Provide advice and guidance to Arootah clients who seek help with their Cybersecurity needs. This will involve consulting to some of the leading Alternative Asset Firms and Family Offices in the world and sharing your experience as a Chief Information Security Officer in helping clients to serve as strategic cybersecurity advisor. The role involves developing and implementing comprehensive cybersecurity programs and conducting risk assessments.
Job listings
The Security Operations team is a central pillar of our growth strategy, and Vultr is looking for a Senior Manager of Incident Response to oversee the day-to-day operations of the incident management and response team. This role involves executing incident response strategies, coordinating with cross-functional teams during security incidents, and improving processes based on post-incident reviews.
Perform real-time monitoring and analysis of security events and alerts from various security tools, including SIEM (Sentinel), Microsoft Defender Suite, Firewalls, IDS/IPS, WAFs, and other security logs. Analyze telemetry from Microsoft Defender products within Microsoft Sentinel. Conduct in-depth investigations of escalated security incidents, performing root cause analysis to understand the full scope and impact.
In this role, you will be at the intersection of Artificial Intelligence and Cybersecurity as a key expert in our brand-new AI Security services. You will lead our customers through securing their AI and Machine Learning (ML) pipelines from development to runtime. This is a unique opportunity to become a foundational member of a team that is defining the best practices for AI Security in the real world.
We are looking for passionate, inspirational, hands-on leaders for Pureβs fast-growing and innovative Cyber Resilience Field Solutions Architect team; compose of highly motivated technical sales resources whose goal is to develop and lead Pureβs Cyber Resilience business, including providing guidance, enablement, and support of sales opportunities and partnerships across their assigned region.
AECOM is seeking an MC Cybersecurity Advisor. This position will be an integral part of the OT Cybersecurity Team and requires expertise in OT design, development, and deployment. The advisor will provide analysis on projects, execute work plans, and participate in the development of solutions to client problems.
The Red Canary Cyber Incident Response Team (CIRT) continues to push the boundaries of threat detection and response with a unique combination of operations, threat research, and engineering. Candidates will use Red Canaryβs detection platform to analyze EDR telemetry, alerts, and log sources across several detection domains, publish threats for customers using concisely-written communication, and improve the CIRT workflow through orchestration & automation.
We are seeking an experienced Cyber Threat Intelligence (CTI) Analyst to join our Threat Research team in identifying, analysing, and communicating emerging cyber threats. This role focuses on deep technical research, adversary tracking and collaboration across teams to support ExtraHopβs detection and intelligence capabilities.
Serve as the primary cybersecurity point of contact for assigned DoD Information Systems (IS), overseeing day-to-day security operations, maintenance, and continuous monitoring. Collaborate with stakeholders to ensure system compliance and readiness. Engage and coordinate with senior government leaders, civilian personnel, and uniformed service members to communicate cybersecurity requirements, address compliance issues, and support mission objectives.
Develop and implement a company-wide cybersecurity strategy and roadmap. Identify and mitigate vulnerabilities across infrastructure and applications. Establish security policies, compliance frameworks, and best practices. Implement threat detection, response, and risk management processes. Collaborate with engineering and DevOps teams to integrate security into the development lifecycle (DevSecOps). Ensure compliance with global standards such as GDPR, CIS. Lead security audits, penetration tests, and remediation efforts.