As a Security Operations Center (SOC) Security Analyst, you will be a critical part of our defense, responsible for continuous monitoring of security events, swift triage of potential incidents, and effective resolution of identified threats. The ideal candidate will possess a strong understanding of various attack vectors, security technologies, and incident response methodologies, with a passion for proactive threat detection and mitigation.
Job listings
This role is client-facing and requires the Principal Consultant to lead and produce deliverables based on proactive services engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (security teams, system and network administrators and owners, C-Suite, etc.) to manage and deliver proactive incident preparedness engagements, as well as wider proactive assessments and services.
As part of the Ubuntu Security Team, work with some of the best and brightest people in technology to monitor, triage, respond to, and document new and existing vulnerabilities in open source software. Collaborate with internal teams and external partners to identify issues, prioritize them, and coordinate remediation. This engineering-focused role may also involve producing security assessments, building features, conducting code reviews, developing internal tools, engaging with the open source community, and participating in industry initiatives and events.
Lead the charge in securing our product platform — spanning web, mobile, and AI-driven services. This role is ideal for someone who combines deep technical expertise with a proactive, automation-first mindset. You’ll ensure our systems, data, and AI agents are protected by best-in-class practices and tooling, while fostering a culture of security awareness across the company.
Provide advice and guidance to Arootah clients who seek help with their Cybersecurity needs. This will involve consulting to some of the leading Alternative Asset Firms and Family Offices in the world and sharing your experience as a Chief Information Security Officer in helping clients to serve as strategic cybersecurity advisor. The role involves developing and implementing comprehensive cybersecurity programs and conducting risk assessments.
We are seeking a seasoned Senior Security Engineer with deep expertise in IT Operations and Infrastructure, to design systems that can scale. You will be instrumental in our transition from a agile startup to a mature, enterprise-ready organization. Your core mission is to architect, implement, and govern our security and IT infrastructure, ensuring it meets the rigorous demands of our enterprise clients and regulatory bodies like HIPAA and HITRUST.
The Consulting Director will help drive Proactive Consulting Services across the cloud security domain. This senior-level consultant will serve as a trusted advisor and key contributor to helping our customers strengthen cybersecurity resilience and advance their overall security maturity. This role involves leading complex cloud security assessments, evaluating cloud network architectures, and developing strategic cloud security roadmaps.
Protect the confidentiality, integrity, and availability of applications, services, data, and cloud infrastructure. Identify, analyze, and mitigate vulnerabilities. Provide support, guidance, and education to the DevOps Team, application owners, and other areas. Plan, manage, and execute remediation efforts. Assist with the development of application security test plans.
The Security Operations team is a central pillar of our growth strategy, and Vultr is looking for a Senior Manager of Incident Response to oversee the day-to-day operations of the incident management and response team. This role involves executing incident response strategies, coordinating with cross-functional teams during security incidents, and improving processes based on post-incident reviews.
Perform manual penetration testing of web applications, APIs, internal and external networks, iOS and Android mobile applications as a member of a pentest team, collaborating and engaging directly with the client. Document in detail the results of assessments, audits, tests, and verification activities. Perform manual validation of vulnerabilities and mobile and web app pentesting for OWASP top 10 vulnerabilities.