Skip to content
mimi

Senior Product Manager, Attack Surface Management (Amravati)

Qualys

Amravati · On-site Full-time Senior Yesterday

About the role

About Qualys

Qualys, Inc. (NASDAQ: QLYS) is a cloud security and compliance company with 10,000+ subscription customers worldwide, including many Forbes Global 100 and Fortune 100 organizations. Qualys helps teams consolidate security and compliance workflows on one platform to improve outcomes, increase agility, and reduce cost.

Role Overview

This role owns Attack Surface Management as a core pillar of the Qualys TruRisk Platform, built on top of the Unified Inventory layer that powers ETM. You will drive how Qualys discovers, attributes, correlates, and governs the external attack surface (EASM) & Internal Attack Surface and connects it to the broader enterprise inventory used by ETM across different asset types such as hosts, containers, cloud resources, SaaS services, and identities. The goal is a single trusted inventory that enables ETM outcomes end-to-end:

  • build a complete and continuously updated perimeter (internal & external)
  • link exposures to vulnerabilities, misconfigurations, compliance and identity risk
  • provide business context for prioritization, reporting, and TruRisk outcomes
  • uncover and operationalize Shadow IT and unmanaged internet‑facing assets

This is a platform‑minded PM role combining CAASM‑style inventory and EASM‑style external discovery: multi‑source ingestion, attribution and identity resolution, deduplication and reconciliation, governance workflows, and risk‑ready insights.

What You Will Own

You will lead one or more areas depending on strengths and roadmap priorities.

Unified Inventory for ETM (core platform)

  • Multi‑source ingestion: APIs, webhooks, bulk imports, partner integrations (ServiceNow, Jira, CMDB, CSPM, IdP)
  • Identity resolution and reconciliation: correlation, dedupe, entity resolution across sources
  • Normalization and tokenization: standard attributes, tags, metadata enrichment, schema strategy across asset types
  • Staging and governance workflows: validation, conflict handling, approvals, audit and change history, lifecycle state
  • Inventory health and coverage: completeness, freshness, confidence scoring, ownership mapping, Shadow IT discovery

Attack Surface Management (EASM) built on Unified Inventory

  • External discovery: domains, subdomains, DNS, certificates, IPs, cloud services, internet‑facing services
  • Attribution and ownership mapping: link discovered assets to orgs, subsidiaries, brands, apps, teams, environments
  • Continuous monitoring: change detection, new exposure alerts, drift tracking, asset lifecycle for external perimeter
  • External enrichment: tech stack, ASN/provider, geo, certificate relationships, exposure context
  • Third party and shared infrastructure handling: CDNs, shared hosting, vendors, ambiguous ownership workflows

Essential Duties and Responsibilities

  • Convert customer and field use cases into product strategy, roadmap themes, epics, user stories, and acceptance criteria
  • Partner with engineering and architecture on solution design (data model, pipelines, correlation and attribution logic, APIs) and drive delivery from concept through release
  • Own backlog quality: prioritization, grooming, breaking epics into shippable increments, defining validation and Definition of Done criteria
  • Drive execution cadence with engineering leadership: sprint readiness, dependencies, tradeoffs, and release planning
  • Ensure features support real enterprise workflows across SecOps, IT Ops, cloud teams, and GRC, including how teams operationalize EASM findings into ETM outcomes
  • Define personas and workflows; collaborate with UX on scalable experiences (wireframes, annotations, interaction specifications)
  • Define and track success metrics: onboarding time, coverage percentage, attribution confidence, dedupe accuracy, reconciliation confidence, alert quality, adoption, and ETM impact
  • Support POCs and strategic accounts: demos, discovery sessions, feedback loops, outcome‑driven iteration
  • Partner with Product Marketing, Sales, and SE teams for launch readiness, positioning, demo flows, and competitive enablement

Desired Skills, Experience, and Qualifications

  • 5+ years of product management experience in B2B SaaS, cybersecurity & equivalent techno‑functional ownership experience (security engineering, solution architecture, platform engineering)
  • Strong understanding of asset inventory and CAASM concepts: multi‑source correlation, trusted inventory, normalization, reconciliation
  • Strong understanding of Attack Surface Management and EASM: external discovery, attribution, continuous monitoring, Shadow IT and unmanaged asset identification
  • Proven ability to write crisp requirements: user stories, edge cases, acceptance criteria, workflow definitions; comfortable operating in Agile and Scrum
  • Platform mindset: data models and schemas, APIs, data quality, scalability and performance tradeoffs
  • Solid communication skills: align executives and stakeholders; build enablement colla

Requirements

  • 5+ years of product management experience in B2B SaaS, cybersecurity & equivalent techno‑functional ownership experience (security engineering, solution architecture, platform engineering)
  • Strong understanding of asset inventory and CAASM concepts: multi‑source correlation, trusted inventory, normalization, reconciliation
  • Strong understanding of Attack Surface Management and EASM: external discovery, attribution, continuous monitoring, Shadow IT and unmanaged asset identification
  • Proven ability to write crisp requirements: user stories, edge cases, acceptance criteria, workflow definitions; comfortable operating in Agile and Scrum
  • Platform mindset: data models and schemas, APIs, data quality, scalability and performance trade‑offs
  • Solid communication skills: align executives and stakeholders; build enablement collaboration

Responsibilities

  • Convert customer and field use cases into product strategy, roadmap themes, epics, user stories, and acceptance criteria
  • Partner with engineering and architecture on solution design (data model, pipelines, correlation and attribution logic, APIs) and drive delivery from concept through release
  • Own backlog quality: prioritization, grooming, breaking epics into shippable increments, defining validation and Definition of Done criteria
  • Drive execution cadence with engineering leadership: sprint readiness, dependencies, tradeoffs, and release planning
  • Ensure features support real enterprise workflows across SecOps, IT Ops, cloud teams, and GRC, including how teams operationalize EASM findings into ETM outcomes
  • Define personas and workflows; collaborate with UX on scalable experiences (wireframes, annotations, interaction specifications)
  • Define and track success metrics: onboarding time, coverage percentage, attribution confidence, dedupe accuracy, reconciliation confidence, alert quality, adoption, and ETM impact
  • Support POCs and strategic accounts: demos, discovery sessions, feedback loops, outcome‑driven iteration
  • Partner with Product Marketing, Sales, and SE teams for launch readiness, positioning, demo flows, and competitive enablement

Skills

Product ManagementB2B SaaSCybersecurityCAASMEASMAgile/ScrumData ModelingAPI DesignStakeholder Communication

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free