
Variable compensation tied to what you actually ship — POC conversion, not activity metrics.
Direct customer-facing exposure to top-tier security leadership across Europe and Asia.