If you are a goal-oriented, team-minded professional who welcomes a challenge and strives for excellence, then we would like to hear from you. Please email your CV in Microsoft Word format to firstname.lastname@example.org
Discover and apply for suitable positions below
Check Point offers a multi-level security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprise`s cloud, network and mobile devices.
Information security is critical to organizational success. Get strong digital data security with Entrust's array of identity-based security solutions.
Real-time protection for your critical assets with advanced cyber threat intelligence, configuration management, and policy compliance.
IBM Security solutions are designed to help you. An integrated portfolio to detect and prevent advanced threats. Mature security operations and risk management ...
We are on a relentless mission to make every organization secure from cyber threats and confident in their readiness. We deliver dynamic cyber defense solutions by combining services and products powered by industry-leading expertise, intelligence and innovative technology.
We are defenders. It is why we exist. Born from hustle, we’ve spent decades sharpening ourselves to make things better for our customers. How? With our autonomous technology, we create sustainable advantage, not momentary edge.
VMware Carbon Black Endpoint consolidates multiple endpoint security capabilities using one agent and console, helping you operate faster and more effectively.
Sophos products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices. What’s more, securing these devices is made possible through products that fit your precise needs.
Know the exposure of every asset on any platform. Tenable enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks, and accurately communicate cyber risk to support optimal business performance.
AlienVault Unified Security Management (USM) provides SIEM, vulnerability assessment, asset discovery, network and host intrusion detection, endpoint detection and response (EDR), flow and packet capture, and file integrity monitoring (FIM), as well as centralized configuration and management.