Onebrief provides collaboration and AI-powered workflow software designed specifically for military staffs, making the staff faster, smarter, and more efficient. Valued at $2.15B, the company's team spans veterans from all forces and global organizations, and technologists from leading-edge software companies.
Leading incident response initiatives and conduct thorough cybersecurity investigations.
Enhancing security program by refining processes and optimizing tooling.
Designing and implementing advanced threat detection and mitigation strategies.
Docplanner empowers patients by giving them access to leave and read reviews about their visits and provides doctors with technology to manage bookings easily and save time. They employ over 2,500 people globally and have a startup-mindset.
Support and execute security incident response activities.
Operate and improve enterprise security controls and tooling.
Coordinate security investigations with DevOps, IT, and Engineering teams.
Keeper Security transforms cybersecurity for organizations around the world with next-generation privileged access management. Keeper’s zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and GovRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified.
Supporting investigations, day‑to‑day operations, and the uplift of our security posture.
Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
Unpicking a phishing campaign and advising on a new solution or progressing vulnerability management.
Contact Energy believes home is the most important place in the world. They're a team that’s reimagining how Aotearoa is powered and how customers experience energy. Contact is guided by their tikanga and they touch lives to make life better.
24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.
Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.
Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).
Keyrock is a leading change-maker in the digital asset space, renowned for its partnerships and innovation. They have over 200 team members around the world with a diverse team from 42 nationalities and backgrounds ranging from DeFi natives to PhDs.
Own detection, response, and cloud security at PostHog.
Take the reins of our security operations, build out our detection pipelines, and ensure that when something goes bump in the night, we have the observability to know exactly what happened.
Shape the security team, culture and tooling for a high-growth, open-source company.
PostHog is shipping every product that companies need to run their business from their first day, to the day they IPO, and beyond. They are the operating system for folks who build software. They've raised more than $100m from some of the world's top investors and are set up for a long, ambitious journey.
Perform advanced investigation and triage of security alerts generated by the SIEM.
Lead incident response actions including containment, eradication, and recovery support.
Mentor Tier 1 SOC analysts and assist with escalation handling.
On Call Computer Solutions is a nationwide leader in Cyber Security and Compliance solutions for Department of Defense contractors, assisting businesses nationwide with cybersecurity and information system protection. They are known for exceptional first-time resolution rates and client satisfaction, and offer advanced tools, comprehensive training, and a collaborative team environment.
Keeps the lights on, data safe, and people moving fast.
Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
Contributing to reviews of business solutions, risk identification and secure‑by‑design practices.
Contact Energy is a power, mobile, and broadband company that is transforming how Aotearoa is powered, leading the charge on renewable energy and digitising customer journeys. They are a team of 1000+ from all walks of life. They value caring for each other, learning from one another, and being guided by their tikanga.
Conducts threat monitoring and analysis using threat detection tools.
Builds and maintains security infrastructure and system performance.
Triages alerts from detection platforms, identifying false positives and escalating attacks.
Nuvalent is dedicated to creating selective medicines with expertise in chemistry, specifically designed to meet the needs of cancer patients. They are an early-stage company that brings together experienced scientists and industry veterans with a history in oncology drug development and company building.
Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
Responding to cybersecurity incidents from identification through resolution.
Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.
Lead execution of the enterprise information security program.
Oversee threat detection/response, vulnerability management, and incident response processes.
Partner with Engineering and Infrastructure teams to secure cloud environments and CI/CD pipelines.
bswift transforms benefits administration, making it simpler and smarter. They serve thousands of companies and millions of people nationwide, reducing administrative burdens and freeing HR teams to focus on creating thriving, people-first workplaces.
You will review, challenge, and strengthen our systems, act as the security authority within engineering, define guardrails, and drive remediation when risks arise.
Operating independently, you’ll build the structure and standards needed as we scale.
Your mission is to own the company wide security strategy and architecture, ensure CIRO and SOC 2 alignment, and embed strong security practices across infrastructure, applications, and internal systems, while enabling engineering velocity.
Newton is changing how Canadians trade crypto, with the goal to make financial freedom something everyone can achieve by giving customers the tools and knowledge they need to navigate the crypto world. At Newton, you'll work with a remote team spread across Canada.
Lead the identification, triage, and validation of security incidents, acting as the ultimate escalation point for the SOC.
Drive organizational incident readiness by designing and executing practical response exercises to ensure first responders are prepared at all levels.
Lead cross-functional Post-Incident Reviews to extract critical lessons; drive specific tooling and process enhancements that harden organizational defenses.
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.
Define the security operations roadmap by designing and implementing long term strategies.
Improve and maintain processes, tooling, documentation, and training to mature and enhance cybersecurity incident response.
Design, implement, and maintain security events monitoring systems.
Docplanner Tech is a diverse group of over 400 people working in Engineering, Data, and Product teams, responsible for building the product for all locations. They are leaders in 13 countries, with over 2,500 employees globally, and are backed by leading venture capital funds such as Point Nine Capital and Goldman Sachs Asset Management.
Acting as a senior escalation point and incident coordinator for security incidents across Canva’s cloud, endpoint, and SaaS environments.
Leading and actively participating in security incident response, from initial detection through investigation, containment, eradication, and recovery.
Performing deep forensic analysis to determine scope, impact, and root cause, and translating technical findings into clear outcomes for stakeholders.
Canva is a design platform. They have campuses in Sydney and Melbourne and co-working spaces in Brisbane, Perth and Adelaide.
Lead and mature Material Bank’s enterprise information security program.
Own the security risk management framework, including risk identification, scoring, tracking, and executive reporting.
Own detection, incident response, and resilience strategy.
Material Bank operates the world’s largest material marketplace for the architecture and design industry, connecting designers with materials from leading brands. They operate in 37 countries and their platform is the standard for design professionals around the globe.
Detect and respond to security threats across network, systems, and cloud environments.
Troubleshoot and resolve complex technical issues, performing root cause analysis.
Act as an escalation point for unresolved alerts/issues and mentor SNOC Engineer I team members.
DYOPATH is committed to providing excellent technology services. They value innovation, collaboration, and continuous skill-building in a supportive team environment.
Deliver exceptional support experiences through security expertise and empathetic communication.
Provide expert-level advisory services on complex security questions and product issues.
Drive Security Operations team efficiency through process creation, optimization, and innovative feature ideas.
Blumira is a security operations platform built for growing teams and partners supporting them. They integrate comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind. The team is passionate about putting resilience in reach for every organization and helping teams build their own expertise.
Monitor security events and incidents to detect potential threats and vulnerabilities.
Support response to security incidents and manage the incident response process end-to-end.
Implement and monitor security measures to protect LTK’s infrastructure and assets.
LTK's mission is to empower the world’s premium lifestyle Creators to achieve maximum economic success by connecting brands, creators, and shoppers with a world-class shopping app and trusted tools and technology. LTK is headquartered in Dallas, TX, and currently operates on five continents and employs a diverse, multi-disciplinary team.
Act as the technical Subject Matter Expert for enterprise cybersecurity log data management solutions.
Define and implement scalable, modular, secure, and maintainable solutions.
Create and maintain architecture artifacts describing system High-Level Design and Low-Level Design.
Jobgether uses an AI-powered matching process to ensure applications are reviewed quickly, objectively, and fairly against the role's core requirements. They identify the top-fitting candidates, and this shortlist is then shared directly with the hiring company.