Responsible for administrative and operative tasks in security processes.
Develop, provide, and introduce operational security rules, processes, and plans.
Select, specify, and introduce specific security management tools and provides last-level technical support for security management systems.
Deutsche Telekom IT Solutions Slovakia entered the life of Košice region in 2006. They have managed to grow to the second largest employer in the eastern part of the country with more than 3900 employees.
Perform reviews and approvals for security-related tasks.
Attend Architecture Committee and AI Committee meetings.
Maintain and update existing security reference architectures.
Veeam is the #1 global market leader in data resilience, believing businesses should control all their data whenever and wherever they need it. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses running.
Administer and maintain all physical security systems globally.
Manage system configuration, updates, and vendor installations.
Coordinate projects and support ongoing maintenance worldwide.
Allied Universal is North America’s leading security and facility services company. They offer a dynamic, welcoming, and collaborative workplace, where employees contribute to a culture that positively impacts the communities and customers they serve.
Design, deploy, and manage cloud and on-premises infrastructure with a focus on network security and resilience.
Implement and maintain secure networking configurations, including firewalls, VPNs, load balancers, and intrusion detection/prevention systems (IDS/IPS).
Monitor network performance, troubleshoot issues, and optimize infrastructure to ensure high availability and minimal downtime.
Deutsche Telekom IT Solutions is a subsidiary of the Deutsche Telekom Group and was Hungary’s most attractive employer in 2025. The company provides a wide portfolio of IT and telecommunications services with more than 5300 employees and hundreds of large customers in Germany and other European countries.
You will review, challenge, and strengthen our systems, act as the security authority within engineering, define guardrails, and drive remediation when risks arise.
Operating independently, you’ll build the structure and standards needed as we scale.
Your mission is to own the company wide security strategy and architecture, ensure CIRO and SOC 2 alignment, and embed strong security practices across infrastructure, applications, and internal systems, while enabling engineering velocity.
Newton is changing how Canadians trade crypto, with the goal to make financial freedom something everyone can achieve by giving customers the tools and knowledge they need to navigate the crypto world. At Newton, you'll work with a remote team spread across Canada.
Design and implement microsegmentation strategies using Akamai Guardicore Centra.
Design and implement SASE and Zero Trust architectures covering remote user, branch office, cloud workload.
Lead client-facing discovery sessions, design workshops, and architecture reviews.
AHEAD is a consulting company that helps enterprises deploy Guardicore microsegmentation implementations and SASE deployments. They serve as a trusted technical advisor, owning the full delivery lifecycle from scoping and architecture.
Perform internal audits and vulnerability testing, ensuring security controls are monitored.
Lead security architecture governance for internal IT and projects, using Unified Architecture Framework.
Maintain compliance with security requirements and develop roadmaps to address evolving threats.
Jobgether is a platform connecting job seekers with companies. It uses AI-powered matching to ensure applications are reviewed quickly and fairly, identifying top candidates for employers.
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
Derex Technologies Inc specializes in providing IT consulting, staffing solutions and software services. Globally headquartered in Harrison New Jersey since 1996 Derex delivers the highest quality technology professionals and an array of customized IT talent solutions designed to improve productivity and drive results to global clients throughout North America.
Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
Responding to cybersecurity incidents from identification through resolution.
Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.
Partner with Enterprise AEs and AMs to secure the technical win on Vanta’s most complex, strategic deals.
Own and execute the Solution Validation (Managed Pilot) process to prove technical feasibility and eliminate risk.
Act as the ‘Voice of the CISO’ by consolidating strategic product gaps and collaborating with Product and Engineering teams to influence product enhancements.
Vanta helps businesses earn and prove trust by enabling companies to practice better security and prove it with ease. They have a kind and talented team, and while some have prior security experience, many have been successful without it.
Understand customer requirements and create a comprehensive Statement of Work (SOW).
Present the Menlo cloud security assessments to Customers.
Create and deliver detailed and professional level documentation.
Menlo Security enables the world to connect, communicate and collaborate securely without compromise. They are growing from 400 employees into the next phase of their journey and values passionate talent filled with empathy and agility.
Ensure technology solutions are scalable, resilient, and secure by design.
Embed security best practices directly into our IT operations.
Create defenses for our workstations and identities.
Huntress is a fully remote, global team of experts dedicated to breaking down barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, they protect all businesses with enterprise-grade, fully owned, and managed cybersecurity products.
Design, implement, and operate Armada’s firewall and network security platforms across core, edge, and distributed environments.
Actively design firewall topologies, build and validate rulesets, troubleshoot complex traffic flows, and partner with engineering teams to secure production systems at scale.
Serve as the highest technical escalation point for firewall-related incidents and drive root cause analysis and implement permanent corrective actions.
Armada is an edge computing startup that provides computing infrastructure to remote areas where connectivity and cloud infrastructure are limited, as well as areas where data needs to be processed locally for real-time analytics and AI at the edge. They are looking to bring on the most brilliant minds to help further their mission of bridging the digital divide with advanced technology infrastructure that can be rapidly deployed anywhere.
Provide physical security risk analysis and assessments to ensure data centre locations meet security standards.
Perform risk assessment activities to ensure physical security compliance with diverse regulatory and auditing requirements.
Deliver both written and oral briefings tailored for key business stakeholders and senior leadership.
Securitas is a global company focused on making the world a safer place. With over 336,000 colleagues, they value integrity, vigilance, and helpfulness and focus on creating opportunities for their employees.
Identify, prioritize, and source best-of-breed commercial security applications.
Structure and negotiate production, lab, and development multi-tenant licenses.
Act as the internal voice of the technical partner ecosystem across teams.
SimSpace is focused on building its culture and mindfully enhancing its atmosphere. They foster a culture of continuous learning, curiosity, and professional growth, empowering people to shape their careers.
Lead execution of the enterprise information security program.
Oversee threat detection/response, vulnerability management, and incident response processes.
Partner with Engineering and Infrastructure teams to secure cloud environments and CI/CD pipelines.
bswift transforms benefits administration, making it simpler and smarter. They serve thousands of companies and millions of people nationwide, reducing administrative burdens and freeing HR teams to focus on creating thriving, people-first workplaces.
Manage Google SecOps/SIEM for threat detection, alerting, and investigation workflows.
Administer Thycotic/Delinea Secret Server for privileged credential management.
Maintain and configure Cyberhaven DLP for data loss prevention.
Redapt Inc. is a data center infrastructure integrator, technology engineering firm, and cloud services provider. They deliver innovative solutions and services that power our customers' most demanding applications and enable them to extract powerful insights from data.
Deliver technical leadership and support to Enterprise and IT customers.
Ensure successful deployment and optimal performance of wired and wireless enterprise networking solutions.
Gather and relay customer feedback, shaping product strategies and innovations.
Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Their system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company.
Provide ongoing operational support, maintenance, and engineering with regards to the full Zscaler product suite.
Configure and tune the system to optimize performance and/or alerting.
Collaborate with cross-functional teams to integrate Zscaler with existing network, firewalls, external vendors, and server infrastructure.
GovCIO is passionate about transforming government IT. They deliver innovative IT services and solutions to improve how government agencies operate and serve citizens.