Full-Time

Sales Specialist

Qualys

Qualys

1,001-5,000 employees

Cloud-based vulnerability management and compliance platform

No salary listed

Virginia, USA

In Person

Category
Sales & Account Management (1)
Required Skills
Vulnerability Analysis
Risk Management
Requirements
  • 8+ years in cybersecurity sales, pre-sales engineering, or risk advisory roles
  • Strong understanding of vulnerability management, risk exposure concepts (CVEs, CVSS), and attack surface reduction
  • Excellent communication and presentation skills with executive presence
  • Ability to translate technical capabilities into business outcomes
  • Willingness to travel up to 50–70%
Responsibilities
  • Collaborate with Account Executives to develop and execute sales strategies for cyber risk solutions
  • Lead discovery sessions to understand customer pain points and align Qualys offerings to business objectives
  • Deliver high-impact presentations, demos, and workshops to technical and executive stakeholders
  • Articulate the value proposition of Qualys TruRisk Platform in terms of risk reduction and ROI
  • Support proof-of-concept engagements and guide customers through evaluation processes
  • Provide feedback to Product and Engineering teams based on customer insights and market trends
  • Stay current on industry frameworks (e.g., NIST CSF, CIS) and communicate how Qualys maps to compliance and risk management goals
  • Assist in building proposals, RFP responses, and solution architectures for complex deals
  • Champion adoption and expansion opportunities within existing accounts
Desired Qualifications
  • Experience in consultative selling or solution-based sales in cybersecurity
  • Familiarity with cloud security (AWS, Azure, GCP) and hybrid IT environments
  • Experience with AI models and adoption techniques

Qualys provides cloud-based cybersecurity and compliance solutions to secure IT infrastructure for enterprises, SMBs, and government. Its main products include vulnerability management, policy compliance, web application security, and IT asset management, delivered via the Qualys Cloud Platform that continuously monitors environments. The platform collects data from agents and sensors, runs automated checks, enforces policies, and generates real-time compliance reports. It differentiates with real-time analytics, automated workflows, and scalable cloud architecture, offering a unified security and compliance ecosystem to manage risk across on-premises, cloud, and hybrid environments.

Company Size

1,001-5,000

Company Stage

IPO

Headquarters

Redwood City, California

Founded

1999

Simplify Jobs

Simplify's Take

What believers are saying

  • Q1 2026 beat expectations with 9.8% YoY revenue growth and 34.7% operating margin expansion.
  • AI-native Risk Operations Center positions Qualys as leader in autonomous threat validation and remediation.
  • 10,000+ subscription customers including majority of Forbes Global 100 provides sticky, recurring revenue base.

What critics are saying

  • Revenue growth decelerated from 12.9% five-year CAGR to 9.7% two-year CAGR, signaling market saturation.
  • Microsoft Defender Vulnerability Management bundled free in Microsoft 365 E5 eliminates Qualys pricing for 80% of enterprises.
  • Dynatrace and ServiceNow integrations commoditize Qualys scanners as interchangeable data sources, eroding pricing power.

What makes Qualys unique

  • Enterprise TruRisk Platform unifies vulnerability management, compliance, and threat detection in single cloud-native solution.
  • Agent Val AI validates exploitability in production environments, reducing remediation noise by 90% versus competitors.
  • Converge partnership ties cyber insurance premiums to verified security posture, creating financial incentive for customers.

Help us improve and share your feedback! Did you find this helpful?

Your Connections

People at Qualys who can refer or advise you

Benefits

Remote Work Options

Growth & Insights and Company News

Headcount

6 month growth

2%

1 year growth

0%

2 year growth

0%
Hacklido
Mar 25th, 2026
Qualys Agent Val: the end of the maybe vulnerability.

Qualys Agent Val: the end of the maybe vulnerability. Mar 25, 2026 Table of Contents For years, security teams have been buried under a mountain of "High" and "Critical" alerts, many of which are theoretically dangerous but practically unexploitable in their specific environment. Today at RSAC, Qualys officially launched Agent Val, an AI-powered "Validation Agent" designed to end the era of speculative patching. 1. The "minus one day" Reality. The launch comes on the heels of startling new data from the Qualys Threat Research Unit (TRU). * Exploits are Faster: The time between a vulnerability disclosure and an active exploit has dropped to nearly zero and in some cases, "minus one day," where hackers are leveraging flaws before a public patch is even ready. * The Noise Problem: 90% of flagged vulnerabilities are never actually exploited in the wild because they require specific, non-default configurations or environmental "pivots" that aren't present. 2. How Agent Val works: safe exploit simulation. Unlike a standard scanner that just looks at version numbers, Agent Val acts as a resident ethical hacker on the endpoint. * Safe Payload Injection: It safely simulates the exploit path in a sandboxed execution layer on the actual asset. * Environmental Context: It doesn't just ask "Is the app vulnerable?" it asks "Can this app, on this VLAN, with these permissions, actually be breached?" * The "Confirmed" Badge: If Agent Val successfully "pokes" the flaw, it upgrades the alert to "Confirmed Exploitable." If the environment blocks it, the priority is lowered. 3. Operationalizing the "ROC" (Risk Operations Center). Qualys is positioning Agent Val as the heart of the Risk Operations Center (ROC) - the 2026 evolution of the SOC. * Focus on the 1%: Instead of fixing 1,000 "Critical" flaws, the ROC uses Agent Val to identify the 10 that can actually sink the ship today. * Remediation Scripts: Once an exploit is validated, Agent Val can automatically suggest or trigger the specific "compensating control" (like a WAF rule or registry change) to kill the exploit path without waiting for a full software patch. Hacklido technical takeaway: moving to Validation. For its community of sysadmins and bug hunters, Agent Val signals the end of "Scanner-based Security": * Stop Chasing CVSS Scores: A CVSS 9.8 that isn't reachable is less dangerous than a CVSS 6.0 that is currently being exploited by a worm. Start prioritizing based on Reachability and Validation. * Test in Production (Safely): The industry is moving toward continuous, safe-exploit testing in production environments. If you aren't validating your defenses, you are just guessing. Audit the "Agent": As Hacklido deploy more "Security Agents" like Agent Val, ensure their own identities are secured. Use the Token Security model (RSAC's Sandbox Winner) to govern the intent of these powerful autonomous security tools. Team Hacklido Join its Community - stay updated with latest hacks, CTFs & cyber news.

PR Newswire
Mar 23rd, 2026
Qualys launches Agent Val AI to validate exploits and cut remediation noise by 90%

Qualys has launched Agent Val, an AI agent for exploit validation and autonomous remediation, within its Enterprise TruRisk Management platform. The system validates exploitability in production environments, mitigates confirmed risks and revalidates exposures to verify risk reduction. Agent Val, powered by TruConfirm, addresses the growing challenge of known exploited vulnerabilities, which have increased 6.5 times in four years. The technology shifts security teams from assumption-driven prioritisation to evidence-based execution by safely testing exploitability in live environments, resulting in a claimed 90% reduction in remediation noise and 70% faster time-to-remediate. The system covers over 1,600 CVEs with no additional sensor footprint required. Agent Val is now generally available as part of Qualys ETM.

Dolphin Publications
Mar 13th, 2026
Linux security layer extremely vulnerable: 12.6 million systems affected

Linux security layer extremely vulnerable: 12.6 million systems affected. Nine critical vulnerabilities have been found in AppArmor, a Linux Security Module standard on Ubuntu, Debian, and SUSE. Together, they are referred to as CrackArmor. The vulnerabilities allow unauthorized users to bypass kernel protections, obtain root privileges, and break container isolation. This was discovered by researchers at Qualys. Together, they form the so-called CrackArmor advisory. The flaws have existed since 2017 (kernel version v4.11) and affect more than 12.6 million enterprise Linux instances worldwide. AppArmor is the standard Mandatory Access Control mechanism for Ubuntu, Debian, and SUSE. It is widely used in cloud environments, Kubernetes, IoT, and edge infrastructure. How the attack works. The vulnerabilities exploit a confused deputy attack. An unauthorized user can manipulate a privileged process to perform actions on their behalf, without having the necessary rights themselves. Specifically, attackers abuse tools such as Sudo or Postfix to modify AppArmor profiles via pseudo-files such as /sys/kernel/security/apparmor/.load and .replace. This bypasses user-namespace restrictions and allows arbitrary code to run in the kernel. Consequences include local privilege escalation (LPE) to root, denial-of-service via stack exhaustion, and KASLR bypasses via out-of-bounds reads. Container isolation is also no longer guaranteed as a result. Qualys TRU has developed Proof of Concept exploits that demonstrate the entire attack chain. These are not being released publicly, but have been shared with the relevant security teams to speed up patching. "CrackArmor proves that even the most entrenched protections can be bypassed without admin credentials. For CISOs, this means patching alone isn't enough; we must re-examine our entire assumption of what 'default' configurations mean for our infrastructure," said Dilip Bachwani, CTO of Qualys. All Linux kernels from v4.11 onwards are vulnerable on distributions that integrate AppArmor. Debian released a security update on March 12, 2026 that addresses the vulnerabilities. Ubuntu and SUSE are working on similar patches. Qualys recommends applying vendor kernel patches immediately and setting up monitoring on /sys/kernel/security/apparmor/ for unauthorized profile changes.

Dynatrace
Feb 25th, 2026
Ingest, enrich, and deduplicate Qualys vulnerability findings with Dynatrace

Ingest, enrich, and deduplicate Qualys vulnerability findings with Dynatrace. Dynatrace integrates with Qualys to help DevSecOps teams reduce alert fatigue by unifying and deduplicating vulnerability findings, contextualizing findings with runtime entities, and offering smarter prioritization, automation, and remediation. What is Qualys host scanning? Qualys is a leading provider of vulnerability management solutions. Qualys Enterprise TruRisk platform offers a range of products, including Vulnerability Management, Detection, & Response (VMDR), which helps detect and prioritize vulnerabilities for remediation on hosts. Host monitoring has been a best practice in security hygiene for decades and is required by various compliance standards. If your organization is already applying all the best practices for host scanning, you may still be wondering how to improve the prioritization of detected vulnerabilities. Challenges in managing host vulnerabilities. Imagine you periodically run scans of hosts in your environments: production hosts, development hosts, etc. Each scan discovers hundreds or even thousands of vulnerabilities. Your goal is to minimize the risk by fixing the most critical vulnerabilities first. Even with a simple strategy like this, your DevSecOps teams might still struggle to handle all the vulnerabilities. Your MTTR (Mean Time to Remediation) is increasing, and your management is not happy about it. In addition, while focusing on critical vulnerabilities, are you sure you're prioritizing the top risk for your organization? That approach is a good start; however, some top-risk vulnerabilities might not be critical in severity; they're the ones that directly impact your critical production applications and services. Even if it is a high-severity vulnerability, you may want to address it before a critical vulnerability because it affects your production environment. What can you do? Is there a way to further improve vulnerability prioritization? The answer is yes; you need to consider additional runtime context and focus on production risk in addition to severity. You may want to have a robust deduplication mechanism in place and visibility into the top risks. And you might also benefit from tracking the fixes and posture drifts, increasing security coverage, and reducing the number of risks over time. Dynatrace as a runtime security platform. The Dynatrace platform offers native Runtime Vulnerability Analytics that detect vulnerabilities in your running applications and services, helping keep your application's security risk low. This complements the host scanning and provides a complete picture of the security risks. As an observability platform, Dynatrace also monitors the infrastructure on which your apps and services run. Hosts are one such infrastructure entity. Dynatrace knows whether a host is connected to the internet, how much traffic flows through it, whether production applications are running on that host, and how those applications are connected to other hosts and services in your organization. With Dynatrace OpenPipeline(R) as the data ingest engine and Grail(R) as the unified data lakehouse, it is possible to ingest security findings from third-party products to bring security context to operational personas. DevSecOps teams can simultaneously benefit from ingested and contextualized security findings using Dynatrace as a security platform, gaining ultimate visibility into all risks in one place, prioritizing based on production risks, and improving their security posture. Qualys integration in work. Dynatrace integrates with Qualys to connect host vulnerability findings with runtime application context, allowing smarter vulnerability prioritization and better visibility into your security risks from the perspective of your runtime environment. Here is how this integration works, and how it allows you to achieve your goals in several simple steps: Step 1: ingest and unify. Dynatrace delivers this integration as an extension that allows granular control over the data flow between Qualys and the Dynatrace platform. Leveraging OpenPipeline, Tenable vulnerability findings and activity logs are pushed to Dynatrace and stored in Grail, where they're mapped to semantic conventions that make them available in a unified schema for further analysis. Step 2: deduplicate and visualize. As soon as Qualys vulnerability findings are in Grail, you can view them in the Vulnerabilities app as individual findings or, using deduplication logic, as a focused list of unique findings. In this way, hundreds of findings reported repeatedly by each executed scan are deduplicated and become tens of vulnerabilities instead. Here's what it might look like before deduplication: And here is what it looks like after applying the deduplication filter: The Qualys integration also includes several ready-made dashboards that help you deduplicate and display vulnerability findings in a summarized view. Step 3: enrich and prioritize. The next step is to use the Dynatrace runtime context to further prioritize the vulnerabilities. In this sample dashboard, which is also shipped with the integration, Dynatrace, Inc. first filter the ingested vulnerability findings for monitored hosts and then add the production application-level filter. This filtering approach focuses on runtime impact and helps reduce the number of vulnerabilities to address. Step 4: communicate and remediate. With Dynatrace native automation capabilities represented in the Workflows app, you can operationalize the vulnerability findings by notifying relevant stakeholders and creating work tickets for remediation. Step 5: track improvement. Whether remediation is applied or new vulnerabilities are identified, you can easily monitor changes across scans to see which vulnerabilities are new, unresolved, or fixed. Here is a dashboard Dynatrace, Inc. provide with the integration that helps achieve this goal: Step 6: increase security coverage. Finally, Dynatrace also helps you to understand whether you've covered all important hosts in your environment with vulnerability scans. This security observability is fueled by monitored host entities and Qualys ingested findings. Here is a snippet from the security coverage dashboard shipped with the integration: What's next. The Dynatrace platform helps reduce noise from vulnerability scanning and provides runtime insights to efficiently prioritize remediation efforts. Follow its updates and news about additional integrations and learn about which products from your security stack Dynatrace, Inc. already cover. If you don't find support for your product or tool, feel free to contact Dynatrace, Inc. in its Community channel. Get started. To learn more about the Qualys integration and how to set it up, read its documentation for ingesting Qualys vulnerability findings, scanning events, and auditing logs. Install Qualys to prioritize production risks and reduce alert overload.

Yahoo Finance
Feb 22nd, 2026
Qualys international revenue grows 15% as Q4 2025 revenue reaches $175M

Qualys, a cloud-based security platform provider, reported fourth-quarter revenue of $175.3 million, representing 10% growth. International markets revenue grew 15%, outpacing domestic revenue growth of 6%. Channel revenue rose 17%, accounting for 51% of total revenue. The company posted adjusted EBITDA of $82.6 million and earnings of $1.87 per diluted share for the quarter, whilst generating $74.9 million in free cash flows. However, operating expenses increased 11% to $68.9 million due to higher sales and marketing costs. For 2026, Qualys projects revenue between $717 million and $725 million, indicating 7% to 8% growth. UBS analyst Roger Boyd lowered the firm's price target from $150 to $140 whilst maintaining a Neutral rating.