Browse job-ready
candidates for your roles

Start browsing candidate profiles. You can filter by skills, location, and more — and view full profiles once your company is verified.
Default Avatar
Candidate name
SOC Analyst
Pakistan
Security Operations Center (SOC) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Emerging Threat Research Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Endpoint Detection and Response (EDR) EDR Incident Response Security Incident Management Security Incident Analysis Security Incident Triage Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Nmap Metasploit IoT Development Linux Cybersecurity Information Security Network Security Penetration Testing Cloud Security Cloud Platforms (AWS, Azure, GCP) Analytical Skills Analytics Tools Security Awareness Training Security Awareness Security Training & Awareness
Default Avatar
Candidate name
Sr Staff Product Security Architect
India
Secure SDLC Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Analytical Skills Analytics Tools Network Security Penetration Testing Information Security Cloud Security Cloud Platforms (AWS, Azure, GCP) Container Security (Docker, Kubernetes) Docker Security Security Infrastructure Infrastructure as Code (IaC) Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Kubernetes Kubernetes Security Security Testing Python AWS Security
Default Avatar
Candidate name
Cybersecurity Analyst
India
Cybersecurity Information Security Network Security Penetration Testing Problem Solving Team Collaboration Analytical Skills Analytics Tools Incident Response Security Incident Management Security Incident Triage Security Incident Analysis Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment React Reactive Programming React Native Cloud Security Cloud Platforms (AWS, Azure, GCP) Threat Hunting Cyber Threat Intelligence Threat Detection Threat Intelligence Threat Modeling Security Awareness Training Security Training & Awareness Security Awareness Endpoint Detection and Response (EDR) Endpoint Security Web Security Practices
Default Avatar
Candidate name
Security Researcher
Indonesia
Cybersecurity Network Security Information Security Cloud Security Web Security Practices Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Problem Solving Team Collaboration Security Awareness Training Security Awareness Security Training & Awareness Risk Management Security Risk Assessment Security Risk Management Risk Assessment Vulnerability Management Vulnerability Assessment Ethical Hacking Penetration Testing Security Operations Center (SOC) Metasploit Nmap SQL for Analysts MySQL PostgreSQL SQL JavaScript PHP Cryptography Analytical Skills Analytics Tools ISO 27001 Security Frameworks (NIST, ISO 27001)
Default Avatar
Candidate name
Cybersecurity Consultant
India
Cybersecurity Information Security Network Security Penetration Testing Cloud Security Cloud Platforms (AWS, Azure, GCP) Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Endpoint Security Endpoint Detection and Response (EDR) Analytics Tools Analytical Skills Risk Management Security Risk Management Security Risk Assessment Risk Assessment Threat Intelligence Emerging Threat Research Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling Python Security Awareness Training Security Training & Awareness Security Awareness Security Compliance Audits Security Operations Center (SOC) ISO 27001 Security Frameworks (NIST, ISO 27001) Governance Security Governance Programs Security Compliance Compliance
Default Avatar
Candidate name
IT Consultant
India
Cybersecurity Information Security Network Security Penetration Testing Vulnerability Assessment Vulnerability Management Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Problem Solving Team Collaboration Analytical Skills Analytics Tools Security Awareness Training Security Awareness Security Training & Awareness Business Continuity Business Continuity Planning (BCP) Cloud Security Cloud Forensics Cloud Platforms (AWS, Azure, GCP) Python Jupyter React React Native Reactive Programming Security Infrastructure Infrastructure as Code Infrastructure as Code (IaC) Security Threat Modeling Emerging Threat Research Insider Threat Detection Threat Detection Cyber Threat Intelligence
Default Avatar
Candidate name
Information Security consultant
Iran
Cybersecurity Network Security Information Security Penetration Testing Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Endpoint Security Endpoint Detection and Response (EDR) Analytical Skills Analytics Tools Cloud Security Google Cloud Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Google Cloud Platform Cloud Platforms (AWS, Azure, GCP) ISO 27001 Security Frameworks (NIST, ISO 27001) API Security Testing Security Testing Security Auditing Forensics Digital Forensics
Default Avatar
Candidate name
Information Security Consultant
Indonesia
Cybersecurity Information Security Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Incident Response Threat Intelligence Risk Management Endpoint Security Cryptography Cloud Security Threat Hunting Security Awareness Training Endpoint Detection and Response (EDR) Threat Modeling Mobile Security Security Risk Assessment Security Incident Management Threat Detection Vulnerability Management Security Risk Management Security Awareness Risk Assessment Cyber Threat Intelligence Security Training & Awareness Security Incident Analysis Google Cloud Security CI/CD Security Analytical Skills Problem Solving Team Collaboration Security Incident Triage API Security Testing Azure Google Cloud Platform Analytics Tools
Default Avatar
Candidate name
Software Developer
Australia
SQL for Analysts SQL MySQL PostgreSQL JavaScript Java Python Data Visualization Jupyter Jupyter Notebooks Power BI PowerShell Tableau Team Collaboration Problem Solving Analytical Skills Analytics Tools Scikit-Learn Realtime Databases Graph Databases PHP HTML CSS React React Native Angular Vue.js Next.js REST APIs Web Performance Optimization Node.js Django Flask Spring Boot ASP.NET Core GraphQL Microservices Architecture
View profile
Holds Aus Visa
Default Avatar
Candidate name
Program Manager
Australia
Incident Response Security Incident Management Security Incident Analysis Security Incident Triage Analytical Skills Analytics Tools Problem Solving Team Collaboration Business Continuity Business Continuity Planning (BCP) Governance Risk Management Risk Assessment
View profile
Holds Aus Visa
Default Avatar
Candidate name
Consultant
India
Security Operations Center (SOC) SIEM Tools (Splunk, QRadar, ELK) Splunk Security Information and Event Management (SIEM) Endpoint Security Cybersecurity Information Security Network Security Penetration Testing Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness Identity and Access Management (IAM) Analytical Skills Analytics Tools Endpoint Detection and Response (EDR) EDR Compliance Security Compliance Audits ISO 27001 Security Frameworks (NIST, ISO 27001) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Log Analysis Automation Bash for Automation Security Automation Nessus Wireshark Governance Security Governance Programs Malware Analysis
Default Avatar
Candidate name
offensive Security Consultant
India
Cybersecurity Information Security Network Security Cloud Security Penetration Testing Cloud Platforms (AWS, Azure, GCP) Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Incident Response Security Incident Triage Security Incident Analysis Security Incident Management Threat Intelligence Threat Modeling Threat Detection Threat Hunting Cyber Threat Intelligence Security Awareness Training Security Training & Awareness Security Awareness Analytical Skills Analytics Tools Endpoint Security SQL for Analysts SQL MySQL PostgreSQL Forensics Digital Forensics CSS HTML React React Native CEH Ethical Hacking CompTIA Security+ API Security Testing Python PowerShell Shell Scripting
Default Avatar
Candidate name
Senior Executive ( consultant)
India
Cybersecurity Information Security Network Security Penetration Testing Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Cloud SIEM Integration Threat Intelligence Threat Detection Cyber Threat Intelligence Threat Modeling Threat Hunting Problem Solving Team Collaboration SIEM Tools (Splunk, QRadar, ELK) Security Awareness Training Security Awareness Security Training & Awareness Security Operations Center (SOC) Analytical Skills Analytics Tools CompTIA Security+ ISO 27001 Security Frameworks (NIST, ISO 27001)
Default Avatar
Candidate name
Senior security engineer
Philippines
Cybersecurity Network Security Information Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness SQL for Analysts PostgreSQL MySQL SQL Cloud Security Cloud SIEM Integration Cloud Threat Intelligence Threat Detection Cyber Threat Intelligence Threat Modeling Threat Hunting Threat Intelligence PowerShell Identity and Access Management (IAM)
Default Avatar
Candidate name
Consultant in Cybersecurity
India
Cybersecurity Information Security Network Security Penetration Testing Problem Solving Team Collaboration Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Endpoint Security Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Analytical Skills Python Security Awareness Training Security Training & Awareness Security Awareness Cloud Security Google Cloud Security Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Hunting Threat Modeling ISO 27001 Power BI Data Visualization Analytics Tools Compliance Security Compliance Audits
Default Avatar
Candidate name
Security consultant
India
Cybersecurity Network Security Penetration Testing Information Security Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Security Awareness Training Security Training & Awareness Security Awareness Endpoint Security Google Cloud Security Cloud Platforms (AWS, Azure, GCP) Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Python Java C++ Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Data Visualization Analytical Skills Analytics Tools
Default Avatar
Candidate name
Soc analyst
Pakistan
Security Operations Center (SOC) Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Analytical Skills Analytics Tools Cybersecurity Network Security Penetration Testing Information Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Risk Assessment Security Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Security Awareness Training Security Awareness Security Training & Awareness Cloud Security Google Cloud Security Cloud Platforms (AWS, Azure, GCP) Endpoint Security Threat Intelligence Cyber Threat Intelligence Threat Detection Threat Modeling Threat Hunting Ethical Hacking Kali Linux
Default Avatar
Candidate name
Cyber Security
India
Cybersecurity Network Security Penetration Testing Vulnerability Assessment Information Security Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Problem Solving Team Collaboration Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Ethical Hacking Threat Intelligence Emerging Threat Research Cyber Threat Intelligence Threat Detection Security Awareness Training Security Awareness Security Training & Awareness OWASP Top 10 ISO 27001 Metasploit Nmap Wireshark Kali Linux SQL for Analysts SQL MySQL PostgreSQL Digital Forensics Automation Security Automation Cryptography
Default Avatar
Candidate name
Technical Consultant
India
React Vue.js Ruby on Rails JavaScript Node.js CSS Python Ruby PHP Terraform Cloud Platforms (AWS, Azure, GCP) AWS Secure SDLC Cybersecurity Network Security Information Security Cloud Security Vulnerability Assessment Vulnerability Management Risk Management Security Risk Management Security Risk Assessment Risk Assessment Incident Response Security Incident Analysis Security Incident Management Security Incident Triage Problem Solving Team Collaboration Endpoint Security Security Awareness Training Security Awareness Security Training & Awareness Infrastructure as Code Security Infrastructure
Default Avatar
Candidate name
Cybersecurity Intern
India
Cybersecurity Network Security Information Security Cloud Security Penetration Testing Digital Forensics Vulnerability Assessment Vulnerability Management Risk Management Security Risk Assessment Security Risk Management Risk Assessment Endpoint Security Incident Response Security Incident Analysis Security Incident Triage Security Incident Management Threat Intelligence Cyber Threat Intelligence Cloud Threat Intelligence Threat Detection Threat Hunting Security Awareness Training Security Awareness Security Training & Awareness Power BI Analytical Skills Analytics Tools Security Information and Event Management (SIEM) SIEM Tools (Splunk, QRadar, ELK) Data Visualization Security Auditing SQL for Analysts SQL MySQL PostgreSQL Tableau Nessus Nmap Python