Browse job-ready
candidates for your roles
Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Candidate Name
Security Engineer
VietnamOpen to relocate
Red Team Exercises Cybersecurity C# Java Python Go Docker Penetration Testing Kubernetes Metasploit Security Infrastructure Malware Analysis Network Security
Candidate Name
Professor
IndiaOpen to relocate
Tableau AI in Cybersecurity Python Machine Learning for Security Analytical Skills C++ MATLAB IoT Dev
Candidate Name
Research Grant Office
Queensland, Brisbane, AustraliaOpen to relocate
Holds Australian visa
Cybersecurity Network Security Penetration Testing Ethical Hacking Compliance Data Privacy Digital Forensics Python AI in Cybersecurity Java Fraud Detection HTML PHP MySQL PostgreSQL JSON Docker GitHub GitLab Apache Spark Hadoop Pandas NumPy PyTorch Scikit-Learn R Tableau Linux Scala
Candidate Name
Senior Consultant
MalaysiaOpen to relocate
Cybersecurity Governance Compliance Risk Management Cloud Security Security Infrastructure Data Loss Prevention (DLP) Security Operations Center (SOC) NIST Cybersecurity Framework Vulnerability Assessment Vulnerability Management Information Security Firewalls Active Directory Security Security Incident Management Encryption Splunk Azure API Gateways Network Security
Candidate Name
Senior IAM Engineer
PhilippinesOpen to relocate
Cybersecurity Risk Management Governance Security Governance Identity and Access Management (IAM) Analytical Skills Team Collaboration Splunk Active Directory Security Security Metrics and Reporting Security Auditing Security Risk Assessment Third-Party Risk Management
Candidate Name
KYC Analyst
PhilippinesOpen to relocate
Cybersecurity Team Collaboration Problem Solving Fraud Detection Phishing Prevention Compliance Security Compliance Compliance Monitoring Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Security Reporting Risk Assessment Security Risk Assessment
Candidate Name
Cybersecurity SME
PhilippinesOpen to relocate
Cybersecurity Security Auditing Compliance Security Risk Management Cybersecurity Law Security Incident Management Incident Response ISO 27001 Network Security Cloud Security Security Operations Center (SOC) SaaS Security Assessment API Development
Candidate Name
Team Leader
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
Problem Solving Team Collaboration Analytical Skills Analytics Tools Data Privacy Data Visualization SQL Python Power BI Tableau
Candidate Name
Senior Analyst, Incident Response
MalaysiaOpen to relocate
Cybersecurity Security Incident Management Incident Response Vulnerability Management Automation JavaScript CSS Python HTML Java C++ Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Security Operations Center (SOC) Security Reporting Cyber Threat Intelligence
Candidate Name
Senior Customer Solution Architect
PhilippinesOpen to relocate
Cybersecurity Cloud Security Firewalls Data Privacy Security Awareness Network Security Malware Analysis DevSecOps IoT Security Wireless Security Analytical Skills Problem Solving Zero Trust Architecture Vulnerability Management Governance Cloud Platforms (AWS, Azure, GCP) Azure VPN Technologies Bash Python Ansible PowerShell Zscaler Wireshark Linux Firewall Configuration
Candidate Name
Expert Network Consultant
IndiaOpen to relocate
AI in Cybersecurity Identity and Access Management (IAM) PCI DSS Cloud Platforms (AWS, Azure, GCP) Cloud Security Data Privacy Python Machine Learning for Security Risk Management AWS SaaS Security Assessment SQL Cybersecurity Security Risk Management Information Security Compliance ISO 27001 NIST Cybersecurity Framework Security Auditing Security Operations Center (SOC) Automation Azure Tableau Problem Solving TensorFlow Scikit-Learn JavaScript Terraform PyTorch Security Compliance Audits
Candidate Name
Security Analyst
MalaysiaOpen to relocate
Cybersecurity Firewalls Endpoint Detection and Response (EDR) Endpoint Security Active Directory Security AWS Azure Network Security Threat Intelligence PCI DSS Vulnerability Management Cloud Security Malware Analysis Forensics Security Auditing Penetration Testing Security Compliance Audits Vulnerability Assessment Cyber Threat Intelligence Security Infrastructure
Candidate Name
Senior Analyst
IndiaOpen to relocate
Cybersecurity Open-Source Intelligence (OSINT) Azure Cloud Security Cloud Platforms (AWS, Azure, GCP) Phishing Prevention MITRE ATT&CK Framework Incident Response SOAR Automation Threat Intelligence Cyber Threat Intelligence Threat Hunting CEH Ethical Hacking Security Operations Center (SOC) ELK Stack Vulnerability Assessment Vulnerability Management Risk Management Malware Analysis Network Monitoring Forensics Digital Forensics Security Information and Event Management (SIEM) Network Security Endpoint Security
Candidate Name
Cybersecurity Engineer
MalaysiaOpen to relocate
Cybersecurity Ethical Hacking Penetration Testing Firewalls Team Collaboration Python Network Security Information Security SQL Problem Solving IoT Security Wireshark Linux HTML CSS MySQL Visual Studio Code ASP.NET Core API Development C# JavaScript PHP C++ Bootstrap Digital Forensics Nmap Incident Response Red Team Exercises
Candidate Name
Senior Product Manager
GreeceOpen to relocate
Problem Solving Business Continuity AI in Cybersecurity Cloud Security Python Analytical Skills Git C++ Java Hadoop Apache Spark Linux Cybersecurity Figma Tableau Power BI Data Visualization SaaS Security Assessment Docker
Candidate Name
University Lecturer in Artificial Intelligence
United KingdomOpen to relocate
Python AI in Cybersecurity Machine Learning for Security MATLAB C++ Analytical Skills R Image Optimization Leadership in Security Operations
Candidate Name
Solutions Director
MalaysiaOpen to relocate
Cybersecurity Analytical Skills Problem Solving Team Collaboration Governance Security Governance Wireless Security QRadar Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Data Privacy Encryption Zero Trust Architecture Endpoint Security GDPR Incident Response Network Security NIST Cybersecurity Framework Risk Assessment Automation Threat Detection AWS Azure SaaS Security Assessment Kubernetes Security Automation Compliance Cloud Security
Candidate Name
Enterprise Security Specialist
IndiaOpen to relocate
Cybersecurity CEH Security Auditing Incident Response Firewalls Security Risk Management Vulnerability Management Network Security Analytical Skills Information Security Problem Solving Ethical Hacking Tenable Nessus Security Information and Event Management (SIEM) Nmap Wireshark VPN Technologies Vulnerability Assessment Threat Intelligence CompTIA Security+ Databricks Zscaler Qualys Linux
Candidate Name
IT Business Partner – Commercial & Digital
IndonesiaOpen to relocate
Cybersecurity Security Auditing Analytical Skills AWS Security Training Delivery Secure SDLC Governance Compliance Behavioral Analytics Cloud Platforms (AWS, Azure, GCP) Security Compliance Audits
Candidate Name
Professor in Cyber Security
IndonesiaOpen to relocate
Analytical Skills Cybersecurity Network Security Machine Learning for Security C++ Shell Scripting Linux Java PHP MySQL MATLAB HTML Information Security Wireless Security
Candidate Name
ERP Manager
VietnamOpen to relocate
Business Continuity Security Architecture Automation Analytical Skills Problem Solving Team Collaboration Java SaaS Security Assessment HTML Spring Boot ASP.NET Core SQL MySQL XML AWS Linux C# Hibernate ASP.NET MVC Information Security Python
Candidate Name
Recruiter
South AfricaOpen to relocate
Team Collaboration Problem Solving Cybersecurity AI in Cybersecurity Analytical Skills
Candidate Name
Team Leader (Manager), Statutory Accountant
MalaysiaOpen to relocate
Security Auditing Compliance Governance Python Security Compliance Audits Knowledge Transfer Analytical Skills Problem Solving Team Collaboration Java HTML CSS JavaScript ASP.NET Core PHP MySQL GitHub AWS Azure Google Cloud Platform Linux C++
Candidate Name
L2 Cybersecurity Analyst
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
Cybersecurity Application Security Penetration Testing Active Directory Security Ethical Hacking Endpoint Security Forensics Wireshark Open-Source Intelligence (OSINT) Threat Intelligence Digital Forensics Tenable Nessus Security Information and Event Management (SIEM) Incident Response Bash AWS Linux C++ Python Swift Visual Studio Code Threat Hunting Security Operations Center (SOC) GitLab Automation Indicator of Compromise (IOC) Analysis Scripting
Candidate Name
IT Change and Transformation Consultant
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
SQL Azure Active Directory Security Cloud Platforms (AWS, Azure, GCP) Cybersecurity Team Collaboration Analytical Skills Security Incident Management
Candidate Name
Systems Integration Specialist Advisor
IndiaOpen to relocate
Grafana Disaster Recovery Network Monitoring Governance Kibana Risk Management Analytical Skills Problem Solving
Candidate Name
Cyber Security Manager
CanadaOpen to relocate
Azure Cybersecurity Network Security Kali Linux Incident Response Security Operations Center (SOC) Phishing Prevention Fraud Detection Security Incident Management Information Security Network Monitoring Threat Hunting
Candidate Name
Quality Assurance Engineer
Palestine, State ofOpen to relocate
Automation SQL Grafana Cypress Postman
Candidate Name
Researcher
South Australia, Adelaide, AustraliaOpen to relocate
Holds Australian visa
Cybersecurity Red Team Exercises Python AWS Lambda AWS MATLAB C++ Team Collaboration AI in Cybersecurity Machine Learning for Security
Candidate Name
Associate Professor- CS & AI
AlgeriaOpen to relocate
Python Java Data Visualization SQL XML Pandas NumPy TensorFlow Scikit-Learn Jupyter Linux C++