Threat Strategy Manager III
Listed on 2026-02-16
-
IT/Tech
Cybersecurity
About Us
Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple safeguard the digital world and empower people to work securely and confidently.
Join us in our pursuit to defend data and protect people.
At Proofpoint you’ll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values
- Bold in how we dream and innovate
- Responsive to feedback, challenges and opportunities
- Accountable for results and best in class outcomes
- Visionary in future focused problem-solving
- Exceptional in execution and impact
The role of the Threat Strategy Manager is to work with your customers so that they realize the full value of the products and services they have purchased from Proofpoint, ultimately maximizing renewals and add‑on transactions. This is a technical role in a fast‑paced environment that demands interaction with enterprises at senior levels, as well as with technical staff within the traditional IT and Security organization.
Independently provide ongoing and proactive technical leadership and support to Proofpoint’s strategic customers with little direction.
- Manage and monitor support interactions, serving as an internal advocate for strategic customers, responding to customer escalations, and proactively escalating when needed
- Meet regularly with clients to review support interactions, system status, key issues, emerging threats and how to combat them using Proofpoint products and services
- Develop deep understanding of customer’s business and operational needs
- Maintain deep practical technical knowledge of Proofpoint’s integration within the customer's environment, including network, security, systems administration, and messaging management
- Develop and oversee a comprehensive strategy to meet complex customer requirements utilizing Proofpoint’s solutions
- Provide proactive recommendations that protect our customer’s information assets, leveraging the Proofpoint product suite
- Identify and prioritize short term and long‑term goals
- Plan and lead process improvement initiatives tailored to improve customer satisfaction with the services and interaction with the Proofpoint Team
- Plan, document, and identify risks and challenges for production changes that span multiple services or technologies
- Monitors levels customer satisfaction and escalates customer concerns as necessary
- Responsible for scheduling own time and for quality completion of multiple tasks within a varying environment of changing constraints
- Uses independent judgment within broad parameters
- Designs and implements solutions to complex problems with minimum supervision
- Provide technical guidance to customer teams and respond to enquiries regarding product features and functionality
- Lead proactive, hypothesis‑driven threat hunting focused on email‑borne threats, including phishing, business email compromise (BEC), credential harvesting, malware delivery, and abuse of trusted services
- Analyze messaging telemetry, email headers, URLs, attachments, and user interaction data to identify low‑signal, evasive, or novel attack patterns
- Correlate customer email data with Proofpoint threat intelligence to uncover emerging attacker infrastructure, techniques, and social engineering trends
- Investigate suspicious or ambiguous email activity to determine attacker intent, scope of impact, and risk to users and the organization
- Translate threat hunting findings into actionable recommendations, detection improvements, and preventative controls using Proofpoint solutions
- Partner with internal threat research, detection engineering, and product teams to share email‑centric threat insights and improve platform‑wide protections
- Deliver clear, customer‑facing briefings on email threat hunting results, trends, and lessons learned, tailored…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).