Browse job-ready
candidates for your roles

Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Default Avatar
Candidate Name
Deputy Director
Pakistan
Open to relocate
Cybersecurity Information Security Red Team Exercises Metasploit Nmap Vulnerability Assessment Burp Suite ISO 27001 Incident Response Vulnerability Management Malware Analysis Cloud Security Security Infrastructure OWASP Top 10 NIST Cybersecurity Framework Python PowerShell Linux Data Privacy Network Security Penetration Testing Application Security
Default Avatar
Candidate Name
Application Security Manager
United Arab Emirates
Open to relocate
Cybersecurity AI Security Threat Modeling Risk Management Vulnerability Management Incident Response Cyber Threat Intelligence Fraud Detection DevSecOps Red Team Exercises Application Security Penetration Testing REST APIs Zero Trust Architecture Cloud Security Cloud Platforms (AWS, Azure, GCP) CI/CD pipelines Infrastructure as Code (IaC) Security Kubernetes Terraform Python Java Bash JavaScript OWASP Top 10 Security Frameworks (NIST, ISO 27001) Security Awareness Secure SDLC
Default Avatar
Candidate Name
Principal Consultant Infosec GRC
Pakistan
Open to relocate
Cybersecurity Security Infrastructure Cloud Security Governance Risk Management Compliance Problem Solving Machine Learning for Security ISO 27001 Security Awareness Information Security Security Auditing Analytical Skills SEO Risk Assessment Security Risk Assessment Security Risk Management NIST Cybersecurity Framework HIPAA Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Business Continuity Business Continuity Planning (BCP) PCI DSS
Default Avatar
Candidate Name
SOC Analyst
Pakistan
Open to relocate
Cybersecurity Security Operations Center (SOC) QRadar Security Information and Event Management (SIEM) Log Analysis Threat Detection Firewalls Incident Response MITRE ATT&CK Framework Digital Forensics Ethical Hacking AWS Cloud Security Team Collaboration Network Security CompTIA Security+ Threat Hunting Linux Intrusion Detection Technical Documentation Malware Analysis
Default Avatar
Candidate Name
Information Security Analyst
India
Open to relocate
Cybersecurity Mobile Security Ethical Hacking CEH Analytical Skills Cloud Security AWS Security Automation Application Security Security Monitoring Data Loss Prevention (DLP) Security Awareness Security Infrastructure Qualys GitHub Threat Hunting Jenkins Information Security Endpoint Security Intrusion Detection Threat Modeling Security Operations Center (SOC) Malware Analysis Security Testing Vulnerability Assessment Penetration Testing Security Control Implementation OWASP Top 10 Problem Solving Incident Response Kali Linux Burp Suite SQL Node.js JavaScript CSS HTML Network Security API Security Testing DevSecOps Automation Scripting Python Security Auditing
Default Avatar
Candidate Name
Junior Solution Analyst
India
Open to relocate
Cybersecurity AI in Cybersecurity Governance Risk Management Compliance Python Application Security
Default Avatar
Candidate Name
Software Engineer
Hong Kong
Open to relocate
Swift Node.js Next.js React Native AWS Azure React JavaScript PHP Java HTML MySQL Flutter Git Secure SDLC Vue.js Firebase Python
Default Avatar
Candidate Name
Associate Consultant, Penetration Tester
India
Open to relocate
Cybersecurity Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Compliance Identity and Access Management (IAM) Application Security Security Architecture OWASP Top 10 Kali Linux Metasploit Burp Suite Nmap Python DevSecOps Nessus Qualys Security Testing Vulnerability Management AWS Security Problem Solving API Security Testing Active Directory Security SQL AWS Azure Linux SonarQube
Default Avatar
Candidate Name
QA Engineer
India
Open to relocate
MySQL SQL Azure AWS Docker Cloud Platforms (AWS, Azure, GCP) Secure SDLC Cybersecurity AI in Cybersecurity
Default Avatar
Candidate Name
Cybersecurity and Network Research Intern
India
Open to relocate
Python C++ HTML Application Security Security Information and Event Management (SIEM) Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Threat Intelligence Network Security Vulnerability Assessment Penetration Testing Security Auditing AWS Security Identity and Access Management (IAM) Zero Trust Architecture Burp Suite Metasploit Nmap Wireshark Kali Linux Security Reporting VPN Technologies SQLite NIST Cybersecurity Framework Security Compliance Zscaler CSS Ethical Hacking
Default Avatar
Candidate Name
Senior Software Engineer
India
Open to relocate
GitLab CI/CD pipelines Grafana FastAPI AWS Next.js Analytical Skills Problem Solving SaaS Security Assessment PHP JavaScript MySQL Angular SQL jQuery CSS HTML Docker Git REST APIs Laravel Jenkins API Development RabbitMQ Elasticsearch Kubernetes Python Redis React Vue.js Linux Node.js Bash Shell Scripting MongoDB PostgreSQL AWS Lambda NGINX
Default Avatar
Candidate Name
Systems/Commissioning Engineer
Victoria, Melbourne, Australia
Based in Victoria
Holds Australian visa
Cybersecurity Network Security Penetration Testing Compliance Firewalls NIST Cybersecurity Framework ISO 27001 Kali Linux Encryption Risk Assessment Security Infrastructure VPN Technologies SQL AWS Linux
Default Avatar
Candidate Name
Cybersecurity Support Engineer
Malaysia
Open to relocate
Cybersecurity Vulnerability Assessment Wireshark Nmap Kali Linux PyCharm Team Collaboration Data Visualization Visual Studio Code Tableau Problem Solving Figma MATLAB C++ Python MySQL Java Network Security Security Risk Assessment Risk Assessment Firewalls Encryption ISO 27001 Regulatory Compliance (GDPR, PCI-DSS, HIPAA) GDPR Compliance Security Architecture
Default Avatar
Candidate Name
Senior BI Analyst
Pakistan
Open to relocate
Python Analytical Skills Problem Solving Node.js SQL MySQL Grafana Pandas MATLAB Tableau Power BI C++
Default Avatar
Candidate Name
Product Data Analyst
Pakistan
Open to relocate
SQL PostgreSQL Python Data Visualization HTML XML JavaScript MySQL Visual Studio Code PHP jQuery Team Collaboration
Default Avatar
Candidate Name
Vulnerability Assessment and Penetration Tester (VAPT) Auditor
India
Open to relocate
Cybersecurity Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Firewalls Identity and Access Management (IAM) OWASP Top 10 Kali Linux Metasploit Burp Suite Wireshark Nmap Nessus VPN Technologies Technical Documentation Problem Solving Team Collaboration API Security Testing Postman Linux
Default Avatar
Candidate Name
Associate Teachnical Lead
Sri Lanka
Open to relocate
Cybersecurity Penetration Testing Ethical Hacking Identity and Access Management (IAM) ISO 27001 PCI DSS GDPR OWASP Top 10 Burp Suite Python CEH Encryption MITRE ATT&CK Framework Privileged Access Management (PAM) Hashing Algorithms Java JavaScript React Docker Kubernetes GitHub AWS Azure
Default Avatar
Candidate Name
Ethical Hacking Intern
India
Open to relocate
Cybersecurity Vulnerability Assessment Penetration Testing OWASP Top 10 Application Security Network Security Red Team Exercises Security Auditing Security Assessments Vulnerability Management Security Testing Burp Suite Metasploit Threat Modeling Malware Analysis Cloud Security Firewalls Active Directory Security Information Security Problem Solving Cryptography Forensics Digital Forensics Bash Scripting Blockchain Security Nmap Python Endpoint Security Wireshark Ethical Hacking CEH Technical Documentation Security Automation
Default Avatar
Candidate Name
Manager, Cyber and IT Risk
India
Open to relocate
Cybersecurity Information Security Identity and Access Management (IAM) Security Auditing ISO 27001 Risk Management Risk Assessment Security Reporting SQL Security Operations Center (SOC) SOC 2 Compliance Team Collaboration
Default Avatar
Candidate Name
Analyst
Sri Lanka
Open to relocate
Security Assessments Vulnerability Assessment Vulnerability Management OWASP Top 10 Fraud Detection Problem Solving Red Team Exercises Nmap Penetration Testing Application Security Risk Management Ethical Hacking C++ C# Python PyCharm Java HTML AWS Machine Learning for Security Cryptography Digital Forensics Linux Network Security Analytical Skills Team Collaboration
Default Avatar
Candidate Name
Cloud Devops Engineer
Malaysia
Open to relocate
GitLab Bash AWS Lambda AWS CloudFormation YAML Linux Git Azure Python Jenkins Ansible Elasticsearch CI/CD pipelines Penetration Testing Machine Learning for Security AI in Cybersecurity Laravel Kali Linux C# C++ MATLAB JavaScript CSS Visual Studio Code SQL jQuery PHP GitHub Redis Go
Default Avatar
Candidate Name
Principal Cyber Risk Analyst
India
Open to relocate
Cybersecurity ISO 27001 Identity and Access Management (IAM) CISSP Risk Management SQL Java MySQL Information Security Security Architecture Security Auditing Third-Party Risk Management Data Privacy NIST Cybersecurity Framework GDPR Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Security Operations Center (SOC) SOC 2 Compliance Security Information and Event Management (SIEM) HTML Linux CSS Vulnerability Management Technical Documentation Compliance
Default Avatar
Candidate Name
Cloud Engineer
Hong Kong
Open to relocate
Infrastructure as Code (IaC) Security Google Cloud Security Cloud Security Google Cloud Platform GCP AWS Cloud Platforms (AWS, Azure, GCP) TypeScript Kubernetes Python Google Cloud Functions MongoDB Terraform Cybersecurity
Default Avatar
Candidate Name
Security Policy Deployment
India
Open to relocate
Cybersecurity Google Cloud Platform GCP Threat Modeling Terraform AWS AWS Lambda Linux Flask Node.js MySQL Machine Learning for Security Network Security Vulnerability Assessment Phishing Prevention Incident Response Application Security Security Awareness Problem Solving Data Privacy Analytical Skills Python Power BI Tableau CompTIA Security+ Open-Source Intelligence (OSINT) MITRE ATT&CK Framework Cyber Kill Chain Analysis Spring Boot Wireshark OWASP Top 10 Burp Suite Nmap Nessus Tenable API Gateway CloudFormation Pandas Scikit-Learn NumPy Bash SQL HTML CSS Git VS Code PyCharm Jenkins
Default Avatar
Candidate Name
Cybersecurity Analyst
Victoria, Australia
Based in Victoria
Holds Australian visa
Cybersecurity Vulnerability Assessment Vulnerability Management Incident Response Technical Documentation Analytical Skills SQL HTML Problem Solving Information Security Governance Risk Management Compliance PHP Java Application Security OWASP Top 10 Ethical Hacking Data Visualization Power BI
Default Avatar
Candidate Name
VAPT Consultant
India
Open to relocate
Vulnerability Assessment Penetration Testing Cybersecurity Application Security Bash OWASP Top 10 Ethical Hacking CEH Burp Suite Network Security Security Testing MITRE ATT&CK Framework Metasploit Nmap Nessus Wireshark Python PowerShell ISO 27001 Risk Assessment Problem Solving Team Collaboration
Default Avatar
Candidate Name
Cybersecurity Intern
India
Open to relocate
Ethical Hacking Cybersecurity Penetration Testing Network Security Python HTML SQL Java Flask MySQL CEH Digital Forensics Kali Linux Shell Scripting Mobile Security Application Security Risk Management Vulnerability Assessment Threat Hunting
Default Avatar
Candidate Name
Penetration Tester
Pakistan
Open to relocate
Cybersecurity Penetration Testing Mobile Security API Security Testing Cloud Security Risk Management Risk Assessment Information Security Security Auditing Wireshark Vulnerability Assessment Malware Analysis Identity and Access Management (IAM) Network Security Application Security Cyber Threat Intelligence Open-Source Intelligence (OSINT) ISO 27001 Security Operations Center (SOC) SOC 2 Compliance Cyber Kill Chain Analysis Encryption Python Security Information and Event Management (SIEM) Cryptography Digital Forensics Network Monitoring Nessus Metasploit Burp Suite Postman OWASP Top 10 NIST Cybersecurity Framework GDPR Problem Solving Analytical Skills Team Collaboration Security Risk Management Security Risk Assessment
Default Avatar
Candidate Name
Cyber Risk Analyst
India
Open to relocate
Governance Risk Management Compliance Cybersecurity Security Auditing ISO 27001 Incident Response Malware Analysis Risk Assessment Security Governance Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Network Security Cloud Security Digital Forensics Cryptography Third-Party Risk Management Security Compliance
Default Avatar
Candidate Name
Full-time Bug Bounty Hunter
India
Open to relocate
Cybersecurity Application Security Cloud Security Linux GitHub Metasploit Nmap AWS Information Security Burp Suite Network Security Penetration Testing Python JavaScript Ethical Hacking C++ Bash Kali Linux Problem Solving CEH Automation Team Collaboration AI in Cybersecurity AI Security