Browse job-ready
candidates for your roles
Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Candidate Name
Deputy Manager
TaiwanOpen to relocate
ISO 27001 Information Security Security Auditing Automation Disaster Recovery C++ Linux MySQL Business Continuity Business Continuity Planning (BCP) Risk Assessment Cybersecurity
Candidate Name
System Analyst
Victoria, Melbourne, AustraliaBased in Victoria
Australian Passport holder
Java Spring Boot Hibernate JavaScript MySQL AWS Azure Jenkins Splunk Postman Technical Documentation Secure SDLC XML SQL
Candidate Name
Global Technology Services Specialist – Infrastructure & Operations
Victoria, AustraliaBased in Victoria
Linux HTML Azure Firewalls Active Directory Security Disaster Recovery Cloud Security Cloud Platforms (AWS, Azure, GCP)
Candidate Name
SOC Analyst
IndiaOpen to relocate
Cybersecurity CrowdStrike Falcon Incident Response Vulnerability Management Threat Modeling ELK Stack Security Incident Management Security Monitoring Security Operations Center (SOC) Azure QRadar EDR PowerShell Splunk Kali Linux Ethical Hacking Vulnerability Assessment Security Information and Event Management (SIEM) C# Java Active Directory Security Cyber Threat Intelligence Network Security Threat Intelligence Nmap Wireshark Burp Suite Metasploit SQL SIEM Tools (Splunk, QRadar, ELK) MITRE ATT&CK Framework Endpoint Detection and Response (EDR) Malware Analysis Threat Hunting Problem Solving Threat Detection
Candidate Name
AS400/RPG Developer
Victoria, AustraliaBased in Victoria
Holds Australian visa
JSON Postman SQL XML REST APIs Analytical Skills API Security Testing
Candidate Name
IT Security GRC
VietnamOpen to relocate
Cybersecurity Security Auditing Security Compliance Audits Information Security Compliance Security Compliance Compliance Monitoring ISO 27001 PCI DSS Security Assessments
Candidate Name
Head of Sector Retail
GermanyOpen to relocate
Team Collaboration AI Security Automation Problem Solving Business Continuity
Candidate Name
Cybersecurity Planning Assistant
PhilippinesOpen to relocate
Cybersecurity AI Security Information Security Penetration Testing Security Information and Event Management (SIEM) Application Security Vulnerability Assessment Vulnerability Management Threat Intelligence Incident Response Data Loss Prevention (DLP) Security Awareness Network Security Firewalls Firewall Configuration Disaster Recovery Security Governance Risk Management Team Collaboration Analytical Skills Problem Solving Ethical Hacking CEH Threat Detection Cryptography
Candidate Name
SOC Analyst
South AfricaOpen to relocate
Security Information and Event Management (SIEM) Cybersecurity Security Operations Center (SOC) Incident Response Vulnerability Management Malware Analysis Threat Hunting Endpoint Security EDR Endpoint Detection and Response (EDR) Threat Intelligence Data Loss Prevention (DLP) Security Frameworks (NIST, ISO 27001) SOC 2 Compliance
Candidate Name
Network Engineer
VietnamOpen to relocate
Network Security Network Monitoring Cybersecurity Azure AI in Cybersecurity
Candidate Name
Red Team Member
TürkiyeOpen to relocate
Cybersecurity Penetration Testing Ethical Hacking Cloud Security Application Security Threat Modeling Python Scripting DevSecOps Mobile Security Red Team Exercises Security Testing Vulnerability Management Bash Secure SDLC Red Team Engagement Support API Security Testing Django Flask Docker Jenkins GitLab AWS
Candidate Name
Network Security Engineer (Intern)
MalaysiaOpen to relocate
Cybersecurity Network Security Vulnerability Management Analytical Skills Data Privacy OWASP Top 10 Incident Response Problem Solving Vulnerability Assessment Information Security Penetration Testing Burp Suite Wireshark Ethical Hacking Team Collaboration Firewalls Firewall Configuration VPN Technologies CEH Security Infrastructure Governance
Candidate Name
Information Security Manager
VietnamOpen to relocate
Cybersecurity Python Team Collaboration Linux Information Security Risk Management Risk Assessment Governance Security Governance Security Auditing Compliance ISO 27001 Security Frameworks (NIST, ISO 27001) GDPR SOC 2 Compliance Secure SDLC Data Loss Prevention (DLP) COBIT Qualys Third-Party Risk Management
Candidate Name
System Support Engineer/CyberSecurity Engineer
South AfricaQualification verified
Open to relocate
Cybersecurity Information Security Network Security Vulnerability Assessment Incident Response Risk Management Network Monitoring Python Security Incident Management Analytical Skills Problem Solving Team Collaboration Java Active Directory Security SQL Linux
Candidate Name
Project AI Tech Lead – Sr. AI/Data Scientist
VietnamOpen to relocate
CI/CD pipelines Azure Analytical Skills Git Machine Learning for Security Python SQL Pandas Scikit-Learn BigQuery GCP Google Cloud Platform dbt Cloud Platforms (AWS, Azure, GCP) AWS FastAPI Elasticsearch Jupyter AI Security MySQL
Candidate Name
Data Analyst
IndonesiaOpen to relocate
Data Visualization Machine Learning for Security Power BI Python Hadoop SQL PHP MySQL jQuery Java HTML JavaScript MongoDB Tableau Analytical Skills Git Automation
Candidate Name
Senior Technical Support Engineer
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
Secure SDLC SEO Team Collaboration Automation Angular TypeScript C# ASP.NET Core SQL Visual Studio Code VS Code Git Bitbucket Postman AWS Lambda API Gateway
Candidate Name
Full-stack Developer
MalaysiaQualification verified
Open to relocate
Cybersecurity Penetration Testing Vulnerability Assessment Identity and Access Management (IAM) Cloud Security OWASP Top 10 Burp Suite Wireshark Python Vulnerability Management VPN Technologies Java JavaScript TypeScript Angular Node.js Laravel ASP.NET Core SQL MySQL REST APIs Docker Kubernetes Git Azure JWT CI/CD pipelines C#
Candidate Name
Associate Director
IndiaOpen to relocate
Holds Australian visa
Vulnerability Assessment ISO 27001 Cybersecurity Information Security Network Security CEH Ethical Hacking CISSP GDPR Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Red Team Exercises Penetration Testing Compliance QRadar NIST Cybersecurity Framework Security Incident Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Security Control Implementation Vulnerability Management Business Continuity Data Loss Prevention (DLP) Azure Cloud Security Threat Modeling PCI DSS SOC 2 Compliance Governance
Candidate Name
Information Security Senior Manager
PhilippinesOpen to relocate
Cybersecurity Information Security Risk Management Security Auditing Compliance Governance ISO 27001 CISM Security Risk Assessment Security Risk Management Security Compliance Security Governance Risk Assessment Analytical Skills Team Collaboration
Candidate Name
Product Specialist
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
Identity and Access Management (IAM) Python Secure SDLC Analytical Skills Problem Solving Data Visualization SQL Git AWS Azure AWS Lambda R Tableau Power BI GCP Snowflake Figma
Candidate Name
Software Engineer 3
IndiaOpen to relocate
Problem Solving Apache Kafka Apache Airflow Hybrid Mobile Apps Java REST APIs Spring Boot C++ JavaScript HTML Python SQL CSS Node.js MySQL Jenkins CI/CD pipelines Cloud Security Security Incident Management Docker Kubernetes Team Collaboration Automation
Candidate Name
SOC Manager
MyanmarOpen to relocate
Cybersecurity Security Operations Center (SOC) SOC 2 Compliance Governance Risk Management Compliance Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Risk Assessment Cloud Security Elasticsearch Splunk Information Security Application Security Security Information and Event Management (SIEM) Cyber Threat Intelligence Threat Hunting PCI DSS Vulnerability Assessment Incident Response Penetration Testing Open-Source Intelligence (OSINT) Vulnerability Management EDR Endpoint Detection and Response (EDR) Linux Log Analysis Phishing Prevention Python Burp Suite SIEM Tools (Splunk, QRadar, ELK) SonarQube Red Team Exercises Purple Team Exercises Digital Forensics Nessus
Candidate Name
Penetration Tester
VietnamOpen to relocate
Cybersecurity Penetration Testing Vulnerability Assessment Python Red Team Exercises Vulnerability Management Java Active Directory Security Go Golang Linux C# C++
Candidate Name
Cybersecurity Analyst
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
Cybersecurity NIST Cybersecurity Framework AWS Network Security Risk Assessment ISO 27001 Analytical Skills Vulnerability Assessment Governance Compliance Risk Management Malware Analysis Wireshark Penetration Testing Problem Solving Secure SDLC SQL Selenium Linux Kali Linux GDPR HIPAA PCI DSS Identity and Access Management (IAM) AWS Lambda Security Control Gap Analysis Cloud Security Splunk Burp Suite Active Directory Security GitHub Python JavaScript CompTIA Security+ Information Security
Candidate Name
Senior Software Engineer
United KingdomOpen to relocate
MVC Linux Maven Jenkins SQL Hibernate Tailwind CSS Test Driven Development HTML Machine Learning for Security Git Gradle REST APIs TypeScript CSS CI/CD pipelines Spring Boot JavaScript React Java Python C# Node.js Express.js PHP Laravel Angular Vue.js ASP.NET Core GraphQL PostgreSQL MySQL MongoDB Redis Apache Kafka RabbitMQ AWS Identity and Access Management (IAM) Azure Docker GitLab GitHub Actions Material UI SCSS IntelliJ IDEA VS Code Swagger SourceTree Postman
Candidate Name
Jnr. AI/ML Engineer
NepalOpen to relocate
Python Machine Learning for Security JavaScript Flask SQL MySQL PostgreSQL MongoDB Redis Docker Git GitHub Pandas NumPy VS Code C++ AWS Azure PyTorch
Candidate Name
Devops Engineer
Victoria, Melbourne, AustraliaBased in Victoria
Holds Australian visa
DevSecOps Kubernetes Cloud Security Google Cloud Platform Python Java Spring Boot HTML CSS JavaScript Bootstrap Postman Machine Learning for Security AI in Cybersecurity AI Security AWS AWS Lambda Identity and Access Management (IAM) Prometheus Grafana Helm Kibana CI/CD pipelines
Candidate Name
ML Engineer
United KingdomOpen to relocate
Travis CI Docker PyTorch Django React Native R FastAPI ASP.NET Core Python Azure Angular Sass Node.js C# TypeScript CSS Express.js MySQL C++ JavaScript TensorFlow AWS Kubernetes Google Cloud Platform Machine Learning for Security
Candidate Name
Security Architect
United KingdomOpen to relocate
Cybersecurity Information Security Network Security Vulnerability Assessment Incident Response Risk Management Security Auditing Compliance Governance Identity and Access Management (IAM) Application Security Disaster Recovery Business Continuity Security Architecture NIST Cybersecurity Framework ISO 27001 PCI DSS CISSP CISM Security Risk Assessment Security Incident Management Security Architecture Design Vulnerability Management Security Governance Security Awareness Risk Assessment Business Continuity Planning (BCP) Linux