Browse job-ready
candidates for your roles

Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Default Avatar
Candidate Name
SOC Analyst
Pakistan
Open to relocate
Security Operations Center (SOC) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Emerging Threat Research Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Endpoint Detection and Response (EDR) EDR Incident Response Security Incident Management Security Incident Analysis Security Incident Triage Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Nmap Metasploit IoT Development Linux Cybersecurity Information Security Network Security Penetration Testing Cloud Security Cloud Platforms (AWS, Azure, GCP) Analytical Skills Analytics Tools Security Awareness Training Security Awareness Security Training & Awareness
Default Avatar
Candidate Name
Sr Staff Product Security Architect
India
Open to relocate
Secure SDLC Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Analytical Skills Analytics Tools Network Security Penetration Testing Information Security Cloud Security Cloud Platforms (AWS, Azure, GCP) Container Security (Docker, Kubernetes) Docker Security Security Infrastructure Infrastructure as Code (IaC) Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Kubernetes Kubernetes Security Security Testing Python AWS Security
Default Avatar
Candidate Name
Cybersecurity Analyst
India
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Problem Solving Team Collaboration Analytical Skills Analytics Tools Incident Response Security Incident Management Security Incident Triage Security Incident Analysis Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment React Reactive Programming React Native Cloud Security Cloud Platforms (AWS, Azure, GCP) Threat Hunting Cyber Threat Intelligence Threat Detection Threat Intelligence Threat Modeling Security Awareness Training Security Training & Awareness Security Awareness Endpoint Detection and Response (EDR) Endpoint Security Web Security Practices
Default Avatar
Candidate Name
Security Researcher
Indonesia
Open to relocate
Cybersecurity Network Security Information Security Cloud Security Web Security Practices Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Problem Solving Team Collaboration Security Awareness Training Security Awareness Security Training & Awareness Risk Management Security Risk Assessment Security Risk Management Risk Assessment Vulnerability Management Vulnerability Assessment Ethical Hacking Penetration Testing Security Operations Center (SOC) Metasploit Nmap SQL for Analysts MySQL PostgreSQL SQL JavaScript PHP Cryptography Analytical Skills Analytics Tools ISO 27001 Security Frameworks (NIST, ISO 27001)
Default Avatar
Candidate Name
Cybersecurity Consultant
India
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Cloud Security Cloud Platforms (AWS, Azure, GCP) Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Endpoint Security Endpoint Detection and Response (EDR) Analytics Tools Analytical Skills Risk Management Security Risk Management Security Risk Assessment Risk Assessment Threat Intelligence Emerging Threat Research Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Python Security Awareness Training Security Training & Awareness Security Awareness Security Compliance Audits Security Operations Center (SOC) ISO 27001 Security Frameworks (NIST, ISO 27001) Governance Security Governance Programs Security Compliance Compliance
Default Avatar
Candidate Name
IT Consultant
India
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Problem Solving Team Collaboration Analytical Skills Analytics Tools Security Awareness Training Security Awareness Security Training & Awareness Business Continuity Business Continuity Planning (BCP) Cloud Security Cloud Forensics Cloud Platforms (AWS, Azure, GCP) Python Jupyter React React Native Reactive Programming Security Infrastructure Infrastructure as Code Infrastructure as Code (IaC) Security Threat Modeling Emerging Threat Research Insider Threat Detection Threat Detection Cyber Threat Intelligence
Default Avatar
Candidate Name
Information Security consultant
Iran
Open to relocate
Cybersecurity Network Security Information Security Penetration Testing Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Endpoint Security Endpoint Detection and Response (EDR) Analytical Skills Analytics Tools Cloud Security Google Cloud Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Google Cloud Platform Cloud Platforms (AWS, Azure, GCP) ISO 27001 Security Frameworks (NIST, ISO 27001) API Security Testing Security Testing Security Auditing Forensics Digital Forensics
Default Avatar
Candidate Name
Information Security Consultant
Indonesia
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Incident Response Threat Intelligence Risk Management Endpoint Security Cryptography Cloud Security Threat Hunting Security Awareness Training Endpoint Detection and Response (EDR) Threat Modeling Mobile Security Security Risk Assessment Security Incident Management Threat Detection Vulnerability Management Security Risk Management Security Awareness Risk Assessment Cyber Threat Intelligence Security Training & Awareness Security Incident Analysis Google Cloud Security CI/CD Security Analytical Skills Problem Solving Team Collaboration Security Incident Triage API Security Testing Azure Google Cloud Platform Analytics Tools
Default Avatar
Candidate Name
Software Developer
Australia
Based in Victoria
Holds Australian visa
SQL for Analysts SQL MySQL PostgreSQL JavaScript Java Python Data Visualization Jupyter Jupyter Notebooks Power BI PowerShell Tableau Team Collaboration Problem Solving Analytical Skills Analytics Tools Scikit-Learn Realtime Databases Graph Databases PHP HTML CSS React React Native Angular Vue.js Next.js REST APIs Web Performance Optimization Node.js Django Flask Spring Boot ASP.NET Core GraphQL Microservices Architecture
Default Avatar
Candidate Name
Program Manager
Australia
Based in Victoria
Holds Australian visa
Compliance Governance Business Continuity Network Monitoring Team Collaboration Security Incident Triage
Default Avatar
Candidate Name
Consultant
India
Open to relocate
Security Operations Center (SOC) SIEM Tools (Splunk, QRadar, ELK) Splunk Security Information and Event Management (SIEM) Endpoint Security Cybersecurity Information Security Network Security Penetration Testing Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness Identity and Access Management (IAM) Analytical Skills Analytics Tools Endpoint Detection and Response (EDR) EDR Compliance Security Compliance Audits ISO 27001 Security Frameworks (NIST, ISO 27001) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Log Analysis Automation Bash for Automation Security Automation Nessus Wireshark Governance Security Governance Programs Malware Analysis
Default Avatar
Candidate Name
offensive Security Consultant
India
Open to relocate
Cybersecurity Information Security Network Security Cloud Security Penetration Testing Cloud Platforms (AWS, Azure, GCP) Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Threat Intelligence Threat Modeling Threat Detection Threat Hunting Cyber Threat Intelligence Security Awareness Training Security Training & Awareness Security Awareness Analytical Skills Analytics Tools Endpoint Security SQL for Analysts SQL MySQL PostgreSQL Forensics Digital Forensics CSS HTML React React Native CEH Ethical Hacking CompTIA Security+ API Security Testing Python PowerShell Shell Scripting
Default Avatar
Candidate Name
Senior Executive ( consultant)
India
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Cloud SIEM Integration Threat Intelligence Threat Detection Cyber Threat Intelligence Threat Modeling Threat Hunting Problem Solving Team Collaboration SIEM Tools (Splunk, QRadar, ELK) Security Awareness Training Security Awareness Security Training & Awareness Security Operations Center (SOC) Analytical Skills Analytics Tools CompTIA Security+ ISO 27001 Security Frameworks (NIST, ISO 27001)
Default Avatar
Candidate Name
Senior security engineer
Philippines
Open to relocate
Cybersecurity Network Security Information Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness SQL for Analysts PostgreSQL MySQL SQL Cloud Security Cloud SIEM Integration Cloud Threat Intelligence Threat Detection Cyber Threat Intelligence Threat Modeling Threat Hunting Threat Intelligence PowerShell Identity and Access Management (IAM)
Default Avatar
Candidate Name
Consultant in Cybersecurity
India
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Endpoint Security Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Analytical Skills Python Security Awareness Training Security Training & Awareness Security Awareness Cloud Security Google Cloud Security Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling ISO 27001 Power BI Data Visualization Analytics Tools Compliance Security Compliance Audits
Default Avatar
Candidate Name
Security consultant
India
Open to relocate
Cybersecurity Network Security Penetration Testing Information Security Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness Endpoint Security Google Cloud Security Cloud Platforms (AWS, Azure, GCP) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Python Java C++ Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Data Visualization Analytical Skills Analytics Tools
Default Avatar
Candidate Name
Soc analyst
Pakistan
Open to relocate
Security Operations Center (SOC) Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Analytical Skills Analytics Tools Cybersecurity Network Security Penetration Testing Information Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Security Awareness Training Security Awareness Security Training & Awareness Cloud Security Google Cloud Security Cloud Platforms (AWS, Azure, GCP) Endpoint Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Ethical Hacking Kali Linux
Default Avatar
Candidate Name
Cyber Security
India
Open to relocate
Cybersecurity Network Security Penetration Testing Vulnerability Assessment Information Security Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Ethical Hacking Threat Intelligence Emerging Threat Research Cyber Threat Intelligence Threat Detection Security Awareness Training Security Awareness Security Training & Awareness OWASP Top 10 ISO 27001 Metasploit Nmap Wireshark Kali Linux SQL for Analysts SQL MySQL PostgreSQL Digital Forensics Automation Security Automation Cryptography
Default Avatar
Candidate Name
Technical Consultant
India
Open to relocate
React Vue.js Ruby on Rails JavaScript Node.js CSS Python Ruby PHP Terraform Cloud Platforms (AWS, Azure, GCP) AWS Secure SDLC Cybersecurity Network Security Information Security Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Endpoint Security Security Awareness Training Security Awareness Security Training & Awareness Infrastructure as Code Security Infrastructure
Default Avatar
Candidate Name
Cybersecurity Intern
India
Open to relocate
Cybersecurity Network Security Information Security Cloud Security Penetration Testing Digital Forensics Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Endpoint Security Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Threat Intelligence Cyber Threat Intelligence Cloud Threat Intelligence Threat Detection Threat Hunting Security Awareness Training Security Awareness Security Training & Awareness Power BI Analytical Skills Analytics Tools Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Data Visualization Security Auditing SQL for Analysts SQL MySQL PostgreSQL Tableau Nessus Nmap Python
Default Avatar
Candidate Name
Sr DevOps Engineer
Pakistan
Open to relocate
Cybersecurity Network Security Penetration Testing Security Operations Center (SOC) Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Problem Solving Red Team Exercises Analytical Skills Analytics Tools Security Awareness Training Security Training & Awareness Security Awareness Cloud Security Security Incident Triage Security Incident Management Security Incident Analysis Incident Response Endpoint Security Cloud Platforms (AWS, Azure, GCP) AWS Cloud Forensics CloudFormation Prometheus Grafana GitLab Container Security (Docker, Kubernetes) Kubernetes Security Linux Bash Bash for Automation CI/CD pipelines CI/CD Security Python TypeScript PHP PostgreSQL SQL for Analysts SQL MySQL SQLite Kotlin C++ Jenkins REST APIs API Development Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK)
Default Avatar
Candidate Name
Section Head
Indonesia
Open to relocate
Cybersecurity Information Security Network Security Cloud Security Cloud Platforms (AWS, Azure, GCP) Penetration Testing Risk Management Security Risk Management Risk Assessment Security Risk Assessment Vulnerability Assessment Problem Solving Team Collaboration Incident Response Security Incident Triage Security Incident Management Security Incident Analysis Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Emerging Threat Research Endpoint Security Security Awareness Training Security Training & Awareness Security Awareness Python C++ Analytical Skills Analytics Tools
Default Avatar
Candidate Name
Assistant Lecturer
Sri Lanka
Open to relocate
Cybersecurity Information Security Network Security Vulnerability Assessment Incident Response Threat Intelligence Risk Management Compliance Endpoint Security Security Information and Event Management (SIEM) Cloud Security Forensics Digital Forensics Threat Hunting Security Awareness Training Threat Modeling Kali Linux Python Security Risk Assessment Security Compliance Audits Security Incident Management Threat Detection Vulnerability Management Security Risk Management Security Awareness Risk Assessment Cyber Threat Intelligence Security Training & Awareness Security Incident Analysis QRadar Analytical Skills Problem Solving Security Incident Triage Analytics Tools
Default Avatar
Candidate Name
Associate Cyber Security GRC Consultant
Australia
Based in Victoria
Holds Australian visa
Cybersecurity Network Security Information Security Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Endpoint Security Analytical Skills Analytics Tools Penetration Testing Governance Security Governance Stakeholder Engagement Python Ethical Hacking Threat Intelligence Cyber Threat Intelligence Emerging Threat Research Threat Detection Threat Hunting Threat Modeling CISSP Cloud Platforms (AWS, Azure, GCP) AWS AWS Security DevSecOps
Default Avatar
Candidate Name
SOC Analyst
Pakistan
Open to relocate
Cybersecurity Network Security Penetration Testing Security Operations Center (SOC) Information Security Problem Solving Team Collaboration Cloud Security Vulnerability Assessment Vulnerability Management Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Endpoint Security Risk Management Security Risk Management Security Risk Assessment Risk Assessment Cloud Platforms (AWS, Azure, GCP) Threat Intelligence Threat Detection Emerging Threat Research Cyber Threat Intelligence Threat Hunting ISO 27001 Security Frameworks (NIST, ISO 27001) Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Analytical Skills Analytics Tools
Default Avatar
Candidate Name
Application Development Consultant
Philippines
Open to relocate
Python Scripting Analytical Skills Problem Solving Team Collaboration SQL for Analysts SQL MySQL PostgreSQL SQLite GitHub Actions GitHub GitLab Infrastructure as Code Analytics Tools Java
Default Avatar
Candidate Name
Cyber Security Analyst
Sri Lanka
Open to relocate
Cybersecurity Network Security Information Security Cloud Security Penetration Testing Security Operations Center (SOC) Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Security Awareness Training Security Awareness Security Training & Awareness Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Endpoint Security Incident Response Security Incident Triage Security Incident Management Security Incident Analysis Python C++ SQL SQL for Analysts MySQL PostgreSQL SQLite GitHub Actions GitHub Ethical Hacking Cloud Platforms (AWS, Azure, GCP) AWS Security AWS Team Collaboration Problem Solving
Default Avatar
Candidate Name
Cybersecurity Analyst
Sri Lanka
Open to relocate
Cybersecurity Information Security Network Security Cloud Security Cloud Platforms (AWS, Azure, GCP) Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Risk Assessment Security Risk Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Problem Solving Team Collaboration Analytical Skills Analytics Tools Penetration Testing Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Threat Intelligence Cyber Threat Intelligence Threat Detection Endpoint Security Endpoint Detection and Response (EDR)
Default Avatar
Candidate Name
Information Security Analyst
Pakistan
Open to relocate
Cybersecurity Information Security Network Security Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Ethical Hacking Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Problem Solving Security Awareness Training Security Awareness Security Training & Awareness Analytical Skills Analytics Tools Wireshark Wireless Security Penetration Testing Incident Response Security Incident Management Security Incident Analysis Security Incident Triage ELK Stack
Default Avatar
Candidate Name
QA Engineer
Vietnam
Open to relocate
Scripting Python Team Collaboration Problem Solving Penetration Testing Cybersecurity Network Security Vulnerability Assessment Risk Assessment Security Risk Assessment Security Risk Management Risk Management Security Awareness Training Security Awareness Security Training & Awareness Incident Response Security Incident Management Security Incident Analysis Security Incident Triage Ethical Hacking Metasploit Linux