Cyber Security

Cyber Security

Glocomms: Cyber Security recruitment

The world of Cyber Security is rapidly changing, and the demand for skilled professionals is increasing. Companies need to ensure their data and networks stay secure, and they are turning to the expertise of Cyber Security professionals to help them do just that.

Glocomms is your premier destination for top-notch cybersecurity talent, available for both permanent and freelance roles. Our adept consultants boast extensive knowledge of the cybersecurity landscape, enabling them to identify the ideal candidate tailored to your precise requirements. Whether you seek a permanent employee skilled in threat detection and response, network security, or cloud security, or a freelancer for short-term projects, our swift and efficient process ensures a perfect fit for your needs.

Our European based consultants are trained specialists in their fields, recruiting mid to senior level commercial talent across Cloud & infrastructure, Cyber Security, Big Data & Analytics, Fintech, Managed IT Service Providers, SaaS and more throughout the UK and Europe.

If you're a Cyber Security professional, please register your resume.

Register your CV

If you're looking for Cyber Security talent, please register your vacancy today.

Register your vacancy
or
Request a call back

Benefits of working with us

Our Cyber Security recruitment specialists support growing technology businesses source the right go-to-market strategy talent, manage the recruitment process and facilitate onboarding. With multi-lingual language support, we provide international recruitment expertise to secure business-critical talent across Europe.

Choose us for exceptional Cyber Security recruitment services, and watch your business thrive with the right talent by your side.

Our recruitment benefits

Experience

We have a decade’s worth ofCyber Securityexperience as a leading talent partner in Technology.

Network

A vast, global network of the best, in-demandCyber Securitytalent.

Knowledge

Our award-winning talent specialists offer bespoke, tailored guidance on the latest hiring trends.

Whether you seek swift placement for pivotal roles or aspire for strategic talent acquisition solutions, our arsenal of resources and proficiency ensures successful outcomes.Share your vacancy with us today.

Looking to hire? Request a call back

Cyber Security Jobs

Security Engineering Manager

Security Engineering Manager Location: New York, NY A leading financial services firm is seeking an experienced, hands-on technical leader to join their Security team. Looking for this professional to have great expertise in Cloud Security, IAM, and leading highly technical teams. Responsibilities: Define technical strategy for security engineering Design, review, and implement robust security measures Drive cloud security architecture in an AWS environment Implement information security controls and frameworks Qualifications: 10 + years of experience Bachelors Degree or Higher in Computer Field Experience with scripting languages such as: Python, bash, Powershell, etc. Experience with Cloud (AWS) or Containers (Docker, Kubernetes) Experience with micro-service architectures Excellent communication skills with the ability to organize, present, and articulate ideas both verbally and in writing. Ability to work independently, as an effective team member and with all levels of the organization. Demonstrated critical thinking and analytical skills, as we

US$200000 - US$250000 per year
New York
Apply

Infrastructure Security Engineering Manager

Our client is seeking a highly technical Manager of Infrastructure Security Engineering to lead and drive the security posture of its core infrastructure. This role requires a hands-on leader with deep expertise in cloud infrastructure security, automation, and large-scale distributed systems. The ideal candidate will have a strong background in AWS, GCP, Kubernetes, Terraform, and Infrastructure as Code (IaC), coupled with proven leadership experience in guiding engineers to build and maintain a secure, resilient, and scalable infrastructure. Key Responsibilities: Lead and mentor a team of Infrastructure Security Engineers and help foster a high-performance culture focused on infrastructure security, reliability, and automation across the company. Architect, implement, and enforce security best practices across AWS and GCP environments to ensure robust protection for cloud workloads, EC2 instances, Kubernetes clusters, networking, and critical services. Develop and enforce security controls for networking, compute, and storage infrastructure. Incorporate advanaced protocols such as least privilege access, encryption, and compliance with industry best practices. Drive automation-first initiatives using Terraform (IaC), Python, or Ruby to enhance security configuration, policy enforcement, and proactive infrastructure hardening. Oversee and enhance security monitoring, logging, and analytics using ELK (Elasticsearch, Logstash, Kibana) and other infrastructure-focused security tools. Manage and improve GitHub security processes, including securing repositories, to encorce secure CI/CD pipelines and implement best practices for infrastructure codebase management. Strengthen the organization's threat detection and response capabilities by integrating automated security tooling into infrastructure and cloud environments. Collaborate with DevOps, IT, and Security teams to embed security into the core infrastructure lifecycle (provisioning through decommissioning). Key Qualifications: 7+ years of hands-on experience in Infrastructure Security Engineering, with at least 2 years in a leadership or managerial role. Bachelor's degree in Computer Science or a related technical field. (Bonus points for advanced degrees!) Deep expertise in AWS and GCP infrastructure security, including IAM policies, EC2, Kubernetes, cloud networking, and secure storage. Strong background in Infrastructure as Code (IaC) using Terraform, with a focus on secure infrastructure deployment and lifecycle management. Proficiency in automation and scripting using Python or Ruby. Experience securing GitHub environments, including repository security, access controls, and pipeline hardening for infrastructure deployments. Hands-on experience with logging and monitoring tools such as ELK Stack, Prometheus, Grafana, or Splunk for infrastructure security and health monitoring. Strong understanding of threat detection, incident response, and security automation techniques for infrastructure components. Proven ability to lead technical teams, drive infrastructure security initiatives, and communicate effectively with stakeholders in both technical and nontechnical environments. A track record of implementing security solutions in highly scalable, cloud-native environments with a focus on infrastructure resilience. Preferred Qualifications: Experience with additional cloud security tools such as AWS Security Hub, Google Security Command Center, or Prisma Cloud for infrastructure protection. Knowledge of container security solutions (e.g., Falco, Aqua Security, Twistlock) and Kubernetes security best practices. Familiarity with network security principles, including firewalling, VPNs, and VPC security best practices. Experience with compliance frameworks such as SOC 2, ISO 27001, or NIST CSF. Security certifications such as CISSP, CKS, AWS Certified Security - Specialty, or GIAC Cloud Security Certifications.

US$200000 - US$260000 per year
United States of America
Apply

Lead Enterprise Application Security Architect

Lead Enterprise Application Security Architect Glocomms are partnered with a globally leading Wealth Management firm to assist in growing multiple areas of Cyber Security. We are searching for a Lead Enterprise Application Security Architect to drive security initiatives, focused on threat modeling, secure code review, and secure design review. Key responsibilities: Lead secure design reviews and threat modeling sessions for new projects, features, and architectural changes, ensuring compliance with industry standards, regulatory requirements, and internal security policies. Evaluate adherence to architectural standards, minimize technical debt, and adapt enterprise assets (systems, services, and data) for major programs. Partner with development teams to provide support and guidance in addressing security vulnerabilities identified during design, code reviews, and testing phases. Create and maintain secure reference architectures to guide the design and implementation of secure systems and applications, customized to the organization's specific technologies and needs. Collaborate with cross-functional teams, including development, infrastructure, and compliance, to integrate security practices into the software development lifecycle and infrastructure provisioning. Offer expert advice on security issues, including encryption, authentication, access control, and secure communication protocols. Keep up-to-date with industry trends, emerging threats, and best practices in security architecture and design, and evaluate their relevance to the organization's security strategy. Experience required: Bachelor's degree in Computer Science, Management Information Systems, or a related field, with at least 5+ years of relevant experience, or a combination of education, training, and experience as approved by Human Resources. Preferred: 7+ years of experience in security engineering, architecture, or a similar role, with a strong focus on threat modeling, secure design reviews, and vulnerability management. Solid understanding of web application security principles, secure coding practices, and common vulnerabilities (e.g., OWASP Top 10). Skilled in designing and implementing secure architectures for both on-premises and cloud environments (e.g., AWS, Azure). Demonstrated passion for protecting organizations from evolving threats. In-depth knowledge of authentication and authorization methods, including multi-factor authentication, step-up authentication, and single sign-on; familiarity with password-less solutions is a plus. Strong grasp of encryption methods, particularly certificate and token-based cryptography. Knowledgeable in network protocols. Experience with defense-in-depth strategies and incident response. Excellent communication skills, capable of engaging with a wide range of technical and business stakeholders. Experience in financial services is preferred but not required; the ability to quickly acquire relevant business knowledge is essential.

US$170000 - US$190000 per year
Tampa
Apply

MS Security Architect

Job Title: Microsoft Security Architect Rate: 650 euros per day Role Details: Join a leading global financial institution in Paris as a Microsoft Security Architect. This hybrid role offers the flexibility of working three days in the office and two days remotely each week. You will be responsible for designing and implementing security solutions for both cloud and on-premises environments. Key Responsibilities: Design and implement security architectures for cloud and on-premises environments. Utilise Microsoft Defender for Cloud to monitor and protect cloud resources. Leverage Azure Sentinel for threat detection and response across the organisation. Implement and manage Microsoft 365 security tools to safeguard data and communications. Use Entra ID (formerly Azure Active Directory) for identity and access management. Secure mobile devices and applications using Intune. Collaborate with cross-functional teams to ensure security best practices are integrated into all projects. Provide expert guidance on security policies, procedures, and technologies. Skills Required: Proven experience in designing and implementing security solutions. Expertise in Microsoft Defender for Cloud, Azure Sentinel, Microsoft 365 security tools, Entra ID, and Intune. Strong understanding of cloud and on-premises security principles. Excellent problem-solving skills and attention to detail. Ability to work effectively in a hybrid work environment. Strong communication and collaboration skills. If you are eager to contribute to high-level IT security projects within a vibrant city like Paris, apply today to seize this fantastic opportunity!

Up to €650 per day
Paris
Apply

Principal Cyber Security Analyst

We are partnered with a top electric servicer to the Tampa, FL area to bring on a Principal Cyber Security Analyst. The ideal candidate will play a crucial role in their Cybersecurity team, enhancing their security posture by identifying and mitigating cyber threats and vulnerabilities. You will leverage advanced analytics and incident response methodologies to protect our organization, ensuring compliance with NERC CIP standards and the NIST Cybersecurity Framework (CSF). Responsibilities Develop and implement comprehensive cybersecurity strategies and policies. Monitor and analyze emerging threats and vulnerabilities. Lead incident response and forensic analysis efforts. Perform risk assessments and security audits. Ensure compliance with relevant regulations and standards. Design and manage security programs and promote cybersecurity best practices. Utilize and manage security technologies to protect organizational assets. Qualifications Bachelor of Science in Computer Science, Information Technology, or Cybersecurity; Master's degree preferred. Minimum of 10 years of experience in cybersecurity. Relevant certifications such as CISSP, CISM, CEH, or GCIH. Strong understanding of cybersecurity frameworks (NIST CSF, ISO 27001, NERC CIP). Excellent analytical, problem-solving, communication, and presentation skills. Proficiency with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, endpoint protection, vulnerability management). Core competencies: adaptable, collaborative, conscientious, critical-thinking, outcome-driven, professional. Soft skills: effective communication, collaboration, critical thinking, customer service oriented, leadership and mentorship, managing change. Physical requirements: ability to use personal protective equipment (PPE) as needed, valid driver's license. Additional Benefits Pension plan Relocation Bonus 401k matching Tuition reimbursement On-site gym with wellness incentive and gym reimbursement package & much more! This is a hybrid role out of the client's Tampa office. Please apply in directly if you are interested!

US$120000 - US$140000 per year
Tampa
Apply

Pentest Technical Coordination Officer

Glocomms are working with an IT Consultancy that are looking for a Pentest Technical Coordination Officer to join their team on a long-term freelance mission, starting ASAP. Contract Length: 12 months Start Date: ASAP Location: Porto or Lisbon (twice a week) Language: English Main Responsibilities: Join the team to provide technical support for pentest organization. Contribute to tracking and closing infrastructure vulnerabilities. Key Tasks: Assist in engagement scoping. Ensure correct identification and preparation of prerequisites. Maintain internal pentest infrastructures. Review and classify vulnerabilities. Ensure high-quality report reviews. Maintain the report archive. Register vulnerabilities in appropriate tracking tools. Provide feedback on corrective action plans. Conduct counter audits to validate closure of findings. Report progress and issues regarding action plans to top management. Assist in calculating KPIs related to activities. Support the onboarding of auditors. Help resolve problems during audits. Contribute to test case selection. Identify and report alerts as needed. Structure and conduct internal audits. Required Knowledge: General knowledge of cybersecurity risks, frameworks, and requirements. Broad understanding of IT processes, assets, and solutions. Familiarity with penetration testing projects, organization, and findings. Understanding of IT and cybersecurity regulatory frameworks. Project management skills. Ability to develop and adapt processes. Ability to set up relevant performance indicators. Proficiency in managing and facilitating meetings, seminars, committees, and training sessions. Technical Skills: Proficiency with JIRA or similar tools. Proficiency with Microsoft Office (Excel, Visio, PowerPoint). Experience with security assessment tools (e.g., Burp, vulnerability scanners). Language Skills: Expert level in English. Soft Skills: Strong oral and written communication skills. Ability to synthesize and simplify information. Excellent organizational skills. Strong collaboration and teamwork abilities. If you are interested in this role please apply with your CV and we'll be in touch!

Negotiable
Lisbon
Apply

Security Engineer

Functional Title: Security Engineer Corporate Title: Bank Officer Office Location: New York Department: Information Security Reports To: CISO & Records Officer Job Summary: The Security Engineer will be part of a team responsible for Information Security, assisting in the implementation, administration, and monitoring of security tools and solutions. This mid-level hands-on role requires 3 to 5 years of Information Security technical experience in a corporate environment. Main Duties and Responsibilities: Implement Information Security and Data Retention standards across the organization. Monitor internal and external cyber threats and investigate security events and alerts. Correlate multiple data sources and apply analytical techniques to investigate potential security incidents. Support tuning and iteration of tools used for monitoring, analysis, and forensics. Identify and promote improvements in security tools and their supporting processes. Collaborate with colleagues to ensure security tools support the overall security strategy. Monitor and analyze security vulnerabilities and propose effective remediation approaches. Assist in creating Information Security requirements for new products and services. Administer multifactor authentication for remote users and business partners. Standardize techniques and procedures to promote automation. Maintain awareness of the latest cybersecurity matters through continuous learning. Apply knowledge on the latest adversarial tactics, techniques, and procedures. Qualifications Needed: Knowledge/Experience: 3+ years of experience as a security engineer. Expertise in security products implementation, automation, and administration. Scripting skills in Python, Bash, or PowerShell. Strong knowledge of information security best practices. Experience in analyzing event logs from various devices. Knowledge of Internet standards, protocols, and system internals. Familiarity with domain-based Windows environments. Understanding of host/network vulnerabilities and exploits, attacker methodologies, and tools. Ability to analyze output from security tools and translate into actionable risks. Ability to leverage both open-source and commercial tools for investigations. Ability to understand and analyze anomalies in network protocols. Nice to Have: Knowledge of information security management frameworks such as ISO/IEC 27001, CIS, and NIST Cybersecurity Framework. Competencies: Maintain confidentiality. Work independently and in a team-oriented environment. Strong work ethic and attention to detail. High level of self-motivation and initiative. Good judgment in decision-making and creativity in problem-solving. Other Pertinent Information: Bachelor's Degree or equivalent experience and/or professional certifications required. This role requires working 5 days a week in the office.

US$140000 - US$150000 per year
New York
Apply

AVP, Identity & Access Management Architect and Operations Lead

We're partnering with a leading global provider of vacation ownership, rental, and resort experiences, who are known for their vacation club memberships, timeshare properties, and luxury travel options across a portfolio of high-end resorts and destinations. With a strong focus on customer service, they offer flexible vacation solutions such as points-based systems and exchange programs, and operate under multiple well-known hospitality brands. They are currently undergoing a technology transformation, with a focus on modernization to improve relationships with customers and further expand their accessibility across all experiences and destinations. The goal is to be a technology leader in hospitality, and they are looking for individuals eager to bring their expertise to the organization long-term. Under new leadership, the team has been reinvigorated and are primed for growth across their entire Global Technology organization including Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. The business intends to double it's spending on Technology across the organization for each of the next 3 years. This is your opportunity to be a part of the journey and drive innovation through technology adoption. Reporting to the VP of Information Security Architecture, the AVP, Identity & Access Management (IAM) will help lead the overall strategy, planning, evaluation & implementation of the entire Identity/Access Management stack. The individual in this role will significantly contribute to the direction and oversight into the IAM functions across the MVW enterprise, including areas such as developing centralized provisioning IAM engine to all MVW business and workforce applications, workflow and review certification, Audit and Compliance, Hybrid cloud management, Privileged Access Management, Authentication & Authorization. This leader will require expert knowledge in modern Identity Management approaches, administration, Identity cloud services, custom connector development, installation and configuration, performance tuning, backup, and recovery methods in multiple computing environments and must be well versed in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, Oauth, OpenID, and SAML 2.0. This position also requires knowledge of SQL databases and should be able to support other areas or functions as needed. The position leads designing, specifying, and selecting business application information security solutions, considering functionality, data, security, privacy, interoperability, scalability, and performance for the most advanced IT architectures. This position will directly contribute to the overall global enterprise cloud architecture and lead the security vision and strategy around business focused Identity Management and information security. Specific Expected Contributions Architecting, implementing and managing IAM systems including Customer IAM (CIAM) solutioning. Architecting and managing across all facets of IAM (Governance, Access Management, Privileged Access Management). Identifying and addressing issues related to IAM performance. Providing technical leadership for the integration of IAM systems. Ensuring alignment between IAM standards and business objectives. Developing and maintaining IAM policies, procedures, and standards. Working with stakeholders to understand their IAM requirements and translating them into technical specifications. Performing audits ensuring that systems are in compliance with established IAM standards and policies. Providing support and guidance to team members regarding IAM. Ensuring that IAM systems are updated regularly and remain secure against potential threats. Documenting IAM strategies and systems for future reference and review. Participate on significant application development projects to design secure architectures and ensure developed systems align with MVW security strategy and policy. Maintain security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and standards. Enhance Security team capabilities by mentoring more junior team members. Champion information security principles and best practices on key customer feature development projects to help design secure architectures and ensure developed systems align with MVW security strategy and policy. Lead the definition and methodology for ensuring applications and processes are fully integrated with our digital & service delivery platforms. Ensure that company developed, as well as third-party applications adhere to security best practices and principles, as well as design mitigation solutions for applications to meet these standards. Create security architecture documentation, including architecture frameworks, patterns, and standards. Partner with leaders across our Information Security and Data Privacy organization, as well as other organization leads. Work directly with peers and/or third parties to provide mitigations and strategic solutions to solve major application security hurdles by evaluating business strategies and requirements. Studying architecture/platform identifying integration issues and preparing cost estimates. Education & Certifications Bachelor's degree in Computer Science, Information Technology, or related discipline or equivalent work experience. Master's degree in information security or related discipline preferred. Certified Identity and Access Management (CIAM) OCI Oracle Identity Manager SailPoint IIQ Administrator Global Information Assurance Certification (GIAC) Identity Management Qualifications At least 10 years progressive experience in relevant Information Security discipline. At least 8 years of experience in Information Security. Proven experience managing mid to large sized Identity Management shops (at or greater than 2 million identities). Experience with one or more of the following: ISO 27001, NIST, CIS standards, or SOC 2 Controls Experience with AWS and Microsoft Azure/Entra ID Demonstrated expertise with modern Identity Management systems such as OCI, Sailpoint, Saviynt, BeyondTrust, and CyberArk. Skills and Attributes Exceptional critical thinking skills and thought leadership with the ability to comprehend complex problems, draw logical conclusions, make sound decisions, develop solutions, and negotiate and respond accordingly to drive closure of complex challenges. Proven track record and experience in developing comprehensive security solutions that meet the objectives of excellence in a dynamic environment. Strong demonstrated knowledge of enterprise IT systems, cloud solutions and security technologies. Ability to engage executive level stakeholders on complex matters with limited oversight and guidance. Relevant Cybersecurity Certification(s) (CISSP, CISA, CIAM, etc.).

US$135000 - US$174900 per year + +20% bonus
Orlando
Apply

Cyber Security Encryption Engineer

Cybersecurity Encryption Specialist Madrid OR Barcelona, Spain - Spanish and English speaking (French is a Bonus) Hybrid Working Model (2 Days per week in the Office) Start Date : 21/04/2025 (Can be flexible for the right candidate) Initial Engagement until 31/12/25 with extensions to follow Daily Rate : 300-400€ Customer Details Our customer is one of Europe's Biggest Insurance Groups who have a global reach, with their European HQ in Paris, they have IT teams based out of France, Belgium, UK, Spain, Portugal, Germany, Switzerland, USA and Malaysia. They have some quite ambitious Security plans for this year and are looking to free up more time for the staff in their team, so have reached out to the external freelance market to reinforce their team with Encryption expertise. Glocomms have worked with the customer for over 3 years and have been responsible for over 50 external placements into their business, with a high portion of these in their IT Security teams. Job Details Responsible for executing Encryption BAU activities using Thales CipherTrust Security Manager (CTM) and Luna (HSM Technology), including: - Onboarding new encryption applications within the constraints of the Encryption service. - Running the platform to meet performance, resilience, quality, and SLA requirements. - Recertifying offered use cases. - Regularly monitoring the Encryption platform and addressing any issues, incidents, or problems. - Managing new requests from application owners to onboard Encryption use cases. - Handling required use cases or integrations with various products/tools such as Privileged Account Management, SIEM, Patching, Virtual hosts console, etc. - Supporting Encryption program activities when needed, such as: - Migrating Encryption use cases (agent or agent-less) between different platforms. - Managing new required use cases or integrations with various products/tools like Privileged Account Management, SIEM, Patching, Virtual hosts console, etc. - Providing support during technical sessions for activity execution plan definition or troubleshooting. - Identifying potential blocking points or incompatible/risky topics that may interfere with Program or Service goals and proposing remediation/mitigation solutions. - Supporting the definition, study, and deployment of new use cases/features in the Encryption CTM platform. - Operating with the usual tools/products required for daily work, such as Change Management process, Incident and Request management tool, CMDB, CTM reports, etc. - Ensuring security by default: All activities, whether BAU or Program supporting, will always adhere to Security policies and practices. Specific activities will provide feedback/remediation actions to improve the platform's security level, such as during a Pentest campaign. Certifications : No specific certifications are required but any relevant Agile Methodology or IT Security certificates will certainly support your application. Get in Touch james.evans(@)glocomms.com +44 203 758 8905 https://www.linkedin.com/in/systemsandsecurityrecruiterjamesevans/

€300 - €400 per day
Madrid
Apply

Lead Cyber Security Threat Hunter

We're partnering with a leading global provider of vacation ownership, rental, and resort experiences, who are known for their vacation club memberships, timeshare properties, and luxury travel options across a portfolio of high-end resorts and destinations. With a strong focus on customer service, they offer flexible vacation solutions such as points-based systems and exchange programs, and operate under multiple well-known hospitality brands. They are currently undergoing a technology transformation, with a focus on modernization to improve relationships with customers and further expand their accessibility across all experiences and destinations. The goal is to be a technology leader in hospitality, and they are looking for individuals eager to bring their expertise to the organization long-term. Under new leadership, the team has been reinvigorated and are primed for growth across their entire Global Technology organization including Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. The business intends to double it's spending on Technology across the organization for each of the next 3 years. This is your opportunity to be a part of the journey and drive innovation through technology adoption. At the moment, they are looking to bring on an experienced Cyber Threat Hunter to lead their team as a Senior Analyst. This role involves safeguarding company systems and data against evolving cyber threat hunting, with a focus on incident response, proactive threat detection, and continuous improvement. Responsibilities: Conduct incident response activities. Monitor and analyze security events. Investigate incidents and perform advanced threat detection and response. Collaborate with SOC analysts to triage and escalate security incidents. Fine-tune detection mechanisms and develop playbooks. Perform forensic analysis to determine root causes and mitigate future risks. Engage in continuous improvement initiatives. Monitor security tools and remediate alerts. Manage security incident tickets and adhere to service level agreements. Develop detection rules and document processes. Implement security enhancements and work closely with the Senior Threat Intelligence Analyst. Qualifications: Bachelor's degree in information technology or related discipline, or equivalent work experience. Relevant certifications (e.g., Splunk Core Certified User, Splunk Certified Cybersecurity Defense Analyst, Certified Cyber Threat Hunter, GIAC Certified Intrusion Analyst, Certified Ethical Hacker). 7+ years of experience in cyber security, particularly in a Threat Intelligence or Threat Hunter role. Proficiency in cyber threat hunting, OSINT, and the threat intelligence life cycle. Knowledge of network threats, attacks, and intrusion set TTPs. Experience with security incident response, network forensics, and host-based forensics. Familiarity with EDR tools (e.g., CrowdStrike Falcon, Carbon Black) and SIEM platforms (e.g., Splunk, QRadar, Sentinel). Understanding of logging standards, compliance, and best practices (e.g., Sarbanes Oxley, PCI, Mitre Att&ck framework). Strong communication, collaboration, multi-tasking, and problem-solving skills. This is a hybrid role out of Orlando, Florida with 3 days onsite at the client's office.

US$105000 - US$125000 per year
Orlando
Apply

Security Software Engineer - Gen AI

Glocomms is partnered with a cutting-edge AI-powered cybersecurity start up, who is tackling some of the most pressing digital threats in the world. We are seeking a passionate and self-sufficient Security Software Engineer to help develop and maintain advanced anti-phishing, fraud detection, and identity theft prevention solutions. If you're looking for a hybrid position in New York and have a strong foundation in cybersecurity, AI technologies, and product development, we'd love to hear from you! Key Responsibilities: Work on building robust systems for phishing detection, identity theft prevention, and fraud detection within our security platform. Contribute to the full software development lifecycle, including ideation, design, development, and deployment of anti-phishing and fraud detection systems. Work closely with cross-functional teams, including cybersecurity researchers, engineers, and product managers, to drive product development. Build, fine-tune, and integrate Large Language Models (LLMs) and agents to enhance threat detection accuracy and response times. Take full ownership of the quality, performance, maintenance, and scalability of your products, ensuring they meet both business and technical goals. Stay on top of the latest developments in cybersecurity research and apply best practices to evolve the product continually. Solve thoughtful and complex problems, making critical business and technology tradeoffs that directly contribute to reducing digital threats. Skills and Experience: At least 3+ years of experience in software engineering, with a solid background in building scalable applications. At least 2+ years of hands-on experience in cybersecurity, specifically in fraud detection, anti-phishing, or identity theft prevention. Strong critical thinking and problem-solving skills, with the ability to make thoughtful business and technology tradeoffs. Proven track record of taking ownership of projects from inception to completion with an emphasis on quality, maintenance, and product understandability. Comfortable managing ambiguity and executing projects independently while delivering high-quality results. Bonus Skills: Experience in a high-growth, early-stage startup environment. Proven experience building security applications or platforms. Familiarity with cloud-based infrastructure and deployment pipelines.

US$150000 - US$200000 per year
New York
Apply

Senior Vulnerability Management Analyst

Job Opportunity: Senior Vulnerability Management Analyst Locations: PA, TX, NC We are seeking a highly skilled Senior Vulnerability Management Analyst to join our dynamic team. This role involves identifying, prioritizing, and managing vulnerabilities across our hybrid infrastructure. The ideal candidate will have a strong background in vulnerability management or pen-testing, cloud security experience, and excellent analytical and communication skills. Key Responsibilities: Monitor assets for vulnerabilities and security configuration weaknesses. Collaborate with various teams to refine prioritization and validate impact of vulnerabilities. Advise on mitigation strategies and provide accurate reporting. Investigate false positives and handle risk acceptance requests. Shape remediation SLAs and enforcement controls. Respond to zero-day events and perform special investigations. Improve scanning tool visibility and meet security objectives. Identify opportunities for automation and process improvement. Requirements: Minimum 5 years of experience in vulnerability management. Strong understanding of security frameworks. Excellent problem-solving and communication skills. Ability to lead multi-team initiatives. Experience with scripting and automation. Preferred experience with tools like Aqua, Palo Alto Prisma, Wiz, CrowdStrike, Tenable Nessus, or Qualys. If you are passionate about cybersecurity and ready to take on new challenges, we would love to hear from you!

US$140000 - US$180000 per year
Plano
Apply

News & Insights

A Guide to Negotiating Your Notice Period Image
cyber-security

A Guide to Negotiating Your Notice Period

​In Germany, the average notice period is 3 months but can be as long as 6 months. There is a good reason behind this - to protect your rights as an employee in case of redundancy or termination. However, while a notice period should be treated with respect, there might be situations where proactively discussing your leaving date with your employer could be of benefit for you as well as both your current and future employers. This guide provides you an overview of factors to consider in this context and guidelines on how to professionally navigate the process.Benefits of shortening your notice periodThere may be several reasons for wanting to leave your current employer earlier, including to:Avoid awkwardness in the workplaceThere is a reason for the maxim, “Always leave the party when you’re still having fun.” The longer you stay, the more chance for things to sour. The last thing you want is to feel like a guest who has outstayed their welcome. You want to be remembered as a great employee who made a fantastic contribution to the success of your current employer, while you were there. Simultaneously, it is in the interest of your current employer and colleagues to maintain a harmonious work environment. Stay interested in your current workInevitably, once you have told an employer you plan to leave, they might start removing you from important projects. They may even place you on gardening leave if you are going to a competitor. Companies use gardening leave as a protectionist measure to ensure that the departure of senior executives has minimal impact on their reputation and success. But as an employee, a lengthened period of less responsibility in your current position or complete time away from the job might have a negative effect on your motivation. Gain a higher salary or better career experience soonerThere is a reason that you are embarking on a new job. Whether it is the chance to work for a specific company, on an incredible project, in a unique role that only comes once in a blue moon, or simply for a higher salary – something attracted you to go. The sooner you leave, the sooner you begin the next stage of your career. Whether it’s a new gadget or a new job, our brains are hardwired to seek new stimulus. A new job offers a huge amount of novel stimuli, but the longer you have to ruminate on it, the less exciting it might seem. Exiting within a reasonable time frame might help you to capitalize on the excitement of just having secured a new job.Have cross-over with your incumbentGenerally speaking, the more time you are able to spend with your predecessor in your new role, the more valuable information you will be able to acquire. No-one else will be a greater foundation of knowledge regarding the role ahead. They will also be able to define the rest of your team’s organisational structure. Furthermore, by building a rapport, not only will you build your reputation within the new firm, you might also be able to ask for their advice, if you ever face a difficult situation regarding the position in the future.How to negotiate your noticeAs the notice period is usually part of your official employment contract that has to be respected, it is not a simple conversation you have with your employer in passing. Proactively seeking a discussion while considering all of the following factors will demonstrate your respect for your current employer and underline your professionalism.Know your contract inside and out To avoid any unwelcome surprises, you need to know the terms of your employment inside and out. Check for any specific exit clauses, anti-competition clauses, and any clauses regarding your bonus or training repayments. Properly prepared, you’ll be in the best position to competently negotiate terms and understand what the best outcome can be.Hand in a formal resignationUsually, all you need to resign is a one-line letter letting your employer know your intention to resign, your official and preferred last date of employment. In Germany, your letter must be handwritten; your employer is not obliged to accept a resignation communicated digitally (see: Civil Code (BGB) §623). Your notice period starts when your employer acknowledges they have received your resignation, not when it is delivered, so try and get it signed as soon as possible. Your letter should be kept brief, remain professional, and doesn’t require reasons for your resignation. Express that you have appreciated the opportunities provided by the position, including developing your skills, building on your knowledge of your sector, or responsibilities or challenges you have felt particularly proud of. When seeking to shorten your notice period, it is vital to mention your willingness to assist your employer with the transition period around you leaving the company. State those projects you will be able to complete within your notice period, and what you can do to help your handover process go smoothly. Be realistic about the outcomeWhile your employer might accept your suggested exit date straight away, it is unlikely to happen without a formal conversation. Once you both agree on a leaving date that is earlier than your contractual notice period, you can both sign an "Aufhebungsvertrag" or compromise agreement. This agreement will terminate your contract on a mutually agreed date that you want to leave. Be realistic when making suggestions. What is the earliest that you can leave while being considerate of their needs? Empathize with your current employer.Your resignation is likely to be a shock. After all, you are a brilliant employee who has a significant impact on the success of your business (no wonder that you’ve been snapped up hungrily by someone else). Immediately, your boss will be concerned about several factors including loss of valuable expertise, an increased workload for the rest of the team, the cost of finding a suitable replacement, and even the potential damage to their reputation. For this reason, it’s best to revisit the notice period a few days after the initial resignation when your boss will be further along the change curve. Next, it is time to show that you’re prepared to help mitigate any negative impact from your departure. You can formalise this as part of the aforementioned compromise agreement with your employer for agreeing to a shortened notice period. This type of contract can be agreed after discussing factors such as sourcing and training your successor or completing projects within a certain time frame.Source and suggest a replacementMost likely, your employer’s primary concern is filling your shoes. The best way to allay their concerns and to successfully negotiate your notice period is to help them find a replacement. After all, you’re the ultimate resource for knowing what a good replacement looks like! If you did your research and developed relationships throughout your time with the company, you most likely know who would want to be in your role and also who would be a good replacement for you. Whether they are in your team or another department, reach out and explain the job requirements and why you think they would make a great match. The nature of your role may have evolved since you started, so it is advised to draw up a new job description and requirements. They will appreciate the effort and you will show that you are willing to go the extra mile to make your exit as smooth as possible. Sharing the position with your wider network on LinkedIn will also show you are still an advocate for the company; alleviating their concerns about any possible damage to their reputation. If you need any specialist help, get in touch. Glocomms can source a temporary or permanent replacement.Prepare a thorough handover or ‘operating manual’As tempting as it may be to ‘wind down’ during a notice period, it is important to leave a job on good terms. This will involve a last extra push of effort in creating a comprehensive handover process between you and your replacement. Work alongside your boss to see how your work and responsibilities can be picked up by others on your team, and how you can help your replacement hit the ground running when they join the business. In a longer notice period, you may even have time to train your replacement on workplace processes and the details of your work. You can brief the new employee with important information about clients and project status. Helping with your transition period is a great way to end your role on a positive note, and lessen the effect of your departure on your company. It will be appreciated both by your supervisor and your company’s new hire, and can result in a glowing reference.Use your annual leaveNext to a proactive and considerate conversation with your employer, you might also be able to shorten your notice period through using up your outstanding annual leave for the rest of the year. This time can be offset against your notice, meaning you can take all of your remaining annual leave, effectively shortening your work days. Employers also find this compromise attractive, as they are obligated to pay you for outstanding leave. While this can reduce the awkwardness of lingering in the workplace, you’ll nevertheless be considered an employee. At Glocomms, we’ve also helped candidates wield their annual leave as a bargaining chip. By giving up their remaining annual leave, tech professionals have successfully traded the days or weeks for an earlier termination date – enabling them to get started in their exciting new role quickly.Good to knowThe employment relationship is governed and regulated by statutory laws, the contract, and any collective agreements with the works council or collective bargaining agreements with the union. You can visit the website of the German Federal Ministry of Justice and Consumer Protection for an overview of your employment rights. Securing your bonusFrom tech candidates, one of the most frequent concerns we hear is about securing their bonus during negotiation. You will doubtless expect to receive your bonus if you have worked a full year, or a pro-rata payment if you leave before the year’s end. However, most contracts have bonus clauses that state: You need to be employed at the bonus payment date and/orYou must not be working under notice It is important though, to pay attention to how your bonus is formulated within your contract. If your bonus is partly granted in recognition of your performance during the relevant financial year, then your employer is legally obliged to pay it. Accordingly, if you leave before the end of the financial or calendar year, you should receive a pro-rata bonus payment. If your bonus is in no way tied to your performance but as an incentive to stay with the company, then your employer can make the payment conditional on your employment contract not being under notice. Moreover, if you resign within a certain date of receiving such a bonus your employer can demand you pay it back, so keep this in mind during the process of terminating your employment. Note: The law around bonuses in Germany is constantly under review. Stay up-to-date.Next stepsAvoid negativityHanding in your notice does not mean you have free reign to openly complain about your job, or slack on your work entirely during your notice period. Even if you are leaving a difficult atmosphere, be respectful and mindful on how you communicate this. Keep your (soon to be former) colleagues in mind, who may be facing a more difficult time without your support. Offer to help them the best you can so you don’t leave them in a tight spot.When discussing your reasons for leaving, try and stay on positive subjects and instead emphasise the benefits of the current role, what you have learned and how it has helped your career. There is little to gain from being negative, but there is a lot to gain from leaving on good terms. Leave on good termsThe tech market is surprisingly small, so don’t burn bridges. You’ll never know when you run into an old boss or colleague again – and you may return to them in the future! If it is in-line with the company practices and culture, you may wish to send individual farewell messages to your team members thanking them for the specific support they have provided throughout your time in the role. Bear in mind not to exclude colleagues that you did not get along with; a neutral message wishing them all the best for the future will still be appreciated.Look to the futureAs a specialist recruitment partner, Glocomms is here to support you throughout your career journey, including transition periods. Get in touch with the team for personal advice. Take the next step in your careerGlocomms is a leading talent partner specializing in multiple sectors across Technology, Data Science and Cyber Security. View our range of job opportunities across a variety of rapidly-growing industries and register your CV.

Read More
Cyber Security Talent Insights Image
cyber-security

Cyber Security Talent Insights

​​The cyber security market is predicted to grow to $266 billion by 2027, but with opportunity comes many risks, disruptions and challenges. With skilled business-critical cyber security professionals in high demand, companies must develop effective hiring solutions to capitalize on the market and protect their systems, networks, and data against cyber attacks and security breaches.In this report, our technology talent experts at Glocomms guide you through:Key trends in cyber security, from market risks to hiring approachesTop priorities for candidates in the cyber security fieldInsights from Katie Owston, Associate Vice President at GlocommsKey takeaways and recommendations for both hiring managers and professionalsDownload your copy of the 'Cyber Security Talent Insights' report by completing the form below:​​

Read More
Performance over Presence Image
cloud-infrastructure

Performance over Presence

​For the past year, the high-speed mass adoption of flexible working required employers to redefine and re-examine the workplace. As expected, forward-thinking Tech and IT companies that embrace digital transformation were the ones that continued to thrive in this new environment. If flexible agility, cloud technology, and secure infrastructures are signs of permanent change, what does this mean for technology firms? ​Our latest Career Insight, ‘Performance over Presence’ offers an in-depth analysis into the hybrid-remote approach; a business model which intertwines remote with working present on-site. If the evolving experience-based hybrid approach is to be established, institutions may be likely to explore the potential benefits and caveats to this structure.Does the hybrid-remote model support workers and simultaneously avoid an eroding of company culture? How can leaders manage performance with geographically dispersed teams? Can hybrid working arrangements prevent a cacophony between employers and employees? At Glocomms, these are the questions that have defined our post-pandemic conversations. Perhaps, the hybrid-style approach allows employees to be part of an integrated strategy and offers a window into a more purpose-driven and brighter future for the workplace. ​

Read More
Cybersecurity Market Update Image
cyber-security

Cybersecurity Market Update

​Glocomms' insight on the 2018 Cybersecurity Landscape Across the End-User and Vendor ArenasIntroductionGlocomms was founded on the premise of Cybersecurity becoming the most in-demand and integral part of technology across all industries. In 2017, we saw a multitude of high-profile cyberattacks targeting various companies including Uber, Deloitte and Equifax with the most prominent attacks being WannaCry and Petya. Given the visibility on the cybersecurity market, Glocomms expects to see a large focus on hiring resources and talent to develop and elaborate the hardening of security practices. Such developments include in-house security operation centers (SOC), increased spending on the most innovative threat intelligence products and AI talent and the adoption of automation and cloud security practices in order to properly protect customer and employee data.​The consequences of insufficient security and data protection were recently highlighted by Facebook stocks sliding nearly 15% in a 36-hour window, off the back of an exposed global data breach. Such high profile examples prove that Cybersecurity has the attention of the global media platform and consequently, the market is tightening as the need for remediation in real-time is becoming absolutely imperative.​In order to provide this level of service on a 24x7x365, vendors and end users are adopting advanced solutions. The two main trends we have seen in the first quarter of 2018 have been the integration of Artificial Intelligence & Data Science coupled with the need for Automation & Cloud Security. ​AI/Data Science & Cloud AutomationOur recruitment business gives us a unique look into these trends, as our business model is comprised of two main pillars of focus: Cybersecurity and AI/Data Science. We see the perspective of urgent needs for specific skillsets, as well as the perspective of building expertise through seeking new challenges and career options through working with stealth-mode to IPO vendors as well as the world’s largest global end-users.​When considering the impact AI can have on Cyber, it is clear why artificial intelligence, machine learning and data science will have a huge impact on the ability for software to be able to detect and remediate intrusions and vulnerabilities. Nonetheless, it is who brings the expertise that affects how analytics will impact the industry given these will be the individuals building models to analyze and make sense of the data.​In order to understand the talent pool, we need to understand what motivates individuals to bring their experience to the cybersecurity industry. Most frequently, we see these professionals are motivated by the exposure to working with novel, proprietary, and in this case, unknown data. Additionally, not only the access and exposure to the data is compelling, but also the advanced decision making predictable by the data that draws this talent into the industry.​We have also seen increased attention on the automation and acceptance of risk adverse cloud usage cases, the adoption of MSSP’s that offer integrated threat analytics/ threat management solutions, and new industry trends that dive deeper into the impact AI can have on this ever-changing landscape across the vendor and end-user arenas.​Artificial intelligence, machine learning and data science are being leveraged in a variety of ways and can be exhibited by the huge influx of neural network and deep learning talent transition into the threat analytics arena. Given the sheer magnitude and significance of personal information embedded within the data across industries such as healthcare, financial services and commerce, it is no surprise that data scientists are excited about an opportunity to advance security solutions and play an impactful role on the business/product at large. We know from speaking to these professionals that it is the access and exposure to novel and unique data across the abovementioned industries that drive and motivate their career interests.​Given that Data Science/AI & Cybersecurity are the two focal points of our Glocomms business, it is exciting to see the transfusion of these emerging technology industries shaping the future of the entire technology landscape across all industries.​Investment BanksCloud security is currently the hottest trend from an end-user perspective. This trend is clear, given the activity we have seen across the finance industry as they move towards the adoption of specific usage cases for the various open source cloud platforms. This is exciting because these have historically been some of the most proprietarily kept platforms in the world – some banks even used proprietary coding languages to build their platform! In order to be comfortable with these offerings, the institutions now need to put together documentation on the risk assessments attributed to such solutions. Once these frameworks and usage-cases are clearly determined and outlined, offerings will begin to spread across more and more business units. Currently, large asset managers and global investment banks offer their clients a commercialized version of their front-office risk systems but this is only one portion of what the cross-business platform has to offer.​The next step will be providing an integrated and secure cloud-based solution across all layers of the risk management platforms that each of the various firms offer. Some banks are in the midst of developing a similar type of cross-business platform and although they may be scrutinized for their late-arrival to the party, it might work to their advantage given the new technology currently available because having an opportunity to build a platform from scratch using the latest and greatest products for hardening security layers and adopting cloud offerings allows for a more integrated and theoretically, hardened solution! It seems cloud security will be at the top of the list for most in-demand and least- attainable skill sets in 2018. This has already been evident given the vast hiring and increased compensation bands for cloud security professionals across the end-user arena. We believe the reason for this is these professional all need to not only bring the expert technical skills to the table, but also need to be able to communicate internally and externally with key stakeholders around usage cases for cloud offerings.​Buy-Side PerspectiveFrom a Buy-Side perspective, we have seen large global hedge fund clients looking to hire Encryption Engineers to build proprietary security layers into their existing infrastructure (often cloud-based). This is an obvious step in the right direction, given in the past it seemed many funds were scared by the prospects of putting their ‘secret sauce’ out in the cloud. Additionally, we have seen vast hiring across the Security Incident Event Management (SIEM) arena, most of whom, seem to be moving to Splunk given the versatility of the product. This is also consistent with what we have seen in Investment Banks this year.​From a recruitment standpoint, we see a huge amount of potential on the buy-side in 2018 and expect to see talents being directly targeted from the tech giants as these are the professionals with the most amount of exposure to novel data with the best skillsets for architectural remediation and hardening. ​Vendor PerspectiveAs the vendors continue to offer more and more comprehensive and integrated analytical solutions, the need to stay on top of the market and hire professionals that have experience with the most cutting-edge products becomes even more imperative. We have seen massive hiring across the vendor arena given the influx of investment and the urgent need for this analytical talent. The data being analyzed is ever-increasing and the adoption of AI is not quite keeping up with the workload for the SOC. Thus, we have still seen a steady stream of hiring within these types of positions including: threat hunters, incident responders and security engineers. Not only the vendors are hiring these professionals across the mid-senior level, but also the end-users are building their own in-house SOC’s to reinforce internal security measures creating more intelligent solutions on the network to detect vulnerabilities more quickly and readily. We have seen a large increase this year of around 20% higher than the industry standard this year in the compensation bands for someone with 3-5 years of experience with the abovementioned skills.​Glocomms’ cybersecurity recruitment practice is broken down across the vendor and end-user arenas as we have a commercial practice that offers talent solutions for our vendors across the entire product development lifecycle.As mentioned above, the adoption of intelligent threat hunting, incident response and vulnerability management has been clearly exhibited in a hiring trend of AI talent into the vendor and MSSP arena. ​Candidate TrendsAn interesting trend to note has been the movement of security professionals from the defense industry transition and partner with the financial services employees, in an attempt to continue to broaden the level of expertise and attention on security related problems. This talent is coming out of New York, Boston, Washington DC Metro Area, Texas, and California and heading to new security hubs forming in the Atlanta, South Carolina, Minneapolis and Colorado.Additionally, we have seen a large interest on the Financial Services side to hire talent from the Tech Giants given their background and exposure to massive amounts of data, enterprise level architecture, and forwards thinking technical skillsets.​Given the sheer magnitude of talent required, in the last 5 months, we have placed over 15 individuals for one Cybersecurity start-up that is still in stealth-mode on a retained basis! This project is ongoing and we expect to fill nearly 40+ roles this year with this one client given how perfectly our business models align, we have been able to deliver​Thus far in 2018 we have worked closely with a number of small to mid sized organizations (20-200 employees) on both Coasts undergoing large growth initiatives. Rapid growth is not uncommon for start-ups in this industry; these companies are primarily seeking analytical/AI talent, software engineers who are building their propriety platform and security professionals to advance the offerings. One interesting thing to note has been that security software engineers are receiving larger portions of equity given the impact their development of the platform will have on the multiplier attributed to the growth potential and in turn, value of the business.​For this type of endeavor we recommend a Multi-Hire Campaign (MHC) as we are able to best align our services with a companies specific and often urgent needs directly impacting our clients’ growth through an all-encompassing recruitment solution.​Many of our institutional clients are entirely revamping their security business units given the ever-changing nature of the available technology within the industry. As a result, we have staffed multiple senior, CISO/Strategic Leaders for our end-user clients whom will drive the growth initiatives going forward in 2018 and years to come. ​Mergers & AcquisitionsOur final cybersecurity market trend we wanted to highlight in this report corroborates the above with respect to focus and attention on new, cutting-edge, AI-driven threat management platforms. Security Vendors are being acquired by the big Tech Giants and large cyber players. The options are narrowing and the solutions are becoming far more comprehensive and integrated. Recent examples of this include: SQRRL were acquired by Amazon for $40 million; Phantom Cyber is being acquired by Splunk for $350 million; and CloudLock is bought by Cisco for $293 million. This showcases that the big-players are aware of the trends outlined above and are looking to eat up the market share and gain control of the growth and opportunity that is ravishing the emerging technologies marketplace. ​Diversity & InclusionDiversity and Inclusion awareness is at an all time high in the technology industry, with female representation and wage parity dominating the headlines. At Glocomms we find that identifying good practice, policies and initiatives to improve workforce diversity and inclusion are paramount for our clients. Throughout 2018, alongside our parent company, Phaidon International, we will be running a number of positive, action-orientated client events with relevant guest speakers and industry experts. The common themes of these initiatives will be to share pragmatic and proven successful practices that can tangibly improve diversity and inclusion within the workplace. By doing so our valued clients can enhance their access to wider talent pools for their meritocratic workplaces.​In relation to Cybersecurity – this is one of the most homogenized verticals within the technology arena and female-talent is highly scrutinized for being absent. Males hold 3 out of 4 jobs in tech, but specifically within cybersecurity, the numbers reflect that only 14% of the U.S. workforce in cybersecurity is female. [1] However, out of all of the areas within technology, we believe that Cybersecurity is the field that truly needs a diverse talent pool.​Working in Cybersecurity involves dealing with hugely complex issues and problems – teams need diversity so that problems are attacked with different viewpoints. At Glocomms we focus heavily on sourcing diverse talent within this field and working closely with our clients in creating a work environment to allow such talent to excel in their careers. In the past six months, 24% of the placements we have made in the Cybersecurity field are female. Whilst we still have a long way to go we are dedicated to doing our part to empower females to succeed in the industry.​In addition to females, Glocomms is committed to contributing to and being the driving force of change across all marginalized groups with respect to Diversity and Inclusion. Most recently, on March 24th, Glocomms was a sponsor for the second annual Out in Tech Talks[2], an event that united 400+ leading and aspiring LGBTQ+ and allied voices to advance the dialogue around diversity in tech and address the power of tech to create social change. It was an incredible event, showcasing the progress achieved while illuminating the massive amount of work left to do in reshaping the industry. Impressive panels included the leaders in Diversity and Inclusion at Amazon, Linked in and Youtube, an MD/Business Leader for the Cybersecurity business at a Leading Global Investment Bank and our own Executive Director at Glocomms.​Closing ThoughtsThis report was written and prepared by Giancarlo Hirsch, Vice President at Glocomms and accurate as of March 2018.​Glocomms has offices in NY and SF and is looking to launch offices in Boston, Chicago, Dallas and Charlotte in the coming 18 months. For more information or to get in touch with the team at Glocomms, please do reach out to usa@glocomms.com!​-------About UsGlocomms is a leading specialist recruitment agency for the technology sector. We were founded in 2013 to give clients and candidates peace of mind that the recruitment process is in expert hands. Our continual investment in best-in-class technologies and consultant training enables us to recruit with speed, precision and accuracy. Today, Glocomms provides contingency, retained search and project-based contract recruitment across our offices in San Francisco, New York, London and Berlin. Find out how Glocomms can help you.

Read More

Looking for something specific?

View more blogs