Lead and execute security incident response, leveraging your deep expertise to manage and mitigate threats across Ivanti’s global footprint.
Uncover both known and unknown threats using advanced incident response techniques, threat hunting, threat intelligence, and a strong understanding of attacker TTPs.
Conduct thorough investigations involving external attacks, insider threats, and digital forensics, ensuring stakeholders stay informed with comprehensive reporting.
Ivanti's mission is to elevate human potential within organizations by managing, protecting and automating technology for continuous innovation. It is through diverse and inclusive hiring, decision-making, and commitment to our employees and partners that they will continue to build and deliver world-class solutions for their customers.
Identify and respond to security incidents on a global scale.
Act as an incident commander to drive incidents through the entire response lifecycle.
Conduct threat hunting activities, anticipate future threats, and maintain forward-thinking strategies for tools/technology/processes that combat sophisticated threat actors.
Mozilla Corporation is a non-profit-backed technology company that has shaped the internet for the better over the last 25 years. With more than 225 million people around the world using their products each month, they’re shaping the next 25 years of technology and helping to reclaim an internet built for people, not companies.
Serve as trusted advisor as part of the security division’s leadership team, actively shaping the program direction.
Build and mature incident response runbooks, procedures, and capabilities.
Foster a defense first mindset through actionable incident retrospective mitigations to close defense gaps, making GitLab a hard target for attackers.
GitLab is the intelligent orchestration platform for DevSecOps. They enable organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation. GitLab values a high-performance culture driven by values and continuous knowledge exchange.
Respond to security incidents according to the security incident response policy and procedures
Communicate investigation findings to relevant stakeholders to help improve the information security posture
Monitor relevant information sources to stay up to date on current attacks and trends
REWE Group Austria develops innovative IT products and services for its corporate divisions in Austria and abroad. With over 700 employees, they set the tone for modern trade and have a family-friendly culture with flexible hours and remote options.
Investigate intrusion attempts and perform in-depth analysis of exploits
Monitor and analyze network traffic and alerts
Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, they help enterprises deliver on the promise of digital transformation. At AHEAD, they prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard.
Serve as the primary Incident Commander for critical security events.
Orchestrate response efforts across multiple teams.
Conduct post-incident reviews and drive improvements.
GitLab is the intelligent orchestration platform for DevSecOps. They enable organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation. GitLab has more than 50 million registered users and is trusted by more than 50% of the Fortune 100*, which reflects a high-performance culture driven by their values and continuous knowledge exchange.
Play a key role in the strategic and hands-on protection of our enterprise systems.
Responsible for hardening infrastructure and integrating security systems into deployments.
Manage SIEM operations, incident response, and vulnerability reviews.
CBN Secure Technologies Inc. is an award-winning provider of secure Driver & Vehicle solutions to US States. They are a subsidiary of Canadian Bank Note (CBN) Company, Limited, designing and developing industry-leading solutions for various domains like Driver & Vehicle and Border Security.
Monitor client environments performing Incident Detection, Validation, and Reporting.
Responsible for the implementation and maintenance of cloud-based SIEM Solutions.
Partner with client Security to continuously improve and enhance Managed Security support.
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, they help enterprises deliver on the promise of digital transformation. They prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard.
Manage event and information intake, including intelligence reports and monitoring ticket queues.
Triage alerts and correlate and analyze events to determine the scope of cybersecurity incidents.
Provide 24x7 on-call support and monitor and manage security incidents using SIEM, SOAR, and DLP tools.
Brightspeed provides fast, reliable internet connections and an awesome customer experience in twenty states throughout the Midwest and South. Backed by funds managed by Apollo Global Management, they are accelerating the upgrade of copper to fiber optic technologies.
Monitor security events through SIEM and other security tools, performing initial triage and correlating signals across multiple sources.
Execute Incident Response activities, including detection, investigation, containment, remediation, and documentation of security incidents.
Analyze alerts and security anomalies to identify legitimate threats, false positives, and areas requiring escalation.
Pismo provides a comprehensive processing platform for banking, card issuing and financial market infrastructure and helps customers innovate and build the next generation of banking and payment solutions. Pismo’s 500+ employees are located in more than 10 countries around the world.
Support the OLX Security Operations Center (SOC) by assisting with the incident response and its lifecycle.
Contribute to incident response training for the organization.
Participate in improving our threat intelligence system.
OLX builds marketplace sustainable ecosystems that millions of people depend on every month to buy and sell cars, find homes, land jobs, and trade secondhand goods. They foster a culture that's ambitious, fast-moving, and built on trust, with over 50 nationalities and 8+ markets.
Reduce operational toil by experimenting with AI and automation in security workflows, building simple tools that make your team's work easier, and sharing what you learn.
Build trust across engineering and cloud teams by responding to security requests with genuine care, clear communication, and reliable follow-through.
Own alert triage and incident response with thoroughness and accuracy, ensuring security findings are investigated quickly, escalated at the right time to the right people, and documented clearly for the whole team to learn from.
Jane is a founder-led, high-growth SaaS company that builds products and tools that thousands of clinics rely on every day to run their businesses, care for their patients, and grow their communities. They are a team of more than 700 people working remotely across Canada, the US, and the UK.
Own end-to-end security operations including SOC, monitoring, and detection capabilities.
Act as technology incident commander for security events and incidents.
Own the operational lifecycle of vulnerability management including scanning, prioritization, and remediation tracking.
Best Egg is a tech-enabled financial platform that helps people build financial confidence through lending solutions and financial health tools. They foster an inclusive and flexible workplace with top-tier benefits and growth opportunities, employing collaborative and innovative team players.
Manage and optimize security tools such as email security, DLP, SIEM, IDS/IPS, EDR, threat intelligence platforms, and other tooling
Design and implement AI-enabled workflows to scale enterprise security and threat operations
Monitor and manage security alerts and incidents, analyze data, and respond to security events
Valon is building the AI-native operating system for regulated finance, starting with mortgage servicing. They are a Series C company backed by a16z, transforming industries that others have written off as too complex to innovate.
Working cross functionally to design, build, and operate solutions that continuously improve and automate our security capabilities
Leveraging data to understand trends, metrics, and opportunities to improve our security posture and then helping execute on those opportunities with stakeholders
Leading and enhancing incident / issues response efforts, spearheading analysis, containment, and mitigation strategies in a cross-functional environment to ensure effective resolution and remediation of security incidents / issues
Aledade, a public benefit corporation, empowers independent primary care practices. Founded in 2014, they've become the largest network of independent primary care in the country with a collaborative, inclusive and remote-first culture.
Build and cultivate strong client relationships based on trust and communication.
Lead and oversee active client-facing incident response engagements.
Invest in career development and provide mentorship to Forensic professionals.
Surefire Cyber is redefining the incident response model by delivering a swifter, stronger response to cyber incidents. Their approach and delivery are designed by industry veterans to address the industry’s persistent challenges of efficiency, predictability, and transparency