Browse job-ready
candidates for your roles
Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
SOC Engineer
South Africa
Cybersecurity Compliance Security Operations Center (SOC) SentinelOne Incident Response Cyber Kill Chain Analysis Security Information and Event Management (SIEM) Endpoint Detection and Response (EDR) EDR Data Privacy Splunk Java Power BI SQL Firewalls Active Directory Security Forensics MITRE ATT&CK Framework Threat Detection Vulnerability Assessment AWS Team Collaboration Information Security Network Security Threat Hunting Cyber Threat Intelligence Risk Management CompTIA Security+ CEH Ethical Hacking Patch Management Business Continuity Disaster Recovery Kali Linux Nmap Wireshark Linux
Software Engineer
Nepal
Linux Bash Scripting Postman Jest Cypress Playwright MongoDB PostgreSQL REST APIs API Development Git Redis Docker React Node.js JavaScript C++ Bootstrap HTML Figma
Principal SOC Analyst
Malaysia
Threat Hunting Security Information and Event Management (SIEM) Log Analysis Splunk EDR Endpoint Detection and Response (EDR) Malware Analysis Forensics VS Code Threat Detection Incident Response Phishing Prevention Kibana AWS MITRE ATT&CK Framework Security Operations Center (SOC) Blue Team Operations Cybersecurity
Associate Operations Analyst
Sri Lanka
Machine Learning for Security Java SQL Postman API Development Power BI R Data Visualization Problem Solving MongoDB Python React Node.js Express.js GitHub Git Analytical Skills Team Collaboration MySQL Secure SDLC
Senior Software Engineer
Sri Lanka
Java Spring Boot Network Security PHP Python JavaScript CSS jQuery Bootstrap Node.js Maven Docker Hibernate Team Collaboration Selenium GitHub Spring Security CI/CD pipelines AWS GitLab Problem Solving React
Full stack Developer
South Africa
Maven Jenkins Git Automation HTML Azure JavaScript Active Directory Security ASP.NET Core Linux Java ASP.NET MVC SQL Python C# GitLab Problem Solving
Security Engineer
Vietnam
Cybersecurity Penetration Testing Java Spring Boot Team Collaboration Python C++ JavaScript HTML CSS Secure SDLC OWASP Top 10 Threat Modeling Security Testing
Cybersecurity Consultant and Fractional CISO
Sri Lanka
Cybersecurity Governance Risk Management Compliance Data Privacy Penetration Testing ISO 27001 GDPR Vulnerability Assessment PCI DSS Network Security HIPAA Regulatory Compliance (GDPR, PCI-DSS, HIPAA) Risk Assessment Business Continuity Security Auditing
Devops
Sri Lanka
Linux CI/CD pipelines Docker GitLab AWS Kubernetes Azure GitHub Ansible Bash Terraform Grafana SQL Shell Scripting Jenkins Python Bitbucket Scripting C++ Automation Problem Solving Team Collaboration
DevOps Engineer
South Africa
Cybersecurity Identity and Access Management (IAM) TLS/SSL Management MySQL Jenkins GitHub Actions CI/CD pipelines Azure Linux Docker Kubernetes Terraform GitHub AWS GCP Google Cloud Platform Ansible Datadog Prometheus ELK Stack Python Bash GitLab Ruby PowerShell CloudFormation
Cybersecurity Consultant
South Africa
Cybersecurity Network Security Incident Response Threat Intelligence Risk Management Compliance Governance Identity and Access Management (IAM) NIST Cybersecurity Framework ISO 27001 CompTIA Security+ Risk Assessment Secure SDLC Privileged Access Management (PAM) Analytical Skills Swift
Cybersecurity Consultant
South Africa
Cybersecurity Azure Network Security Information Security Cloud Security Wireless Security Linux Azure Security
SOC Analyst L1, Cyber Security Analyst
India
SQL Linux Network Security Log Analysis Incident Response Threat Detection Security Information and Event Management (SIEM) Security Operations Center (SOC) Burp Suite PHP Ethical Hacking CEH Cybersecurity Problem Solving Analytical Skills Team Collaboration Penetration Testing Wireshark Security Monitoring Nmap Nessus Metasploit Firewalls Kali Linux Shell Scripting MITRE ATT&CK Framework Identity and Access Management (IAM) Blue Team Operations
DevOps Engineer
Sri Lanka
Python GitHub Linux Splunk Grafana Docker CI/CD pipelines Terraform SQL Team Collaboration Git ELK Stack Azure Shell Scripting Automation Vue.js JavaScript ASP.NET Core MongoDB Node.js API Development React Jenkins GCP Google Cloud Platform Identity and Access Management (IAM) GitHub Actions Kibana Bash Next.js HTML CSS C# Flask SQLite
Temporary Instructor
Sri Lanka
Express.js Spring Boot Java JSON Flask Go Power BI Docker Kubernetes Node.js Flutter Firebase SQLite Team Collaboration JavaScript CSS HTML Python C++ C# Analytical Skills Problem Solving Secure SDLC FastAPI API Development PostgreSQL Linux Postman AWS Google Cloud Platform PyTorch
Intern Software Engineer
Sri Lanka
AI Security AI in Cybersecurity Machine Learning for Security React Python Analytical Skills SEO Team Collaboration Problem Solving
IAM Security Engineer
South Africa
Identity and Access Management (IAM) Linux Team Collaboration Problem Solving Endpoint Security Single Sign-On (SSO) Compliance
AI Engineer
Indonesia
AI Security Machine Learning for Security Automation AI in Cybersecurity Python FastAPI Docker Redis Tailwind CSS React Next.js Node.js TypeScript HTML JavaScript Express.js
Software Asset Manager
Sri Lanka
Shell Scripting Problem Solving SQL Business Continuity Disaster Recovery Active Directory Security Analytical Skills Linux XML Azure AWS Security Infrastructure Vulnerability Management Automation Terraform Ansible Python Governance Patch Management Jenkins GitLab CI/CD pipelines
Senior Manager IT Infrastructure
Sri Lanka
Cybersecurity Information Security Network Security Incident Response Compliance Firewalls Intrusion Detection Cryptography Identity and Access Management (IAM) Network Monitoring ISO 27001 Wireshark Threat Detection Encryption Access Control Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Security Infrastructure Security Standards Security Technology Evaluation Firewall Configuration Business Continuity Planning (BCP) AWS Security Azure Security Hashing Algorithms TLS/SSL Management VPN Technologies Key Management Systems (KMS) Data Encryption at Rest & Transit Log Correlation Technical Documentation Problem Solving Leadership in Security Operations Public Key Infrastructure (PKI) PCAP Analysis Terraform Ansible AWS Azure CI/CD pipelines Config Management