Cyber Security
We love solving problems, building better processes, and keeping things up and running. From crisis control to proactive planning, we provide expert guidance for your toughest cybersecurity challenges. Incident Response Training It's no secret that cybersecurity incidents are on the rise and with the increasing sophistication of attacks, it's only a matter of time before every organisation is targeted. Social Engineering Social engineering is the art of manipulating end users so they give up confidential information or credentials. Vulnerability Scanning Vulnerability scanning is an important part of any security program. Advanced Threat Hunting Threat hunting is an important part of an organisation’s cybersecurity strategy. APIs When it comes to keeping your software and applications secure, API penetration testing is an absolutely essential part of the equation. Mobile Applications As mobile devices become increasingly popular, so too does the need for mobile application security. Privacy: HIPAA, GDPR, CCPA When it comes to privacy, there are a lot of different acronyms and regulations to keep track of. User Awareness Training Security Awareness Training helps transform employees from being seen as cyber risks to organisations into a strong line of defense. Cloud Security Redundant, off-site backup is key for a successful disaster recovery plan and archival retention. We can help protect your organisation if disaster were to strike. Infrastructure Simulating real-world attacks, pen testing can help to identify vulnerabilities in a system before they can be exploited. Cyber Risk Assessments A comprehensive cyber risk assessment is essential to protect your business from cyber-crime. We believe that everyone has the right to cybersecurity, privacy and a thriving future. Let’s talk.
7-day free trial · no credit card
Verified contacts
200
available on Kipplo
LinkedIn employees
1.2K
11 to 50 range
Open roles
—
no listings
Distinct roles
556
indexed titles
Tech stack
2
tools in use
Monthly traffic
—
organic / mo
Sign up free to see all 200 verified contacts at Cyber Security
Free for 7 days · 50 credits · no card · only pay for verified records.
Decision-makers and verified team members
200 contacts with verified email or phone · masked until revealed.
- SJ
Steven Johnson
Production Manager · Manufacturing & Production
EmailPhone - JF
Jerrell Faulk
Govt Employee · Public Administration & Safety
EmailPhone - JB
John Bricker
Intelligence Opperative Ert Officer · Information Technology
EmailPhone - LO
Louis Oliveira
Goverment · Public Administration & Safety
EmailPhone - MT
Margaret Tildon
Classified · Information Technology
EmailPhone - MM
Mike Murphy
Investigator · Information Technology
EmailPhone - PK
Pete Knysz
Security Adviser · Public Administration & Safety
EmailPhone - SS
Stephen Strelick
Auto Technician · Engineering
EmailPhone - SR
Steven Robinson
Information Technology Specialist · Information Technology
EmailPhone
Showing 9 of 200 verified contacts
Top roles at Cyber Security
556 distinct titles indexed · top 10 shown.
- 11classified manager
- 11engineer
- 9manager
- 6ceo
- 6software engineer
- 5analyst
- 5cyber security analyst
- 5director
- 5investigator
- 5worker
- +546more titles
Sign up to unlock all 200 contacts at Cyber Security
Free for 7 days · 50 credits · no card · only pay for verified records.
Sign up to reveal 200 verified contacts at Cyber Security
7-day trial · no credit card · cancel anytime · only pay for verified records.
Trusted by sales, marketing, and GTM engineering teams.