Newxel logo

PTBOX | Cyber Sales Engineer

Newxel Europe


No Relocation

Posted: April 23, 2026

Job Description

We're hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer's infrastructure, and holding a technical conversation with a CISO.

About the Product

Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You'd be one of the first customer-facing engineers — shape how the POC motion runs, don't inherit a process.

What You'll Be Doing

  • Own the full POC lifecycle — scoping, on-site setup inside the customer's environment, running the autonomous pentest, interpreting findings, and delivering measurable business value.

  • Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia.

  • Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally.

  • Drive onboarding and evaluation in real customer environments — not sandbox demos.

  • Work with cybersecurity consultancies and channel partners to extend reach.

  • Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you're the signal.

  • Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this.

What We Expect

Must-have:

  • 2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly.

  • Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks.

  • Real technical depth — comfortable reading architecture, running tools inside a customer's infrastructure, interpreting findings, and defending them in a technical conversation.

  • Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required.

  • Excellent communication — able to simplify complex technical detail for CISOs and security architects.

  • Fluent English (C1+).

  • Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process.

  • Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU).

  • Ability and willingness to travel in EU and Asia for on-site customer engagements.

Nice to have:

  • A "converted developer" background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role.

  • Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ).

  • Experience with channel partners or cybersecurity consultancies.

  • Prior work at an Israeli-headquartered tech company.

The Stack:

The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you'll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.

Why This Role Is Worth Your Time

  • Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers.

  • High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer.

  • Variable compensation tied to what you actually ship — POC conversion, not activity metrics.

  • Direct customer-facing exposure to top-tier security leadership across Europe and Asia.

Additional Content

We're hiring a Cyber Sales Engineer to lead hands-on technical engagements with enterprise security teams across Europe and Asia — scoping, running, and converting POCs for an autonomous penetration testing platform. This is a role for someone who is equally at home reading architecture, running tools inside a customer's infrastructure, and holding a technical conversation with a CISO.

About the Product

Our partner is a venture-backed cybersecurity company building an AI-driven autonomous penetration testing platform. The product runs the work of a pentester end-to-end — discovery, exploitation, impact analysis — so security teams get continuous, expert-grade offensive coverage without scaling headcount. Customers are CISOs, SOC leads, and security architects at enterprise organisations. The team is small and early-stage, moving fast on real production deployments rather than slides. You'd be one of the first customer-facing engineers — shape how the POC motion runs, don't inherit a process.

What You'll Be Doing

  • Own the full POC lifecycle — scoping, on-site setup inside the customer's environment, running the autonomous pentest, interpreting findings, and delivering measurable business value.

  • Be physically present at the client site during POC engagements. The split is roughly 50/50 remote and customer-facing, with travel across EU and Asia.

  • Act as the technical advisor in C-level conversations — translate autonomous-pentest output into a security strategy that a CISO can defend internally.

  • Drive onboarding and evaluation in real customer environments — not sandbox demos.

  • Work with cybersecurity consultancies and channel partners to extend reach.

  • Feed customer insights back into Product and R&D — if a pattern breaks or a need is unmet, you're the signal.

  • Carry a conversion target on POCs → paid deals. Part of the compensation is tied to this.

What We Expect

Must-have:

  • 2–5 years in Sales Engineering, Solutions Engineering, or technical pre-sales at a B2B SaaS / high-tech company. Cybersecurity is strongly preferred; equivalent high-tech SE experience with strong technical depth is acceptable if you bring the ability to absorb offensive-security concepts quickly.

  • Proven experience leading POCs and technical evaluations with enterprise customers — hands-on, not pre-sales decks.

  • Real technical depth — comfortable reading architecture, running tools inside a customer's infrastructure, interpreting findings, and defending them in a technical conversation.

  • Conceptual understanding of the offensive-security domain — attack paths, exposure management, SIEM / EDR / XDR, continuous security validation. Deep hands-on with specific tools is nice to have, not required.

  • Excellent communication — able to simplify complex technical detail for CISOs and security architects.

  • Fluent English (C1+).

  • Self-driven and hands-on — comfortable in a fast-paced, early-stage environment with little formal process.

  • Based in the EU (Poland, Romania, Spain, or Ukrainian diaspora in EU).

  • Ability and willingness to travel in EU and Asia for on-site customer engagements.

Nice to have:

  • A "converted developer" background — moved from software engineering, red-team, or penetration testing into an SE / pre-sales role.

  • Hands-on familiarity with BAS / attack-simulation / exposure-management tools (Pentera, XM Cyber, Cymulate, SafeBreach, AttackIQ).

  • Experience with channel partners or cybersecurity consultancies.

  • Prior work at an Israeli-headquartered tech company.

The Stack:

The platform sits on top of AI-driven autonomous pentest orchestration. Day-to-day you'll work in real customer infrastructure (on-prem and cloud), interpret output against existing SOC tooling (SIEM, EDR/XDR), and brief findings back to security leadership. The tools change; the ability to run them and explain them is the constant.

Why This Role Is Worth Your Time

  • Real product, not slideware — AI is doing the actual work of a pentester, in production, at real customers.

  • High ownership: shape the POC playbook, not follow one. No BigTech layers between you and the customer.

  • Variable compensation tied to what you actually ship — POC conversion, not activity metrics.

  • Direct customer-facing exposure to top-tier security leadership across Europe and Asia.