Overview
You sell CrowdStrike's Falcon platformâendpoint protection, EDR, threat intelligence, and managed servicesâto companies that either have legacy security tools (McAfee, Symantec) or are trying to consolidate their security stack. You're dealing with CISOs, security directors, and IT leaders who are evaluating 2-3 vendors and running formal POCs. Most of your time goes to managing multi-month sales cycles with technical evaluations, pricing negotiations, and procurement delays.
Role Snapshot
| Aspect | Details |
|---|---|
| Role Type | Full-cycle AE with SE support |
| Sales Motion | Balancedâinbound MQLs from webinars/events plus targeted outbound to accounts |
| Deal Complexity | Enterpriseâmulti-stakeholder, POCs, security committee reviews |
| Sales Cycle | 3-6 months for mid-market, 6-12 months for large enterprise |
| Deal Size | $50K-500K ACV depending on endpoints and modules |
| Quota (est.) | $800K-1.5M annually |
Company Context
Stage: Public (IPO 2019, post-July 2024 outage recovery phase)
Size: 11,000+ employees
Growth: Mature company, steady hiring but not hypergrowth. Recent global outage created customer churn concerns and competitor openings.
Market Position: Category leader in EDR/XDR competing with Palo Alto Networks, Microsoft Defender, SentinelOne, Trend Micro. Premium pricing, strong brand, but dealing with fallout from the global Windows outage in 2024 that affected millions of systems.
GTM Reality
Pipeline Sources:
- 40% Inboundâwebinar registrations, analyst report downloads, product trials. Quality variesâsome are tire-kickers, some are active evaluations with budget.
- 40% Outboundâyou work a named account list, cold calling security leaders, triggering events (breaches at competitors, compliance deadlines, M&A activity).
- 20% Referrals/PartnersâMSSP partnerships, existing customer expansions.
SDR/AE Structure: Dedicated SDR team books initial meetings; you take over from discovery. SDRs focus on qualification and first meeting, you own the rest.
SE Support: Dedicated Sales Engineers for demos and POCs. They handle technical deep dives, you manage business conversations and negotiations.
Competitive Landscape
Main Competitors:
- Palo Alto Networks Cortex XDR (integrated with their firewall installed base)
- Microsoft Defender for Endpoint (bundled with E5, hard to beat on price)
- SentinelOne (next-gen positioning, aggressive pricing)
- Legacy AV vendors (Trend Micro, McAfee, Symantec/Broadcom)
How They Differentiate: Threat intelligence (CrowdStrike Intelligence team), proven IR/breach response experience, cloud-native architecture, Falcon platform breadth (endpoints + cloud + identity).
Common Objections:
- "We already have Microsoft E5/Defender included"
- "Your pricing is 2-3x higher than SentinelOne"
- "We're concerned about the July 2024 outageâwhat guarantees do you have?"
- "We need to consolidate vendors, not add another point solution"
Win Themes: Detection accuracy vs Microsoft, maturity vs SentinelOne, IR/MDR services, threat intel feed, existing Fortune 500 customer base.
What You'll Actually Do
Time Breakdown
Active Deals (45%) | Prospecting (25%) | Internal (20%) | POC/Technical (10%)
Key Activities
-
Managing POCs: Coordinate with your SE and the customer's security team on 30-day trials. You're chasing weekly check-ins, making sure they're actually testing, addressing blockers (agent deployment issues, firewall rules, false positives). Many POCs stall because they never finish testing.
-
Multi-threading: You need buy-in from security operations (daily users), the CISO (budget owner), IT infrastructure (deployment), and procurement (contract terms). You're setting up separate calls with each, navigating politics between teams, and discovering new stakeholders mid-cycle.
-
Competitive displacement: You're selling against entrenched vendors. This means running "bakeoff" evaluations where you're compared side-by-side with 2-3 competitors. You need to coordinate references, ROI analyses, and executive briefings while dealing with incumbent vendors offering deep renewal discounts.
-
Pricing negotiations: CrowdStrike is premium-priced. Expect multiple rounds of discount requests, escalations to your VP for approvals, and deals that push because "we need to see what SentinelOne comes back with." You'll spend a lot of time justifying price vs competitors.
-
Forecasting and pipeline hygiene: Weekly forecast calls with your manager. You're updating Salesforce stages, justifying why deals will close this quarter, and explaining why others slipped. Leadership leans on "commit" vs "best case" accuracy.
The Honest Reality
What's Hard
-
The July 2024 outage shadow: Every deal now includes questions about the global Windows crash caused by a Falcon sensor update. You need a practiced response and executive reassurance. Some prospects will eliminate you based on this alone.
-
Long, unpredictable cycles: Even when a POC goes well, you'll wait 4-8 weeks for security committee meetings, vendor review boards, and legal/procurement. Deals routinely slip quarters because "they're still finalizing budget" or "waiting on the board meeting."
-
Microsoft Defender competition: Half your deals compete with "free" Defender (bundled in E5). You're selling a 3-4x price increase, which requires proving material detection gaps. If they haven't been breached recently, it's a tough value sell.
-
Pricing pressure: SentinelOne and others undercut you by 40-50%. You'll lose deals on price despite having a better product, especially in cost-conscious mid-market accounts.
What Success Looks Like
- Closing 8-12 deals per year in the $50K-200K range, or 3-5 larger deals in the $200K-500K range
- 40-50% win rate in POC situations (competitive evals)
- Building a pipeline of 3-4x your quarterly quota (you need $2M+ pipeline for a $500K quarter)
Who You're Selling To
Primary Buyers:
- CISOs and VPs of Security (budget owners, final approvers)
- Security Operations Managers / SOC Directors (day-to-day users, technical evaluators)
- IT Directors / Infrastructure VPs (concerned with deployment, performance impact, integration)
What They Care About:
- Detection efficacy: Can you catch what they're missing? MITRE ATT&CK results, breach IR case studies.
- Operational efficiency: Will this reduce alert fatigue? Can it replace 3 tools with one platform?
- Deployment and maintenance: How much effort to roll out to 5,000 endpoints? What's the performance impact? (Memory/CPU usage is a real concern after the outage.)
- Cost justification: ROI on reducing breach risk, consolidating tools, replacing legacy AV + EDR + threat intel subscriptions.
- Vendor stability: Post-outage, they want assurances on change management, testing processes, and incident transparency.
Requirements
- 3-5+ years selling enterprise security software (endpoint protection, EDR, SIEM, or related)
- Experience managing 6-12 month sales cycles with technical POCs and procurement processes
- Ability to speak credibly with security practitioners (understanding of malware, threat hunting, incident response)
- Track record hitting $800K-1M+ quotas in competitive, technical sales environments
- Comfort with consultative sellingâyou're not pushing product, you're diagnosing security gaps and positioning solutions