Senior Competitive Intelligence Programs Manager
Role details
Job location
Tech stack
Job description
Identity Security is at a market inflection point. Machine identities now outnumber humans by more than 80 to 1. The rapid adoption of AI agents presents a new identity challenge: they are privileged actors that need to be discovered, secured, and governed.
Competitors and platforms are pushing hard on "control plane" narratives, such as the convergence of identity & SOC, all-in-one bundling, and AI-driven workflows, raising the bar for clarity, speed, and credibility in competitive execution. Our win/loss program shows we win when we operationalize what's true about CyberArk: our ability to secure the full spectrum of identities, provide comprehensive use-case coverage, and do this in a way that directly maps to CISO and CIO goals. Those advantages need a leader who can convert technical and GTM insight into repeatable, field-usable playbooks.
What You'll Do
-
Orchestrate offense + defense playbooks.
-
Lead competitive playbook strategy across key competitors and segments, ensuring the field has current, high-confidence guidance.
-
Ensure product launches, platform stories, analyst submissions and messaging are competitively distinct with a 'show, don't tell' mindset.
-
Partner with Enablement to integrate competitive scenarios into onboarding and ongoing training.
-
Create high-impact content and executive briefs.
-
Produce (and/or orchestrate) critical assets when stakes are high: this can include rapid responses, exec-ready briefs, field kits, and strategy decks.
-
Distill deep SME input across teams into output that's relevant to security leaders, aligned with how we are positioned to help.
-
Run the competitive operating cadence.
Requirements
-
5-8+ years in product marketing, competitive intelligence, strategy, or technical marketing (cybersecurity / enterprise software strongly preferred).
-
Demonstrated ability to translate complex technical topics into field-ready guidance that changes behavior and improves outcomes.
-
Strong working understanding of identity/security concepts (e.g., privileged access management, secrets/machine identities, cloud access, IGA/IAM adjacencies), along with the curiosity to go deep fast.
-
Excellent communication: concise writing, confident presenting, and the ability to tailor messaging from reps - execs. Strong program discipline: prioritization, stakeholder management, operating cadence, and measurement.
-
Track record building competitive programs that scale: win/loss operationalization, takeout plays, competitive enablement systems, experience