Full-Time

Vice President of Sales

Confirmed live in the last 24 hours

SpyCloud

SpyCloud

201-500 employees

Cybersecurity for threat intelligence protection

No salary listed

Expert

No H1B Sponsorship

Washington, DC, USA

Category
Strategic Account Management
Sales & Account Management
Required Skills
Data Analysis
Requirements
  • Proven track record of success in sales leadership, with at least 10+ years of experience driving revenue growth in the US Government sector.
  • Strong understanding of cybersecurity trends and challenges, preferably with experience in selling cybersecurity solutions to the US Federal Government.
  • Exceptional leadership skills, capable of leading and inspiring a diverse sales team across different countries and cultures.
  • Excellent communication and presentation skills, with the ability to engage effectively with C-suite executives and other stakeholders.
  • Bachelor's degree in a related field; MBA or advanced degree preferred.
Responsibilities
  • Develop and implement a comprehensive sales strategy for the US government sector, aligned with the company's overall business objectives and revenue goals.
  • Identify and pursue an effective strategy for leveraging US Federal Systems Integrators to more deeply penetrate the US Federal government.
  • Lead, mentor, and motivate a results-driven sales team across the US Government sector, fostering a collaborative and high-performance culture.
  • Cultivate strong relationships with key stakeholders and decision-makers, understanding their cybersecurity challenges and positioning SpyCloud's solutions as the preferred choice.
  • Oversee the entire sales process, from prospecting to contract negotiations, ensuring efficient pipeline management and sales forecasting.
  • Collaborate closely with product, marketing, and customer success teams to ensure seamless customer experiences and continuous improvement.
  • Set clear sales targets and key performance indicators (KPIs), regularly analyzing sales data to track progress and optimize performance.
  • Stay informed about industry trends, competitor activities, and regulatory changes impacting US Government markets, providing insights to enhance SpyCloud's competitive edge.
Desired Qualifications
  • MBA or advanced degree preferred.

SpyCloud specializes in cybersecurity, focusing on threat intelligence and identity protection to help businesses defend against cyber threats from the dark web. Its main product, the Cybercrime Analytics Platform, uses data from criminal activities to detect and prevent threats like malware and ransomware, while also identifying threat actors. Unlike competitors, SpyCloud offers a comprehensive solution that combines threat intelligence, identity protection, and incident response in one platform. The company's goal is to enable businesses to proactively safeguard their digital assets and reduce the risk of data breaches.

Company Size

201-500

Company Stage

Growth Equity (Venture Capital)

Total Funding

$203.5M

Headquarters

Austin, Texas

Founded

2016

Simplify Jobs

Simplify's Take

What believers are saying

  • Rising demand for identity threat protection boosts SpyCloud's market potential.
  • $35 million growth financing supports SpyCloud's expansion and innovation efforts.
  • Partnership with Telefónica Tech enhances SpyCloud's market reach and capabilities.

What critics are saying

  • AI-driven bots pose a significant threat to SpyCloud's clients.
  • Trustfull's Login Solution increases competitive pressure in identity protection.
  • Sophisticated infostealer malware challenges SpyCloud's identity protection capabilities.

What makes SpyCloud unique

  • SpyCloud uses recaptured darknet data for proactive cyber threat prevention.
  • Its Cybercrime Analytics Platform offers unique insights from breaches and malware-infected devices.
  • SpyCloud's solutions are trusted by half of the ten largest global enterprises.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

401(k) Retirement Plan

Unlimited Paid Time Off

Meal Benefits

Flexible Work Hours

Remote Work Options

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

-1%

2 year growth

0%
GlobeNewswire
May 15th, 2025
Spycloud Appoints Brad Rouse As Chief Revenue Officer Amid Growing Demand For Identity Threat Protection

AUSTIN, Texas, May 15, 2025 (GLOBE NEWSWIRE) -- SpyCloud, the leader in identity threat protection, today announced the appointment of Brad Rouse as Chief Revenue Officer (CRO). In this role, he leads SpyCloud’s global sales, partnerships, and customer success teams as the company scales its go-to-market efforts to meet surging demand for proactive threat remediation solutions. With more than 30 years of experience in technology sales and executive leadership, Brad brings a track record of building high-performing revenue organizations and delivering customer-centric security solutions. His leadership will play a key role in expanding SpyCloud’s global footprint and strengthening customer relationships as organizations face increasingly complex identity-based threats. “Brad’s expertise in scaling revenue teams and navigating the enterprise security landscape is a tremendous asset,” said Ted Ross, CEO and co-founder of SpyCloud. “As cybercriminals shift tactics and target the holistic identity, Brad’s leadership will help us deliver our differentiated approach to a broader audience and empower more businesses to take proactive steps against ransomware, account takeover, and online fraud.” Brad joins SpyCloud from Protegrity, where he served as CRO, where he oversaw global sales, customer success, support, and professional services

BTW Media
Apr 29th, 2025
Telefónica Tech joins SpyCloud to boost cyber intelligence

Telefónica Tech partners with SpyCloud to strengthen identity protection for enterprises and public institutions.

VentureBeat
Apr 10th, 2025
Why Security Stacks Need To Think Like An Attacker, And Score Every User In Real Time

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More. More than 40% of corporate fraud is now AI-driven, designed to mimic real users, bypass traditional defenses and scale at speeds that overwhelm even the best-equipped SOCs.In 2024, nearly 90% of enterprises were targeted, and half of them lost $10 million or more.Bots emulate human behavior and create entire emulation frameworks, synthetic identities, and behavioral spoofing to pull off account takeovers at scale while slipping past legacy firewalls, EDR tools, and siloed fraud detection systems.Attackers weaponize AI to create bots that evade, mimic, and scaleAttackers aren’t wasting any time capitalizing on using AI to weaponize bots in new ways. Last year, malicious bots comprised 24% of all internet traffic, with 49% classified as ‘advanced bots’ designed to mimic human behavior and execute complex interactions, including account takeovers (ATO).Over 60% of account takeover (ATO) attempts in 2024 were initiated by bots, capable of breaching a victim’s credentials in real time using emulation frameworks that mimic human behavior. Attacker’s tradecraft now reflects the ability to combine weaponized AI and behavioral attack techniques into a single bot strategy.That’s proving to be a lethal combination for many enterprises already battling malicious bots whose intrusion attempts often aren’t captured by existing apps and tools in security operations centers (SOCs).Malicious bot attacks force SOC teams into firefighting mode with little or no warning, depending on the legacy of their security tech stack.“Once amassed by a threat actor, they can be weaponized,” Ken Dunham, director of the threat research unit at Qualys recently said. “Bots have incredible resources and capabilities to perform anonymous, distributed, asynchronous attacks against targets of choice, such as brute force credential attacks, distributed denial of service attacks, vulnerability scans, attempted exploitation and more.”From fan frenzy to fraud surface: bots corner the market for Taylor Swift tickets  Bots are the virtual version of attackers who can scale to millions of attempts per second to attack a targeted enterprise and increasingly high-profile events, including concerts of well-known entertainers, such as Taylor Swift.Datadome observes that the worldwide popularity of Taylor Swift’s concerts creates the ROI attackers are looking for to build ticket bots that automate what scalpers do at scale

The Paypers
Apr 3rd, 2025
Trustfull Launches Its Login Solution To Combat Ato

Trustfull, a fraud prevention provider, has launched its Login Solution to analyse behavioural and device-related signals to combat ATO fraud. According to SpyCloud, ATO attacks are on the rise, with a 24% YoY increase, resulting in nearly USD 13 billion yearly losses. Driven by data breaches, GenAI, and social engineering techniques, ATO attacks are a growing threat against businesses and their customers.Reducing ATO and fraud risk at login. Trustfull offers fraud prevention tech to support businesses worldwide in reducing risk and accelerating growth. Its platform provides digital signals to accurately detect fraud, and financial crime attempts across the consumer journey

FF News
Apr 3rd, 2025
Trustfull Launches Login Solution To Combat $13 Billion Account Takeover Problem

Trustfull, a leader in identity intelligence for fraud prevention, today announced the launch of Login Solution, which analyses hundreds of behavioural and device-related signals to combat surging account takeover (ATO) fraud.ATO attacks – when cybercriminals gain unauthorized access to existing accounts to steal users’ stored payment details, funds, and digital identities – are on the rise, increasing by 24% YOY in 2024 and resulting in nearly $13 billion yearly losses. Fuelled by data breaches, advanced social engineering techniques, and generative AI, ATO attacks are a growing threat against businesses and their customers.Trustfull’s new solution helps prevent ATO by identifying suspicious login attempts and ensures frictionless authentication in the case of legitimate access.During the login enrolment phase, Trustfull captures a snapshot of the user’s behavioural patterns and device characteristics. At every subsequent login, new data is compared against the original enrolment to assess similarity, enabling silent, instant verification for genuine users while flagging when additional checks, like multi-factor authentication and one-time passcodes, are required.The new Login API—powered by a customisable rule engine that adapts to each client’s unique needs—continuously refines its risk-scoring model to reflect legitimate user behaviour over time. A centralized dashboard provides granular visibility into authentication activity, enabling real-time decision-making and early detection of potential threats.Francesco Panina, Trustfull’s Chief Technology Officer, underscored the technical significance of the new offering: “Open Source Intelligence is the guiding principle behind all Trustfull products and solutions. To strengthen ATO protection, we have developed a lightweight JavaScript SDK that combines OSINT data on returning users’ device, browser, and IP information with unique behavioural signals, like keystroke dynamics and mouse movements. The result is a truly dynamic authentication layer that can detect account takeover attempts before it’s too late.”The new solution is now available for fast integration, catering to businesses across industries