Chief Compliance Officer (CCO)
Executive
Executive The Chief Compliance Officer (CCO) is responsible for ensuring that the organization adheres to all relevant laws, regulations, and industry standards. The CCO plays a critical role in managing compliance risks, fostering a culture of compliance, and maintaining the trust of customers, regulators, and other stakeholders. Develops, implements, and maintains comprehensive compliance programs that align with organizational goals, risk appetite, and regulatory requirements. Oversees creation and implementation of compliance policies, procedures, and guidelines to establish strong compliance culture across the organization.
The Chief Compliance Officer (CCO) is responsible for ensuring that the organization adheres to all relevant laws, regulations, and industry standards. The CCO plays a critical role in managing compliance risks, fostering a culture of compliance, and maintaining the trust of customers, regulators, and other stakeholders. Develops, implements, and maintains comprehensive compliance programs that align with organizational goals, risk appetite, and regulatory requirements. Oversees creation and implementation of compliance policies, procedures, and guidelines to establish strong compliance culture across the organization.
Requirements
- › Bachelor's or master's degree in law, finance, business administration, or related field
- › Certifications such as CRCM, CAMS, or CCEP are highly desirable
- › Extensive experience in compliance, risk management, or regulatory affairs
Chief Information Security Officer (CISO)
Executive
Executive The Chief Information Security Officer (CISO) is responsible for establishing, implementing, and maintaining the organization's information security program to ensure the confidentiality, integrity, and availability of information assets. The CISO plays a crucial role in protecting the organization from cyber threats and ensuring compliance with relevant regulations and industry standards. Develops comprehensive information security strategies that align with organizational goals and regulatory requirements.
The Chief Information Security Officer (CISO) is responsible for establishing, implementing, and maintaining the organization's information security program to ensure the confidentiality, integrity, and availability of information assets. The CISO plays a crucial role in protecting the organization from cyber threats and ensuring compliance with relevant regulations and industry standards. Develops comprehensive information security strategies that align with organizational goals and regulatory requirements.
Requirements
- › Bachelor's or master's degree in information security, computer science, or related field
- › Certifications such as CISSP, CISM, or CISA are highly desirable
- › Extensive experience in information security with proven track record
Cybersecurity Sales Engineer (ChatGPT Assistant Specialist)
Sales
Senior We are seeking a dynamic and skilled Cybersecurity Sales Engineer with a focus on leveraging ChatGPT assistants to enhance our sales and customer interaction processes. The ideal candidate will have a strong background in cybersecurity, sales, and a keen interest in AI and chatbot technologies. This role combines technical cybersecurity expertise with sales acumen and AI tool proficiency to streamline customer interactions and automate sales processes.
We are seeking a dynamic and skilled Cybersecurity Sales Engineer with a focus on leveraging ChatGPT assistants to enhance our sales and customer interaction processes. The ideal candidate will have a strong background in cybersecurity, sales, and a keen interest in AI and chatbot technologies. This role combines technical cybersecurity expertise with sales acumen and AI tool proficiency to streamline customer interactions and automate sales processes.
Requirements
- › Bachelor's degree in Computer Science, Cybersecurity, AI, or related field
- › Experience in cybersecurity and sales with understanding of cybersecurity products
- › Familiarity with AI, machine learning, and chatbot technologies
Cybersecurity Marketing Specialist (ChatGPT Assistant Specialist)
Marketing
Senior Develop and implement marketing strategies for cybersecurity products and services, leveraging ChatGPT as a key tool for customer engagement and content creation. Create compelling marketing content, including blogs, social media posts, and whitepapers, using ChatGPT to enhance creativity and efficiency. Use ChatGPT to analyze market trends and customer feedback, ensuring marketing campaigns are data-driven and targeted.
Develop and implement marketing strategies for cybersecurity products and services, leveraging ChatGPT as a key tool for customer engagement and content creation. Create compelling marketing content, including blogs, social media posts, and whitepapers, using ChatGPT to enhance creativity and efficiency. Use ChatGPT to analyze market trends and customer feedback, ensuring marketing campaigns are data-driven and targeted.
Requirements
- › Bachelor's degree in Marketing, Communications, or related field
- › Proven experience in marketing, preferably in tech or cybersecurity industry
- › Strong understanding of ChatGPT and its applications in marketing
Remote Work Security Manager
Security Operations
Senior Manage security for remote workforce and infrastructure. Responsible for developing and enforcing policies that protect distributed teams, endpoints, and cloud resources.
Manage security for remote workforce and infrastructure. Responsible for developing and enforcing policies that protect distributed teams, endpoints, and cloud resources.
Requirements
- › 6+ years of security experience
- › Remote work security expertise
- › Team management
Director of Security Operations
Security Operations
Executive Lead and oversee security operations, including incident response, threat detection, and security monitoring. Responsible for building and scaling the SOC function and driving continuous improvement across detection and response capabilities.
Lead and oversee security operations, including incident response, threat detection, and security monitoring. Responsible for building and scaling the SOC function and driving continuous improvement across detection and response capabilities.
Requirements
- › 10+ years of security operations experience
- › Experience leading SOC teams
- › CISSP or equivalent certification
Director of Security Architecture
Security Architecture
Executive Design and implement enterprise security architecture, ensuring alignment with business objectives. Define security standards, patterns, and reference architectures across on-premise and cloud environments.
Design and implement enterprise security architecture, ensuring alignment with business objectives. Define security standards, patterns, and reference architectures across on-premise and cloud environments.
Requirements
- › 10+ years of security architecture experience
- › Strong technical background
- › Experience with cloud security
Director of Security Governance, Risk, and Compliance (GRC)
GRC
Executive Lead and oversee GRC programs, ensuring alignment with business objectives and regulatory requirements. Drive risk management frameworks, audit readiness, and compliance across enterprise operations.
Lead and oversee GRC programs, ensuring alignment with business objectives and regulatory requirements. Drive risk management frameworks, audit readiness, and compliance across enterprise operations.
Requirements
- › 10+ years of GRC experience
- › Strong understanding of compliance frameworks
- › Leadership experience
Director of Security Awareness and Training
Training
Executive Develop and implement comprehensive security awareness and training programs across the organization. Measure program effectiveness and build a security-conscious culture from the ground up.
Develop and implement comprehensive security awareness and training programs across the organization. Measure program effectiveness and build a security-conscious culture from the ground up.
Requirements
- › 8+ years of training experience
- › Strong presentation skills
- › Program development experience
Physical Security Manager
Physical Security
Senior Manage physical security operations and programs. Oversee access control, surveillance systems, guard forces, and facility security to protect personnel and assets.
Manage physical security operations and programs. Oversee access control, surveillance systems, guard forces, and facility security to protect personnel and assets.
Requirements
- › 8+ years of physical security experience
- › Operations management
- › Security program development
Red Team Lead
Security Operations
Senior Lead offensive security testing and assessments. Plan and execute red team engagements, adversary simulations, and penetration tests to identify organizational vulnerabilities.
Lead offensive security testing and assessments. Plan and execute red team engagements, adversary simulations, and penetration tests to identify organizational vulnerabilities.
Requirements
- › 8+ years of red team experience
- › Offensive security expertise
- › Team leadership
Blue Team Lead
Security Operations
Senior Lead defensive security operations and monitoring. Oversee threat detection, SIEM tuning, and incident response workflows to strengthen the organization's defensive posture.
Lead defensive security operations and monitoring. Oversee threat detection, SIEM tuning, and incident response workflows to strengthen the organization's defensive posture.
Requirements
- › 8+ years of blue team experience
- › Defensive security expertise
- › Team leadership
Purple Team Lead
Security Operations
Senior Coordinate red and blue team activities and improvements. Facilitate collaborative exercises to close detection gaps and accelerate the feedback loop between offensive and defensive functions.
Coordinate red and blue team activities and improvements. Facilitate collaborative exercises to close detection gaps and accelerate the feedback loop between offensive and defensive functions.
Requirements
- › 8+ years of security experience
- › Red/Blue team expertise
- › Team leadership
Cybersecurity Marketing Specialist
Marketing
Mid-Level Drive cybersecurity marketing initiatives with AI-powered solutions and create compelling content that resonates with security professionals. Leverage ChatGPT assistants to scale content production and analyze campaign performance.
Drive cybersecurity marketing initiatives with AI-powered solutions and create compelling content that resonates with security professionals. Leverage ChatGPT assistants to scale content production and analyze campaign performance.
Requirements
- › 3+ years of marketing experience in cybersecurity
- › Experience with AI and ChatGPT
- › Strong understanding of cybersecurity concepts
Help organizations navigate complex compliance requirements and implement governance frameworks. Conduct gap assessments, develop policies, and advise on ISO 27001, NIST, SOC 2, and other standards.
Help organizations navigate complex compliance requirements and implement governance frameworks. Conduct gap assessments, develop policies, and advise on ISO 27001, NIST, SOC 2, and other standards.
Requirements
- › 5+ years in GRC
- › Deep knowledge of frameworks (ISO, NIST, SOC 2, etc.)
- › Audit experience
Security Analyst
Security Operations
Mid-Level Monitor and analyze security events, implement security controls, and respond to incidents. Triage alerts, investigate anomalies, and contribute to threat detection rule development.
Monitor and analyze security events, implement security controls, and respond to incidents. Triage alerts, investigate anomalies, and contribute to threat detection rule development.
Requirements
- › 3+ years of security experience
- › SIEM expertise
- › Incident response skills
Incident Responder
Security Operations
Mid-Level Lead incident response efforts and conduct post-incident analysis. Contain, eradicate, and recover from security breaches while producing high-quality incident reports and lessons learned.
Lead incident response efforts and conduct post-incident analysis. Contain, eradicate, and recover from security breaches while producing high-quality incident reports and lessons learned.
Requirements
- › 5+ years of incident response experience
- › Forensics knowledge
- › Strong analytical skills
Director of Third-Party Risk Management
GRC
Executive Oversee vendor risk assessment programs and third-party security management. Build scalable TPRM processes to evaluate, monitor, and remediate risk across the supply chain.
Oversee vendor risk assessment programs and third-party security management. Build scalable TPRM processes to evaluate, monitor, and remediate risk across the supply chain.
Requirements
- › 8+ years of risk management experience
- › Vendor management expertise
- › Strong analytical skills
Threat Intelligence Analyst
Security Operations
Mid-Level Monitor, analyze, and respond to emerging security threats and vulnerabilities. Produce finished intelligence products and integrate threat feeds into detection and response workflows.
Monitor, analyze, and respond to emerging security threats and vulnerabilities. Produce finished intelligence products and integrate threat feeds into detection and response workflows.
Requirements
- › 3+ years in threat intelligence
- › Experience with MISP or TIP platforms
- › Knowledge of OSINT techniques
Senior Threat Intelligence Analyst
Security Operations
Mid-Level Analyze and report on cyber threats and provide actionable intelligence to executive and technical stakeholders. Develop intelligence collection plans and mentor junior analysts.
Analyze and report on cyber threats and provide actionable intelligence to executive and technical stakeholders. Develop intelligence collection plans and mentor junior analysts.
Requirements
- › 4+ years of threat intelligence experience
- › Strong analytical skills
- › Technical writing ability
Security Engineer
Engineering
Mid-Level Design and implement security solutions and infrastructure. Build and maintain security tooling, integrations, and controls across cloud and on-premise environments.
Design and implement security solutions and infrastructure. Build and maintain security tooling, integrations, and controls across cloud and on-premise environments.
Requirements
- › 5+ years of security engineering experience
- › Strong technical background
- › Cloud security expertise
Application Security Specialist
Engineering
Mid-Level Secure application development through code reviews, security testing, and developer enablement. Integrate security into the SDLC and reduce vulnerability exposure across the application portfolio.
Secure application development through code reviews, security testing, and developer enablement. Integrate security into the SDLC and reduce vulnerability exposure across the application portfolio.
Requirements
- › 5+ years of AppSec experience
- › Development background
- › Security testing expertise
Ensure compliance with regulations and standards and conduct assessments across business units. Track control effectiveness, manage evidence collection, and support external audits.
Ensure compliance with regulations and standards and conduct assessments across business units. Track control effectiveness, manage evidence collection, and support external audits.
Requirements
- › 3+ years of compliance experience
- › Knowledge of compliance frameworks
- › Strong analytical skills
Conduct risk assessments and develop mitigation strategies. Quantify and communicate risk to business stakeholders and maintain the enterprise risk register.
Conduct risk assessments and develop mitigation strategies. Quantify and communicate risk to business stakeholders and maintain the enterprise risk register.
Requirements
- › 4+ years of risk assessment experience
- › Strong analytical skills
- › Risk framework knowledge
Director of Privacy
Privacy
Executive Lead privacy initiatives and ensure compliance with privacy regulations across all operations. Develop and maintain a privacy program covering GDPR, CCPA, and other applicable laws.
Lead privacy initiatives and ensure compliance with privacy regulations across all operations. Develop and maintain a privacy program covering GDPR, CCPA, and other applicable laws.
Requirements
- › 10+ years of privacy experience
- › Deep knowledge of privacy laws (GDPR, CCPA)
- › Program management skills
Cybersecurity Sales Engineer
Sales
Mid-Level Leverage AI tools to enhance technical sales processes and provide solutions to complex security challenges. Support the sales cycle with technical demonstrations, RFP responses, and proof-of-concept engagements.
Leverage AI tools to enhance technical sales processes and provide solutions to complex security challenges. Support the sales cycle with technical demonstrations, RFP responses, and proof-of-concept engagements.
Requirements
- › 5+ years of sales engineering experience
- › Strong technical background in cybersecurity
- › Experience with AI platforms
Plan and conduct security audits, report findings and recommendations. Evaluate control effectiveness against frameworks such as ISO 27001, SOC 2, and NIST CSF.
Plan and conduct security audits, report findings and recommendations. Evaluate control effectiveness against frameworks such as ISO 27001, SOC 2, and NIST CSF.
Requirements
- › 4+ years of audit experience
- › Strong attention to detail
- › Audit methodology knowledge
Support privacy program implementation and compliance. Conduct privacy impact assessments, manage data subject requests, and maintain records of processing activities.
Support privacy program implementation and compliance. Conduct privacy impact assessments, manage data subject requests, and maintain records of processing activities.
Requirements
- › 3+ years of privacy experience
- › Knowledge of privacy laws (GDPR, CCPA)
- › Analytical skills
Design and implement privacy-enhancing technologies. Embed privacy by design principles into systems and data pipelines to reduce collection, enable consent, and support data minimization.
Design and implement privacy-enhancing technologies. Embed privacy by design principles into systems and data pipelines to reduce collection, enable consent, and support data minimization.
Requirements
- › 5+ years of privacy engineering experience
- › Technical background
- › Privacy by design expertise
Security Trainer
Training
Mid-Level Develop and deliver security training programs for technical and non-technical audiences. Create engaging curriculum covering phishing awareness, secure development, and security fundamentals.
Develop and deliver security training programs for technical and non-technical audiences. Create engaging curriculum covering phishing awareness, secure development, and security fundamentals.
Requirements
- › 4+ years of training experience
- › Strong presentation skills
- › Curriculum development experience
Assess and monitor third-party security risks. Conduct vendor questionnaires, on-site assessments, and continuous monitoring to ensure supply chain security.
Assess and monitor third-party security risks. Conduct vendor questionnaires, on-site assessments, and continuous monitoring to ensure supply chain security.
Requirements
- › 4+ years of vendor assessment experience
- › Risk analysis skills
- › Vendor management experience
Forensics Specialist
Security Operations
Mid-Level Conduct digital forensics investigations and analysis in support of incident response and legal proceedings. Preserve chain of custody, image systems, and produce forensic reports.
Conduct digital forensics investigations and analysis in support of incident response and legal proceedings. Preserve chain of custody, image systems, and produce forensic reports.
Requirements
- › 5+ years of forensics experience
- › Investigation skills
- › Forensic tool expertise (EnCase, FTK, Autopsy)
Security Awareness and Training Specialist
Training
Mid-Level Create and deliver security awareness programs including phishing simulations, e-learning modules, and live training sessions tailored to different employee populations.
Create and deliver security awareness programs including phishing simulations, e-learning modules, and live training sessions tailored to different employee populations.
Requirements
- › 3+ years of training experience
- › Content development skills
- › Program management experience
AI Security Specialist
Engineering
Mid-Level Secure AI/ML systems and implement AI-driven security solutions. Assess risks in machine learning pipelines, protect model integrity, and evaluate adversarial attack surfaces.
Secure AI/ML systems and implement AI-driven security solutions. Assess risks in machine learning pipelines, protect model integrity, and evaluate adversarial attack surfaces.
Requirements
- › 5+ years of AI/security experience
- › ML/AI background
- › Security expertise
Security Architect
Security Architecture
Senior Design secure systems and infrastructure and develop security patterns for cloud and hybrid environments. Provide architectural guidance to engineering teams and review designs for security risk.
Design secure systems and infrastructure and develop security patterns for cloud and hybrid environments. Provide architectural guidance to engineering teams and review designs for security risk.
Requirements
- › 8+ years of architecture experience
- › Strong technical background
- › Cloud architecture expertise
Insider Threat Analyst
Security Operations
Mid-Level Monitor and investigate potential insider threats using behavioral analytics, DLP, and UEBA tooling. Collaborate with HR and Legal to manage sensitive investigations.
Monitor and investigate potential insider threats using behavioral analytics, DLP, and UEBA tooling. Collaborate with HR and Legal to manage sensitive investigations.
Requirements
- › 4+ years of security experience
- › Investigation skills
- › Behavioral analysis experience
Security Automation Engineer
Security Operations
Mid-Level Develop and implement security automation solutions including SOAR playbooks, custom integrations, and scripted remediation workflows to reduce analyst toil.
Develop and implement security automation solutions including SOAR playbooks, custom integrations, and scripted remediation workflows to reduce analyst toil.
Requirements
- › 5+ years of automation experience
- › Programming skills (Python, Go)
- › Security tools expertise
Cryptocurrency Security Specialist
Web3
Mid-Level Secure blockchain and cryptocurrency operations including wallet infrastructure, smart contract auditing, and exchange security. Advise on Web3-specific threat models.
Secure blockchain and cryptocurrency operations including wallet infrastructure, smart contract auditing, and exchange security. Advise on Web3-specific threat models.
Requirements
- › 4+ years of crypto security experience
- › Blockchain knowledge
- › Security expertise
Physical Security Specialist
Physical Security
Mid-Level Implement and maintain physical security controls including access control systems, CCTV, and guard operations. Conduct physical risk assessments and develop remediation plans.
Implement and maintain physical security controls including access control systems, CCTV, and guard operations. Conduct physical risk assessments and develop remediation plans.
Requirements
- › 4+ years of physical security experience
- › Security systems knowledge
- › Operations experience
Vulnerability Management Specialist
Security Operations
Mid-Level Manage vulnerability assessment and remediation programs across enterprise infrastructure. Prioritize findings using CVSS and threat intelligence and drive remediation SLAs with asset owners.
Manage vulnerability assessment and remediation programs across enterprise infrastructure. Prioritize findings using CVSS and threat intelligence and drive remediation SLAs with asset owners.
Requirements
- › 4+ years of vulnerability management experience
- › Scanner expertise (Tenable, Qualys, Rapid7)
- › Remediation planning
Data Protection Officer (DPO)
Privacy
Senior Oversee data protection strategy and ensure compliance with privacy laws including GDPR. Serve as the primary contact for supervisory authorities and advise on all data protection matters.
Oversee data protection strategy and ensure compliance with privacy laws including GDPR. Serve as the primary contact for supervisory authorities and advise on all data protection matters.
Requirements
- › 8+ years of privacy experience
- › Deep privacy law knowledge (GDPR)
- › Leadership skills
Security Awareness Training Manager
Training
Senior Develop and manage comprehensive security awareness programs for organizations. Drive metrics-based improvement in security culture through phishing simulations, training campaigns, and executive reporting.
Develop and manage comprehensive security awareness programs for organizations. Drive metrics-based improvement in security culture through phishing simulations, training campaigns, and executive reporting.
Requirements
- › 5+ years experience in security awareness training
- › Strong presentation and communication skills
- › Experience with learning management systems
Senior Security Engineer
Engineering
Senior Lead the development and implementation of security solutions across infrastructure. Define security standards, mentor engineers, and drive security architecture decisions across cloud environments.
Lead the development and implementation of security solutions across infrastructure. Define security standards, mentor engineers, and drive security architecture decisions across cloud environments.
Requirements
- › Bachelor's degree in Computer Science or related field
- › 7+ years of experience in security engineering
- › Strong knowledge of cloud security architecture
Implement security in CI/CD pipelines and development processes. Automate SAST, DAST, SCA, and secrets scanning, and build developer-friendly security guardrails that don't slow delivery.
Implement security in CI/CD pipelines and development processes. Automate SAST, DAST, SCA, and secrets scanning, and build developer-friendly security guardrails that don't slow delivery.
Requirements
- › 5+ years of DevSecOps experience
- › CI/CD expertise (GitHub Actions, Jenkins, GitLab)
- › Security automation skills
IAM Engineer
Identity & Access Management
Mid-Level Design, implement, and maintain identity and access management systems including SSO, MFA, directory services, and lifecycle management. Identity is the new perimeter — this role owns it. Integrates with HR systems, cloud providers, and SaaS platforms to enforce least-privilege access at scale.
Design, implement, and maintain identity and access management systems including SSO, MFA, directory services, and lifecycle management. Identity is the new perimeter — this role owns it. Integrates with HR systems, cloud providers, and SaaS platforms to enforce least-privilege access at scale.
Requirements
- › 5+ years of IAM experience
- › Expertise with Okta, Azure AD, or SailPoint
- › Strong understanding of OAuth2, OIDC, SAML, and SCIM
Privileged Access Management (PAM) Specialist
Identity & Access Management
Mid-Level Deploy and manage privileged access management solutions to secure administrative accounts, service accounts, and secrets. Reduce standing privilege, implement just-in-time access, and ensure all privileged sessions are recorded and auditable.
Deploy and manage privileged access management solutions to secure administrative accounts, service accounts, and secrets. Reduce standing privilege, implement just-in-time access, and ensure all privileged sessions are recorded and auditable.
Requirements
- › 4+ years of PAM experience
- › Hands-on with CyberArk, BeyondTrust, or Delinea
- › Knowledge of least-privilege and zero standing privilege models
Cloud Security Engineer
Engineering
Mid-Level Secure cloud infrastructure across AWS, Azure, or GCP. Implement cloud security posture management (CSPM), enforce IaC security policies, configure native security services, and build guardrails that allow engineering teams to move fast without introducing risk.
Secure cloud infrastructure across AWS, Azure, or GCP. Implement cloud security posture management (CSPM), enforce IaC security policies, configure native security services, and build guardrails that allow engineering teams to move fast without introducing risk.
Requirements
- › 5+ years of cloud security experience
- › Deep expertise in AWS, Azure, or GCP security services
- › Experience with Terraform, CSPM tools (Wiz, Prisma, Defender for Cloud)
- › Cloud security certifications (AWS Security Specialty, CCSP) preferred
Container & Kubernetes Security Engineer
Engineering
Mid-Level Secure containerized workloads and Kubernetes clusters across development and production environments. Implement runtime security, image scanning, network policies, secrets management, and admission controllers to harden the container supply chain.
Secure containerized workloads and Kubernetes clusters across development and production environments. Implement runtime security, image scanning, network policies, secrets management, and admission controllers to harden the container supply chain.
Requirements
- › 4+ years of cloud-native/container security experience
- › Deep Kubernetes knowledge (CKS certification preferred)
- › Experience with Falco, Trivy, OPA/Gatekeeper, or similar tools
Zero Trust Architect
Security Architecture
Senior Lead the design and implementation of a Zero Trust security model across the enterprise. Define the roadmap for identity-centric access, micro-segmentation, continuous verification, and least-privilege enforcement. Translate Zero Trust principles into actionable architecture across network, endpoint, identity, and application layers.
Lead the design and implementation of a Zero Trust security model across the enterprise. Define the roadmap for identity-centric access, micro-segmentation, continuous verification, and least-privilege enforcement. Translate Zero Trust principles into actionable architecture across network, endpoint, identity, and application layers.
Requirements
- › 8+ years of security architecture experience
- › Deep understanding of NIST SP 800-207 and Zero Trust frameworks
- › Experience with ZTNA vendors (Zscaler, Cloudflare Access, Palo Alto Prisma)
- › Strong background in identity, networking, and endpoint security
Quantum Security Specialist
Engineering
Senior Lead the organization's post-quantum cryptography (PQC) readiness program. Assess cryptographic inventory, identify quantum-vulnerable systems, and drive migration to NIST-approved PQC algorithms (ML-KEM, ML-DSA, SLH-DSA). Advise on crypto-agility architecture and timeline planning ahead of Q-Day.
Lead the organization's post-quantum cryptography (PQC) readiness program. Assess cryptographic inventory, identify quantum-vulnerable systems, and drive migration to NIST-approved PQC algorithms (ML-KEM, ML-DSA, SLH-DSA). Advise on crypto-agility architecture and timeline planning ahead of Q-Day.
Requirements
- › 7+ years of cryptography or security engineering experience
- › Strong knowledge of classical and post-quantum cryptographic primitives
- › Familiarity with NIST PQC standards and FIPS 203/204/205
- › Experience with PKI, TLS, and cryptographic library implementation
Supply Chain Security Analyst
GRC
Mid-Level Manage software and hardware supply chain security risk. Maintain software bill of materials (SBOM) inventories, monitor for upstream vulnerabilities in third-party dependencies, assess vendor development practices, and ensure compliance with EO 14028 and NIST SSDF requirements.
Manage software and hardware supply chain security risk. Maintain software bill of materials (SBOM) inventories, monitor for upstream vulnerabilities in third-party dependencies, assess vendor development practices, and ensure compliance with EO 14028 and NIST SSDF requirements.
Requirements
- › 4+ years of security or GRC experience
- › Familiarity with SBOM formats (CycloneDX, SPDX)
- › Understanding of SLSA, NIST SSDF, and supply chain attack vectors
- › Experience with dependency scanning and SCA tools
CTEM Lead (Continuous Threat Exposure Management)
Security Operations
Senior Own the organization's Continuous Threat Exposure Management program — the evolution beyond traditional vulnerability management. Scope, discover, prioritize, validate, and mobilize remediation of exposures across the full attack surface including internal assets, cloud, SaaS, and external attack surface. Align exposure data to business risk and report to the board.
Own the organization's Continuous Threat Exposure Management program — the evolution beyond traditional vulnerability management. Scope, discover, prioritize, validate, and mobilize remediation of exposures across the full attack surface including internal assets, cloud, SaaS, and external attack surface. Align exposure data to business risk and report to the board.
Requirements
- › 7+ years of security operations or vulnerability management experience
- › Experience with EASM and attack surface management platforms
- › Familiarity with Gartner's CTEM framework
- › Strong cross-functional stakeholder management skills
Penetration Tester
Security Operations
Mid-Level Conduct hands-on penetration tests against networks, applications, APIs, and cloud environments. Identify vulnerabilities, chain exploits to demonstrate real-world impact, and produce clear technical and executive reports with actionable remediation guidance.
Conduct hands-on penetration tests against networks, applications, APIs, and cloud environments. Identify vulnerabilities, chain exploits to demonstrate real-world impact, and produce clear technical and executive reports with actionable remediation guidance.
Requirements
- › 4+ years of penetration testing experience
- › OSCP, PNPT, or equivalent certification required
- › Proficiency with Burp Suite, Metasploit, Cobalt Strike, and custom tooling
- › Strong report writing skills
Malware Analyst / Reverse Engineer
Security Operations
Mid-Level Analyze malicious code, ransomware, and threat actor tooling to extract indicators of compromise, understand capabilities, and support incident response. Perform static and dynamic analysis, unpack obfuscated samples, and contribute YARA rules and detection signatures back to the security team.
Analyze malicious code, ransomware, and threat actor tooling to extract indicators of compromise, understand capabilities, and support incident response. Perform static and dynamic analysis, unpack obfuscated samples, and contribute YARA rules and detection signatures back to the security team.
Requirements
- › 5+ years of malware analysis experience
- › Proficiency with IDA Pro, Ghidra, x64dbg, or similar tools
- › Strong assembly and low-level programming knowledge
- › Experience with sandboxes (Any.run, Cuckoo, Joe Sandbox)
Virtual CISO (vCISO)
Executive
Executive Serve as a fractional or embedded Chief Information Security Officer for client organizations that require executive security leadership without a full-time hire. Develop information security strategy, manage security programs, present to boards, and act as the accountable security leader across multiple client engagements. Ideal for consultants with broad CISO-level experience.
Serve as a fractional or embedded Chief Information Security Officer for client organizations that require executive security leadership without a full-time hire. Develop information security strategy, manage security programs, present to boards, and act as the accountable security leader across multiple client engagements. Ideal for consultants with broad CISO-level experience.
Requirements
- › 10+ years of information security experience including CISO or deputy CISO tenure
- › Ability to manage multiple client relationships simultaneously
- › Executive communication and board-level presentation skills
- › CISSP, CISM, or equivalent certification strongly preferred
Cyber Risk Quantification Analyst
GRC
Mid-Level Translate cybersecurity risk into financial terms using quantitative models including FAIR (Factor Analysis of Information Risk). Build risk models, run Monte Carlo simulations, and produce board-ready reports that express cyber risk in dollars rather than heat maps. Enable data-driven security investment decisions.
Translate cybersecurity risk into financial terms using quantitative models including FAIR (Factor Analysis of Information Risk). Build risk models, run Monte Carlo simulations, and produce board-ready reports that express cyber risk in dollars rather than heat maps. Enable data-driven security investment decisions.
Requirements
- › 4+ years of risk management or GRC experience
- › FAIR certification (CFPS or CRMP) strongly preferred
- › Proficiency with RiskLens, Safe Security, or similar quantification platforms
- › Strong data analysis and financial modeling skills
Security Program Manager
Security Operations
Senior Drive execution of complex, cross-functional security programs from strategy to delivery. Own the security roadmap, coordinate workstreams across engineering, compliance, and operations, manage budgets, and report program health to executive leadership. The connective tissue between the CISO's strategy and the team's execution.
Drive execution of complex, cross-functional security programs from strategy to delivery. Own the security roadmap, coordinate workstreams across engineering, compliance, and operations, manage budgets, and report program health to executive leadership. The connective tissue between the CISO's strategy and the team's execution.
Requirements
- › 6+ years of program or project management experience in security or technology
- › PMP, CISSP, or security-relevant certification preferred
- › Experience with roadmapping, OKR frameworks, and executive reporting
- › Strong stakeholder management across engineering, legal, and business teams
Chief Privacy Officer (CPO)
Privacy
Executive Lead the enterprise privacy strategy at the C-suite level, owning all privacy risk, regulatory compliance (GDPR, CCPA, CPRA, APRA, and emerging state laws), and privacy engineering direction. Serve as the executive accountable for data ethics, consent management, and privacy-by-design adoption. Report directly to the CEO or General Counsel and present to the board.
Lead the enterprise privacy strategy at the C-suite level, owning all privacy risk, regulatory compliance (GDPR, CCPA, CPRA, APRA, and emerging state laws), and privacy engineering direction. Serve as the executive accountable for data ethics, consent management, and privacy-by-design adoption. Report directly to the CEO or General Counsel and present to the board.
Requirements
- › 12+ years of privacy experience including executive leadership
- › Deep expertise across global privacy regulations (GDPR, CCPA/CPRA, APRA)
- › CIPP/E, CIPP/US, or CIPM certification required
- › Proven track record building and scaling enterprise privacy programs