Qubes comes with a "Convert to trusted PDF" out of the box. Joanna Rutkowska explained how it works under the hood pretty nicely[1]. The tldr is that it is very thorough. With Qubes it is convenient too.
I used Qubes to open the application mails and their attachments and converted the interesting ones to trusted PDFs which I then forwarded to the relevant people. All further communication was only with the trusted versions.
[1] https://blog.invisiblethings.org/2013/02/21/converting-untru...
If someone is delivering targeted malware to a company through HR channels, it's safe to assume that if they can escape the document viewer, they can probably also try for a local root/kernel exploit and escape the container.
Containers are separation of convenience - not a hard security boundary.
But the history of computers security can largely be summed as:
"What? You're just paranoid. Nobody would possibly X!"
Someone gets their asses handed to them by someone Xing.
"What? Why didn't you tell us X was a risk we needed to be concerned about???"
Iterate.