Browse job-ready
candidates for your roles

Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Default Avatar
Candidate name
Product Engineer
South Africa
Open to relocate
PostgreSQL Scripting Python Bash AWS CI/CD pipelines Kubernetes Helm Docker Jenkins Angular Material UI Jest MySQL C# Java C++ SQL MongoDB NestJS Node.js Tailwind CSS GraphQL Playwright GitLab GitHub Selenium Figma Express.js Cypress GitHub Actions
Default Avatar
Candidate name
Marketing Data Scientists
Sri Lanka
Open to relocate
Cybersecurity AI in Cybersecurity Power BI Technical Documentation Cyber Threat Intelligence Selenium Machine Learning for Security Hibernate Python R JSON Java JavaScript NumPy Pandas Scikit-Learn TensorFlow PyTorch
Default Avatar
Candidate name
Associate Presales Engineer
Sri Lanka
Open to relocate
Cybersecurity C++ Python Problem Solving Azure Data Loss Prevention (DLP) Security Architecture
Default Avatar
Candidate name
DevOps Engineer
Sri Lanka
Open to relocate
SonarQube Jupyter GitHub Actions Machine Learning for Security React TypeScript Gradle Grafana Elasticsearch SOC 2 Compliance Helm Docker AWS MongoDB Kubernetes Scripting Google Cloud Platform GCP Ansible Java Linux GitHub Jenkins ELK Stack NGINX Azure CloudFormation Git Team Collaboration YAML CI/CD pipelines
Default Avatar
Candidate name
Undergraduate
Sri Lanka
Open to relocate
Firebase Flutter AWS Spring Boot MVC CSS JavaScript HTML MySQL Java Azure Python Team Collaboration SQL Cybersecurity Machine Learning for Security Pandas NumPy TensorFlow Scikit-Learn Flask Git GitHub
Default Avatar
Candidate name
Devops Intern
India
Open to relocate
Cybersecurity Network Security Security Awareness Vulnerability Management Security Infrastructure Threat Detection Compliance MongoDB Linux AWS Docker Kubernetes CI/CD pipelines Automation Security Operations Center (SOC) Identity and Access Management (IAM) Vulnerability Assessment Nmap Wireshark Log Analysis Incident Response Encryption Zeek Git Python Bash Problem Solving Team Collaboration
Default Avatar
Candidate name
Cybersecurity internship
India
Open to relocate
Cybersecurity Vulnerability Assessment Penetration Testing ISO 27001 Nessus HTML CSS Security Auditing Compliance
Default Avatar
Candidate name
Network Manager
Sri Lanka
Open to relocate
Linux Firewalls Active Directory Security Network Security Problem Solving Docker EDR Penetration Testing ISO 27001 Jenkins GitHub Terraform Python Single Sign-On (SSO) Identity and Access Management (IAM) Splunk ELK Stack Elasticsearch Automation Kibana Security Information and Event Management (SIEM) Ansible
Default Avatar
Candidate name
Integration & Transformation Manager
Australia
Based in Victoria
Holds Australian visa
AWS Azure Risk Management Compliance Team Collaboration Risk Assessment Python Secure SDLC ASP.NET Core Splunk Automation Security Incident Management Governance Power BI HTML JavaScript Docker Kubernetes API Gateway Identity and Access Management (IAM) AWS Lambda CI/CD pipelines
Default Avatar
Candidate name
Chief Information Security Officer
Malaysia
Open to relocate
Risk Management Compliance Governance Incident Response Information Security Team Collaboration ISO 27001 Cybersecurity NIST Cybersecurity Framework GDPR
Default Avatar
Candidate name
Customer Ambassador
Ireland
Open to relocate
Git HTML CSS React AWS JavaScript Python PHP SQL Technical Documentation Active Directory Security Team Collaboration Problem Solving
Default Avatar
Candidate name
Project Manager
Indonesia
Open to relocate
Compliance Information Security SQL AI Security Analytical Skills Machine Learning for Security Problem Solving Cybersecurity Google Cloud Platform Figma Jupyter Postman VS Code Azure AWS MATLAB Secure SDLC Risk Management
Default Avatar
Candidate name
IT and Security Analyst
Sri Lanka
Open to relocate
Cybersecurity Ethical Hacking Application Security Penetration Testing Network Security Cryptography Forensics Information Security Cyber Threat Intelligence Cloud Security SQL Linux Team Collaboration VPN Technologies
Default Avatar
Candidate name
Penetration Tester
India
Open to relocate
Cybersecurity Network Security Security Auditing Application Security Ethical Hacking Python MySQL Penetration Testing SQL Vulnerability Assessment Information Security Nessus Nmap Wireshark Burp Suite Splunk Kali Linux Linux Red Team Exercises Log Analysis API Security Testing
Default Avatar
Candidate name
IT Supervisor
Sri Lanka
Open to relocate
Active Directory Security Analytical Skills Python Java SQL HTML Wireshark JavaScript Cybersecurity Team Collaboration PowerShell Machine Learning for Security AI Security
Default Avatar
Candidate name
Cyber security Associate
India
Open to relocate
Cybersecurity Cyber Threat Intelligence MITRE ATT&CK Framework Open-Source Intelligence (OSINT) Threat Hunting Threat Intelligence Incident Response Security Operations Center (SOC) EDR ISO 27001 Threat Detection Security Information and Event Management (SIEM) Log Analysis Problem Solving Ethical Hacking Python MySQL Nmap Splunk Wireshark Linux Bash NIST Cybersecurity Framework OWASP Top 10 Endpoint Security Active Directory Security Vulnerability Assessment Cloud Security CrowdStrike Falcon
Default Avatar
Candidate name
Junior Software Engineer
South Africa
Open to relocate
Secure SDLC MongoDB Bootstrap Machine Learning for Security Jenkins Selenium Automation Postman Azure Scikit-Learn Pandas PyTorch TensorFlow Analytical Skills AWS REST APIs Docker Node.js Linux NGINX Team Collaboration Git Python Ruby Problem Solving C# Java JavaScript SQL PHP MySQL Network Security Bash Ruby on Rails Vue.js Express.js
Default Avatar
Candidate name
Associate Lead – Cyber Governance – Risk & Compliance
Sri Lanka
Open to relocate
Risk Management Java Technical Documentation Kali Linux Team Collaboration Governance Azure Third-Party Risk Management Cybersecurity Information Security Security Operations Center (SOC) Firewalls Vulnerability Assessment
Default Avatar
Candidate name
Senior Software Engineer – Quality Assurance
Australia
Open to relocate
Holds Australian visa
Technical Documentation Team Collaboration GitLab Linux Security Testing API Security Testing Shell Scripting Java Wireshark Analytical Skills MySQL Postman MongoDB Selenium Docker Jenkins Datadog Grafana Prometheus Appium Automation Git Bitbucket Burp Suite IntelliJ IDEA VS Code CI/CD pipelines Governance
Default Avatar
Candidate name
Senior Manager, Real-Time Audit Technology Development
Sri Lanka
Qualification verified
Open to relocate
Power BI Automation Behavior Driven Development Test Driven Development Cloud Platforms (AWS, Azure, GCP) Access Control Stakeholder Engagement Technical Documentation Presentation Skills Analytical Skills Problem Solving Team Collaboration Data Visualization MySQL PostgreSQL JSON XML YAML Azure Push Notifications Analytics Tools
Default Avatar
Candidate name
Information Security Engineer
Qatar
Open to relocate
Cybersecurity Information Security Security Incident Management Security Awareness Log Analysis Malware Analysis Phishing Prevention Splunk Cryptography Ethical Hacking Risk Management Security Risk Management Network Security CEH Linux Incident Response Business Continuity Disaster Recovery Security Operations Center (SOC) C++ Python Java Data Privacy Threat Detection
Default Avatar
Candidate name
Penetration Tester
Vietnam
Open to relocate
Vulnerability Assessment Penetration Testing Security Assessments OWASP Top 10 Network Security Application Security Cybersecurity Information Security
Default Avatar
Candidate name
Network Engineer
India
Open to relocate
Cybersecurity VPN Technologies Network Security Security Information and Event Management (SIEM) JavaScript HTML CSS Scripting PowerShell Wireshark Nmap Burp Suite Vulnerability Assessment Problem Solving Jupyter Information Security MySQL Identity and Access Management (IAM) Risk Assessment Python Team Collaboration Penetration Testing CompTIA Security+ Ethical Hacking
Default Avatar
Candidate name
Penetration Tester
Indonesia
Open to relocate
Cybersecurity Information Security Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Endpoint Security Application Security Forensics Kali Linux Metasploit Burp Suite Wireshark Nmap Python Scripting Mobile Security Wireless Security Security Testing Analytical Skills Problem Solving Team Collaboration
Default Avatar
Candidate name
Director
India
Open to relocate
Security Operations Center (SOC) Cybersecurity Security Infrastructure CISM Information Security Vulnerability Assessment CISSP Network Security ISO 27001 Security Auditing PCI DSS Disaster Recovery Identity and Access Management (IAM) Azure
Default Avatar
Candidate name
Manager – Information Security & Client Success
India
Open to relocate
Python Scripting Automation Bash PowerShell IoT Security Cybersecurity Red Team Exercises Purple Team Exercises Vulnerability Management Security Automation Governance Compliance Cloud Security AWS Azure DevSecOps Active Directory Security Kali Linux Security Auditing PCI DSS Information Security Network Security Penetration Testing ISO 27001 Risk Assessment Vulnerability Assessment SQL C++ CEH OWASP Top 10 Ethical Hacking Application Security Security Assessments Cybersecurity Law CISSP Security Architecture Security Reporting CI/CD pipelines
Default Avatar
Candidate name
Senior Information Security Engineer
Sri Lanka
Open to relocate
Cybersecurity Cyber Threat Intelligence Threat Hunting Forensics Vulnerability Assessment Penetration Testing Endpoint Security Endpoint Detection and Response (EDR) EDR Firewalls Governance Risk Management Compliance Azure Active Directory Security Cloud Security Security Auditing Vulnerability Management Qualys ISO 27001 Information Security Risk Assessment
Default Avatar
Candidate name
Security Platform Engineer
Sri Lanka
Open to relocate
Vulnerability Management Linux Red Team Exercises Machine Learning for Security Cybersecurity Endpoint Security Active Directory Security Azure Java Python Information Security Ethical Hacking Penetration Testing Vulnerability Assessment Network Security CEH AWS ISO 27001 Qualys Firewalls Security Information and Event Management (SIEM) Threat Hunting Nessus SentinelOne
Default Avatar
Candidate name
Cybersecurity Consultant
India
Open to relocate
Cybersecurity Burp Suite Application Security AWS Cloud Security Identity and Access Management (IAM) Terraform Flask Infrastructure as Code (IaC) Security Kali Linux Linux Active Directory Security Open-Source Intelligence (OSINT) Penetration Testing Qualys Incident Response Vulnerability Assessment Information Security Python PostgreSQL Security Information and Event Management (SIEM) Log Analysis Nmap Metasploit Scripting Automation
Default Avatar
Candidate name
Security Architect 2
India
Open to relocate
API Security Testing Security Incident Management Cloud Security Terraform Network Security Security Information and Event Management (SIEM) Splunk Firewalls Linux Bash Python C++ Penetration Testing Ethereum HTML Kali Linux PHP Metasploit CSS SaaS Security Assessment Kubernetes Incident Response Secure SDLC Zero Trust Architecture