Work directly with engineering teams as the main point of contact for product security.
Conduct formal TARA (ISO/SAE 21434) to define security requirements for vehicle ECUs and autonomous stacks.
Develop data integrity standards for CAN and Automotive Ethernet to block injection and spoofing attacks.
Waabi, founded by AI pioneer Raquel Urtasun, is an AI company building the next generation of self-driving technology. With a world class team and an innovative approach, Waabi is backed by best-in-class investors and is growing quickly with offices in Toronto, San Francisco, Dallas, and Pittsburgh.
Establish and execute a comprehensive long-term vision and strategy for Product Security, AppSec, and Privacy Engineering across all product lines.
Lead the Product Security Review process, including threat modeling, security architecture reviews, and penetration testing oversight for new and existing features.
Define and enforce Security and Privacy standards and policies within the Software Development Lifecycle (SDLC) and CI/CD pipelines.
Flock Safety is the leading safety technology platform, helping communities thrive by taking a proactive approach to crime prevention and security. We’re a high-performance, low-ego team driven by urgency, collaboration, and bold thinking.
Lead the strategy, execution, and lifecycle management of Cyderes’ Managed Detection and Response products and capabilities.
Translate market needs, customer feedback, and business objectives into a compelling product that delivers customer value, and market differentiation.
Partner closely with Engineering, Security Operations, Sales, Marketing, Alliances, and Customer Success.
Cyderes specializes in building practical IAM, exposure management, and risk programs. They stop active threats fast with MDR that works with your existing security tools. Their global team is laser-focused on cybersecurity.
Define and own the product vision, strategy, and multi-year roadmap for Cyderes’ Mesh offerings and platform capabilities.
Identify market opportunities, competitive differentiation, and emerging trends across the markets that Mesh utilizes and is adjacent to.
Align product strategy with company goals, revenue growth, customer retention, and operational scale.
Cyderes specializes in building practical IAM, exposure management, and risk programs, and stopping active threats fast with MDR that works with your existing security tools, all augmented by AI. They are a tireless global team laser-focused on cybersecurity, arming organizations with the people, platforms, and perspectives they need.
Define and evangelize requirements and guidance for secure by design principles.
Implement automation to prevent and detect security flaws during development.
Conduct design reviews and manual security assessments.
Yubico is the creator of the most secure passkeys and leading provider of hardware authentication security keys with a mission to make secure login easy and available for everyone. They are a global company with a strong company culture and employees located in over 14 countries; Yubico’s headquarters are based in Stockholm, Sweden and Santa Clara, CA.
Own the 24‑month global security roadmap developed with an external partner; drive planning, resource allocation, cross‑region rollout, milestone tracking, and KPI delivery.
Lead the cybersecurity transformation: redesign the security operating model, establish regional capability hubs, hire and upskill teams, and integrate security into engineering and product lifecycles.
Modernize security tooling and architecture: define global architecture for IAM, cloud security, vulnerability management, SIEM/XDR, DLP, and secure SDLC integrations; manage vendor selection and lifecycle.
Black Duck Software, Inc. helps organizations build secure, high-quality software, minimizing risks while maximizing speed and productivity. With a combination of industry-leading tools, services, and expertise, Black Duck helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
Define security detection program strategy and roadmap.
Oversee development, testing, and maintenance of detection logic.
Lead and mentor a high-performing team of security operators.
Cribl helps solve IT and Security's data needs. They foster a collaborative, curious, and motivated team environment where employees are passionate about putting customers first and believe in empowering our employees to do their best work, wherever they are.
Work with private equity and portfolio company clients, consulting on how to apply an information security vision and strategy in alignment with customer business objectives.
Work with customers to assess and address information security risks.
Assist in managing customer security programs including the achievement and/or maintenance of key compliance initiatives such as SOC, ISO27001, NIST, PCI, and SOX.
Crosslake supports changemakers and helps them buy, build, and run better technology. They believe in a programmatic, proactive approach to actively manage technology throughout the investment lifecycle.
Serve as the primary vCISO and subject matter expert for multiple clients.
Lead data-centric cybersecurity programs aligned to business risk.
Manage, mentor, and develop vCISO team members.
Coretelligent partners with growing, highly regulated organizations that need secure, dependable IT environments built to scale. They deliver managed IT, cybersecurity, cloud, and strategy, through a model designed for consistency, transparency, and trust. They are building a team of professionals who care deeply about quality, ownership, and continuous improvement.
Lead development of security strategy aligned to client business goals.
Guide risk management practices including risk registers and threat modeling.
Provide executive-level oversight of regulatory compliance programs.
Jobgether uses an AI-powered matching process to ensure applications are reviewed fairly. Their system identifies the top-fitting candidates and shares this shortlist with the hiring company.
Own and operate n8n’s vulnerability intake and triage process, including the [email protected] inbox
Define and maintain security policies, standards, and public-facing disclosure documentation
Embed security into the software development lifecycle through threat modeling, design reviews, and pragmatic guardrails
n8n is the open workflow orchestration platform built for the new era of AI. They give technical teams the freedom of code with the speed of no-code, so they can automate faster, smarter, and without limits. Since their founding in 2019, they’ve grown into a diverse team of over 160.
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
Derex Technologies Inc specializes in providing IT consulting, staffing solutions and software services. Globally headquartered in Harrison New Jersey since 1996 Derex delivers the highest quality technology professionals and an array of customized IT talent solutions designed to improve productivity and drive results to global clients throughout North America.
Lead technical initiatives and create tailored solutions.
Drive customer satisfaction through innovative technology and security designs.
Consult with and guide customers through complex cybersecurity challenges.
Jobgether is a platform where AI ensures applications fairly reviewed. They connect candidates with partner companies, and focus on quickly matching candidates to roles.