Accelerator Architect at Venafi



200 - 499 employees
View Profile

Job detail

111K - 131K USD per year
United States

There are 2 actors on a network, people and machines. Just as usernames and passwords are used by people to access machines, machine identities are used by machines to identify and access each other. Venafi is the inventor of the technology that manages and protects machine identities, the most important security initiative in our Global 5000 customers. We are Warriors!

Are you passionate about making a positive impact and protecting the world from cybercriminals? If so, you may be a natural Venafi Warrior!

How you’ll be protecting the world:

As an Accelerator Architect at Venafi, you’ll be part of an extremely motivated, dedicated, and experienced team that protects many of the largest organizations in the world.

Venafi is seeking a highly motivated, proactive, and customer-focused Accelerator Architect that can translate and deliver upon our customers’ business and technical Machine Identity Management needs. In this role you will demonstrate expertise with the Venafi Trust Protection Platform by preparing and delivering specialized solution workshops, evaluating existing business processes, proposing process improvements, and tracking the success of a customer’s Machine Identity Management program.

An Accelerator Architect is responsible for ensuring the success of multiple customer accounts. You will serve as both a customer advocate within Venafi as well as a Venafi subject matter expert within the customer organization. Collaboratively maintaining close working relationships with all groups across the Venafi team, partner organizations, and customer organizations is crucial. 

Machine Identity is a critical component of a secure enterprise and permeates every technology in the enterprise. As a result, a successful Accelerator Architect has wide-ranging experience with a variety of IT related technologies. As every organization shifts towards automated processes, cloud-technologies and DevOps methodologies, experience in these spaces become increasingly important. The ideal Accelerator Architect can demonstrate to developer and cloud teams how Machine Identity Management increases security posture, streamlines processes and is able to document patterns and blueprints to provide compelling solutions in this space.

This role offers an opportunity to guide and advise in the emerging space of Machine Identity Management while leveraging existing technical knowledge across a wide variety of industry technologies. This is a remote position that will require approximately 20% travel to the customer sites and Venafi headquarters.

The ideal Venafi Warrior will be armed with:

  • 7+ years of consulting experience working within enterprise IT environments
  • A strong desire to drive success through technical mentorship and establishing effective working relationships with customers.
  • Proven business acumen to be able to identify the critical business problems to be solved and to articulate the solution to customers.
  • Experience automating Machine Identity Management using the Venafi Trust Protection Platform.
  • Strong expertise with scripting and APIs for automation using PowerShell or other scripting languages (Python, JavaScript, etc.)
  • Experience with modern containerization and associated technologies such as Docker, Kubernetes, and OpenShift.
  • Direct working experience with cloud technologies (Amazon AWS, Microsoft Azure, or Google Cloud).
  • Proficiency with orchestration and CI/CD technologies such as Terraform, Ansible, Chef, Jenkins, etc.
  • Experience with technologies that heavily use TLS/SSL encryption (e.g. F5, NetScaler, IIS, Apache, WebLogic, WebSphere, etc.) desirable.
  • Excellent presentation, verbal, and written communications skills.
  • Proven experience successfully working with sales, client IT, and client end-user groups in high-pressure situations.
  • Venafi subject matter expert with hands-on experience
  • Experience working on a cloud platform.
  • Understanding of Public Key Infrastructure (PKI) including technology, standards, and implementations.

What sets you apart?

  • AWS Solutions Architect Certification preferred.
  • Understanding of different Cloud models, Cloud providers, multi-cloud environments and hybrid environments
  • Previous experience in a consultative, sales engineer, or enterprise architect role.
  • Software development training and experience.
  • VSA certification.
  • Industry recognized security certifications (CISSP)

While you are busy protecting the world, we’ve got you covered!

In addition to fostering a virtual first collaborative environment, Venafi offers a benefits package that is in the top 10%.  We provide 90% employer-paid premiums for both team members and their families for medical insurance and 100% employer-paid premiums for both team members and their families for dental and vision insurance. We have an uncapped Open PTO (Paid Time Off) policy so team members have maximum flexibility to take time off. Additionally, we offer eleven company holidays and encourage taking time to volunteer in your community. We also offer 401(k) and company matching, company HSA contribution, 2x salary employer-paid life insurance, and parental leave. We even offer pet insurance!

More About Venafi:

Venafi is the undisputed leader in Machine Identity Management. Why? Because we created the category and are light years ahead of anyone that would consider competing! Gartner has recognized Venafi as number one in our space and as it turns out, one is NOT the loneliest number!

Venafi is the inventor of the technology that secures and protects machine identities. The Venafi platform provides visibility, intelligence, and automation for SSL/TLS, IoT, mobile, cloud native, Kubernetes, and SSH machine identity types. Many of the largest organizations in the world use Venafi.

Billions of dollars have been spent protecting usernames and passwords and almost nothing managing machine identities—organizations are just now realizing that managing and protecting machine identities is as important as managing usernames and passwords. The bad guys know this and are using stolen or forged machine identities in their cyberattacks. In fact, Gartner says 50% of network attacks will use machine identities.

Join Pyjama Jobs to see your best match!
Sign up now and get automatically paired with remote jobs that fit your skills and experience.
1 company hiring
Get auto-matched with jobs that fit you
Free to use
See My Best Match