Cyber Security

Cyber Security

Glocomms: Cyber Security recruitment

The world of Cyber Security is rapidly changing, and the demand for skilled professionals is increasing. Companies need to ensure their data and networks stay secure, and they are turning to the expertise of Cyber Security professionals to help them do just that.

Glocomms is your premier destination for top-notch cybersecurity talent, available for both permanent and freelance roles. Our adept consultants boast extensive knowledge of the cybersecurity landscape, enabling them to identify the ideal candidate tailored to your precise requirements. Whether you seek a permanent employee skilled in threat detection and response, network security, or cloud security, or a freelancer for short-term projects, our swift and efficient process ensures a perfect fit for your needs.

Our European based consultants are trained specialists in their fields, recruiting mid to senior level commercial talent across Cloud & infrastructure, Cyber Security, Big Data & Analytics, Fintech, Managed IT Service Providers, SaaS and more throughout the UK and Europe.

If you're a Cyber Security professional, please register your resume.

Register your CV

If you're looking for Cyber Security talent, please register your vacancy today.

Register your vacancy
or
Request a call back

Benefits of working with us

Our Cyber Security recruitment specialists support growing technology businesses source the right go-to-market strategy talent, manage the recruitment process and facilitate onboarding. With multi-lingual language support, we provide international recruitment expertise to secure business-critical talent across Europe.

Choose us for exceptional Cyber Security recruitment services, and watch your business thrive with the right talent by your side.

Our recruitment benefits

Experience

We have a decade’s worth ofCyber Securityexperience as a leading talent partner in Technology.

Network

A vast, global network of the best, in-demandCyber Securitytalent.

Knowledge

Our award-winning talent specialists offer bespoke, tailored guidance on the latest hiring trends.

Whether you seek swift placement for pivotal roles or aspire for strategic talent acquisition solutions, our arsenal of resources and proficiency ensures successful outcomes.Share your vacancy with us today.

Looking to hire? Request a call back

Cyber Security Jobs

Senior Network Security Engineer

A fast-growing bank is looking to bring on a Senior Network Security Engineer to play a leading role in their organization's security team. The position will own the administration of Palo Alto and Cisco Firewalls, Cisco ISE and Umbrella, with routing and switching as needed (<20%). Proficiency in Cloud Networking, SD-WAN, and Wireless, as well as professional certifications and financial services industry experience are preferred. Position is hybrid, based in Dallas, TX. Fully remote work may be possible for the right candidate. Compensation is negotiable, based on experience and interviews, likely in the range of $120k-$160k. If this role sounds like the right fit for the next step in your career, please apply to the ad!

US$120000 - US$160000 per year
Dallas
Apply

Lead Network Engineer, AI/LLM Automation

A global data and media company is looking to hire a Lead Engineer for their high-speed network infrastructure team. The position will lead a team of engineers who are supporting the growth of the AI/LLM platform using software-defined networking and software development. Required Skills: Programming in a major language: Python, C/C++, Go, etc. Proficiency in Networking Technologies, including Routing, Switching, and Security Strong exposure to high-speed networking systems and communication frameworks Software Development skills are required for this role Location: Santa Clara, CA - Remote slots are limited, but may be possible for the right candidate. Hybrid, 3 days in office Compensation: Compensation can be upward of 180k base for the right candidate, total package may exceed 400k for the best candidate. If this sounds like the right step for your career, please apply to the ad!

US$180000 - US$400000 per year
Santa Clara
Apply

Product Security Penetration Tester (Web Application)

A high-growth web-based company needs to expand the Product Security Penetration Testing team to secure and support the growth of one of the world's key internet platforms. Requirements: 5+ years of dedicated Penetration Testing, Application Security, and Product Security experience, with a focus on web-based applications Knowledge of SAST/DAST and multiple scanning tools to secure dozens of applications. Expert knowledge and ability to secure the software development life cycle Recent work experience with automation, ci/cd and devsecops principles Scripting/Programming or Development ability in a common language (proficiency may determine level) Willingness to grow and adapt as the platform scales significantly - it has seen transformative growth in the last 3 years that will continue Must have experience and a great interest in securing and pentesting specifically web applications Must be fully authorized to work in the US Nice to Have: Relevant Certifications Previous experience at a company or team pentesting over 100-200 applications per year Very strong development and automation experience may attain higher levelling Computer Science Education Background Location: Job Site is in Virginia, onsite policy is hybrid 3 days per week in the office Compensation There are multiple levels, based on experience and interviews, ranging from $140k base to over $200k base. Timeline This is New Role and Urgent Need for the security team, with selected candidates expected to complete interviews in June and and start in July, 2024.

US$140000 - US$200000 per year
Virginia
Apply

IT Security Consultant

IT Security Consultant Annecy, France - French and English Speaking 2 Days per Week on site Start Date : 02/09/2024 Long-Term Engagement on Rolling Contract (6-Months) TJM : 450-650€ Customer Details Our customer is one of the largest Winter Sports Groups in the world, they have around 10 brands within the group globally and have their European HQ's in Annecy and Munich with their team being split across the globe. They have had some investment in improving the quality and effectiveness of their Cyber Security so are looking to invest in a Security Expert to join their Risk Management and Secure by Design team. The company offers a great chance for a long-term engagement, a chance to work as part of an International team and a brilliant opportunity to be involved in the decision making and shaping of the companies future Cyber Security practises. Glocomms have worked with the customer for the last 4 years and have been responsible for numerous key hires into their business. Job Details Primary responsibilities will include working with all the departments across the business and consulting with them to advice on the best approaches when it comes to making sure they are compliant and proposing solutions to ensure the best practises are carried out. You will be working closely with the CISO team handling the topics around Cloud, Systems, eCommerce and Cyber Security and helping them to further build their team over the next few months. The ideal candidate will be someone from a technical background (Networking, Systems, SecOps) who has moved into a Cyber Security position under taking projects around Risk. Technical Knowledge : Risk Analysis, Risk Management, Public Cloud, Systems (Windows, Linux, VMware), Cyber Security (ISO 27000, CISSP) You will be joining a direct team of 4-5 people, which includes the CISO, Assistant CISO, a Security Architect and some more junior team members. Given the international context of the company, you will need a professional level of both English and French. Day to day French will be used but English will be used across the wider company. Great opportunity for this mission to last for close to 2 years, the roadmap dictates this at the moment. No certifications are a prerequisite but if you have a CISSP or any ISO certificates, it will certainly support your application. Get in Touch james.evans(@)glocomms.com +44 203 758 8905 https://www.linkedin.com/in/jamesevansglocomms/

€450 - €650 per day
Annecy
Apply

McAfee Web Gateway (SkyHigh) Engineer

McAfee Web Gateway (SkyHigh) Engineer Paris 17 - French and English Speaking 2 Days per Week on site Start Date : 24/06/2024 3-Year Mission on a Rolling Contract TJM : 500-800€ Customer Details Our customer is one of the World's biggest Insurance Groups who are based out of Central Paris - they have a global reach with teams based in Germany, Belgium, UK, Spain, Portugal, APAC and North America. Due to an increased demand in project work load and a transformation of their Infrastructure the customer is looking to add TWO external contractors to the team. The customer offers a fantastic opportunity for a long-term engagement, aswell as flexible on-site working and the chance to shape their Methodology and Practises for years to come! Glocomms have worked with the customer for the last 3 years and we have been responsible for over 30 placements into their Network, Cyber Security and Systems teams during this time! Job Details McAfee Web Gateway (SkyHigh) Engineer Primary responsibilities will include Technically advise and support SWA Product management on the ownership and definition of the Product Strategy, roadmap and lifecycle to ensure to serve the security objectives Technically advise, lead and support technical discussion with Group security related to any topics related to the product Technically advise, lead and support any technical activity and improvement that may be set up on the proxy product and related to: Policy configurations, Security reports requirement, Performance improvement, Automation, New additional features, Service management To challenge and lead technical discussion with the vendor for topics as service request, or incident ticket, or improvement plan or new feature, etc. To support and advise the BAU service provider on some level 3 activities and work closely with their L2 support teams to technically lead and advise them on their daily activities To support, lead and manage incidents resolution related to web gateway daily operations. Support and technically advise on new customer's demands and assess the technical sets-up on proxy configurations to answer the need To technically advise, lead and support the standards definitions Prepare technical documentations and procedures to support the overall projects and BAU teams Analyze user or application internet activities for security purpose. Analyze user or application internet activities for performance improvement. To head up on the integration of the web gateway product with the overall environment Webgateways security role and key design. McAfee webgateway solution on premise & cloud Migrating users from on premise proxy to McAfee web gateways Cloud solution. Tech Stack : Experience on Network and Security Technologies, Strong experience on McAfee WebGateway (SkyHigh) solution as well as other security products is a plus Get in Touch james.evans(@)glocomms.com +44 203 758 8905 https://www.linkedin.com/in/jamesevansglocomms/

€500 - €800 per day
Paris
Apply

VP of Information Security

Calabasas, CA or San Diego, CA (Hybrid-Flexible) Glocomms is partnered with a dynamic and rapidly growing e-commerce company committed to providing its customers with exceptional service and innovative products. The client is seeking a highly skilled and experienced Head of Information Security to lead efforts in safeguarding its digital assets, ensuring compliance, and maintaining the highest standards of security. The technology stack is predominantly based on Microsoft technologies and primarily utilizes AWS for cloud infrastructure. Position Overview: The Head of Information Security will be responsible for overseeing all aspects of information security, including incident response, bug bounty programs, vulnerability remediation, and compliance. This leadership role requires a strategic thinker with a hands-on approach, capable of managing and developing a high-performing security team. The successful candidate will have a proven track record in information security within the e-commerce sector or a similar fast-paced environment, with strong experience in a Microsoft tech stack and AWS cloud infrastructure. Key Responsibilities: Leadership and Strategy: Develop and implement the overall information security strategy aligned with business objectives. Lead and manage a team of three information security professionals, fostering a culture of security awareness and continuous improvement. Provide strategic guidance to executive leadership on security initiatives and risk management. Incident Response: Oversee the incident response program, ensuring swift and effective handling of security incidents. Coordinate incident response efforts, including investigation, containment, eradication, recovery, and post-incident analysis. Develop and maintain incident response plans, playbooks, and runbooks. Bug Bounty and Vulnerability Remediation: Establish and manage a bug bounty program to incentivize external security researchers. Oversee vulnerability management processes, including regular scanning, assessment, and remediation of security vulnerabilities. Collaborate with development and operations teams to ensure timely and effective remediation of identified vulnerabilities. Compliance and Governance: Ensure compliance with relevant regulations, standards, and frameworks (e.g., PCI-DSS, GDPR, CCPA). Develop and maintain security policies, procedures, and documentation. Conduct regular security audits and assessments to ensure compliance and identify areas for improvement. Risk Management: Identify, assess, and manage information security risks across the organization. Implement and maintain security controls to mitigate identified risks. Develop and deliver security awareness training programs for employees. Technology and Innovation: Stay current with emerging security trends, threats, and technologies. Evaluate and implement new security tools and technologies to enhance the security posture. Collaborate with IT and engineering teams to integrate security into the software development lifecycle (SSDLC). Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree preferred. 10+ years of experience in information security, with at least 5 years in a leadership role. Proven experience in incident response, vulnerability management, and compliance within an e-commerce or similar environment. Strong knowledge of security standards, regulations, and best practices (e.g., PCI-DSS, GDPR, CCPA). Extensive experience with a Microsoft tech stack, including Windows Server, Active Directory, and related technologies. Strong experience with AWS or Azure cloud infrastructure. Excellent leadership, communication, and interpersonal skills. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. All employees are required to be vaccinated against Covid-19 - reasonable accommodation requests will be considered. Benefits: Competitive salary and performance-based bonuses Comprehensive health, dental, and vision insurance 401(k) with company match Generous paid time off and holiday schedule Employee discounts for company products This is a hybrid position; employees are expected to be in the office three days per week (Monday, Tuesday, and Thursday) with the option of working remotely two days (Wednesday and Friday).

US$250000 - US$270000 per year
San Diego
Apply

VP of Information Security

Calabasas, CA or San Diego, CA (Hybrid-Flexible) Glocomms is partnered with a dynamic and rapidly growing e-commerce company committed to providing its customers with exceptional service and innovative products. The client is seeking a highly skilled and experienced Head of Information Security to lead efforts in safeguarding its digital assets, ensuring compliance, and maintaining the highest standards of security. The technology stack is predominantly based on Microsoft technologies and primarily utilizes AWS for cloud infrastructure. Position Overview: The Head of Information Security will be responsible for overseeing all aspects of information security, including incident response, bug bounty programs, vulnerability remediation, and compliance. This leadership role requires a strategic thinker with a hands-on approach, capable of managing and developing a high-performing security team. The successful candidate will have a proven track record in information security within the e-commerce sector or a similar fast-paced environment, with strong experience in a Microsoft tech stack and AWS cloud infrastructure. Key Responsibilities: Leadership and Strategy: Develop and implement the overall information security strategy aligned with business objectives. Lead and manage a team of three information security professionals, fostering a culture of security awareness and continuous improvement. Provide strategic guidance to executive leadership on security initiatives and risk management. Incident Response: Oversee the incident response program, ensuring swift and effective handling of security incidents. Coordinate incident response efforts, including investigation, containment, eradication, recovery, and post-incident analysis. Develop and maintain incident response plans, playbooks, and runbooks. Bug Bounty and Vulnerability Remediation: Establish and manage a bug bounty program to incentivize external security researchers. Oversee vulnerability management processes, including regular scanning, assessment, and remediation of security vulnerabilities. Collaborate with development and operations teams to ensure timely and effective remediation of identified vulnerabilities. Compliance and Governance: Ensure compliance with relevant regulations, standards, and frameworks (e.g., PCI-DSS, GDPR, CCPA). Develop and maintain security policies, procedures, and documentation. Conduct regular security audits and assessments to ensure compliance and identify areas for improvement. Risk Management: Identify, assess, and manage information security risks across the organization. Implement and maintain security controls to mitigate identified risks. Develop and deliver security awareness training programs for employees. Technology and Innovation: Stay current with emerging security trends, threats, and technologies. Evaluate and implement new security tools and technologies to enhance the security posture. Collaborate with IT and engineering teams to integrate security into the software development lifecycle (SSDLC). Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree preferred. 10+ years of experience in information security, with at least 5 years in a leadership role. Proven experience in incident response, vulnerability management, and compliance within an e-commerce or similar environment. Strong knowledge of security standards, regulations, and best practices (e.g., PCI-DSS, GDPR, CCPA). Extensive experience with a Microsoft tech stack, including Windows Server, Active Directory, and related technologies. Strong experience with AWS or Azure cloud infrastructure. Excellent leadership, communication, and interpersonal skills. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. All employees are required to be vaccinated against Covid-19 - reasonable accommodation requests will be considered. Benefits: Competitive salary and performance-based bonuses Comprehensive health, dental, and vision insurance 401(k) with company match Generous paid time off and holiday schedule Employee discounts for company products This is a hybrid position; employees are expected to be in the office three days per week (Monday, Tuesday, and Thursday) with the option of working remotely two days (Wednesday and Friday).

US$250000 - US$270000 per year
Calabasas
Apply

Web Application Penetration Tester

Glocomms are partnered with a global leader in the online Real Estate market in the search for a Web Application Penetration Tester to join the Product Security division focusing on utilizing threat modeling, grey box penetration testing, and white box application security analysis. Key responsibility: Collaborate with Product and Software teams to ensure apps are created and implemented accordingly throughout the SDLC lifecycle. Conduct penetration tests on WebApps and infrastructure using both manual and automated techniques. Create an automated framework to improve AppSec controls supporting 100+ applications. Utilize a number of AppSec tools (SAST, DAST, Credential Scanning, ICA, SCA, etc.) to secure web applications. Identify risks and vulnerabilities and provide remediation POA&Ms. Develop automation methods to gather feedback and generate re-scanning. Create secure coding standards and training/support covering the firms' technologies and application frameworks. Conduct code reviews and provide recommendations to improve quality of code. Qualifications: Bachelor's degree from an accredited college/university in Computer Science, Cyber Security, or a related field. 6+ years of experience in Cyber Security with at least 3+ years of experience in a Penetration Testing/Red Teaming focused role. Experience designing, implementing and operation SDLC. Strong experience with defense-in-depth strategy. Hands-on programming skills in Python, C# (preferred), PowerShell, Java, Perl, GoLang, .NET, API Integration, C/C++, etc. Experience automating CI/CD pipelines and IDE interfaces such as SAST and SCA solutions including AppScan, Veracode, X-Ray, Synk, or Synopsys. Penetration testing certifications (OSWA/OSWE, OSCP/OSCE, GPEN, GXPN, GCPN, etc.).

US$190000 - US$210000 per year
Washington
Apply

DevSecOps Engineer

Locations: Washington, DC Metro Area or Richmond, VA Environment: Hybrid - 3 days onsite / 2 days remote per week. Glocomms is partnered with a real estate analytics pioneer dedicated to transforming the industry through digital innovation - enabling people to uncover properties, insights, and connections that enhance their business and personal lives. The client's portfolio includes over 75 other platforms and high-traffic web applications. The firm's robust platform security environment incorporates both commercial and custom-developed security controls across various platforms, including IDEs, CI/CD systems, cloud, and Kubernetes. The DevSecOps Engineer will contribute to a team employing infrastructure as code, scripting, and API integrations to implement scalable security measures consistently across all web applications. The position may range from associate to lead architect level. Primary Responsibilities: As part of our dynamic team, you will be responsible for building and advancing features of our product platform security suite, including: Providing real-time vulnerability feedback within IDEs for insecure build patterns and artifacts (including first-party code, third-party code, containers, infrastructure as code, and secrets) Enforcing vulnerability remediation SLAs during environment builds Conducting dynamic runtime scans of pre-production environments to prevent vulnerabilities from reaching production Performing continuous attack surface management, penetration testing, and exploit validation Managing cloud security posture and workload protection Ensuring security for cloud IAM and Kubernetes runtime controls Conducting cloud platform threat hunting and API security management Implementing WAF and Bot controls Integrating runtime/drift vulnerability feedback into product development teams' bug tracking systems Enhancing federated cloud security hardening, detection, and enforcement Managing data security posture Identifying and addressing secrets and sensitive data leakage in logs, code, and documentation Qualifications: Bachelor's degree from an accredited institution, preferably in Computer Science, Cybersecurity, or a related field Proven track record of dedication to previous employers 3+ of experience in applying security at scale within CI/CD systems, Kubernetes platforms, cloud environments, or CDNs Proficiency in scripting or infrastructure as code using Python, PowerShell, Ansible, CloudFormation, Terraform, or similar languages Experience in a software development environment with mature CI/CD practices Strong passion for solving complex challenges, innovating, and being deeply engaged in your work Excellent communication skills, capable of engaging with both software development teams and leadership Thorough understanding of various security assessment tools Knowledge of infrastructure operations, including databases, networking, and system administration Ability to convey risk and urgency for remediation to different levels of leadership Capability to mentor and guide team members in prioritizing security efforts effectively Self-starter with the initiative to advance the application security program and follow through on ideas to completion Hands-on experience integrating security tools into CI/CD pipelines Experience with testing serverless cloud deployments Benefits and Perks: The client offers competitive compensation and performance-based incentives along with professional and academic growth opportunities including internal training, tuition reimbursement, and an inter-office exchange program. The comprehensive benefits package includes: Medical, vision, dental, and prescription drug coverage Life, legal, and supplementary insurance Mental health counseling services, both virtual and in-person, for individuals and families Commuter and parking benefits 401(k) retirement plan with matching contributions Employee stock purchase plan Paid time off Tuition reimbursement Access to onsite fitness centers or reimbursement for fitness center memberships, with options for yoga, personal training, and group exercise classes Complimentary gourmet coffee, tea, hot chocolate, fresh fruit, and healthy snacks All qualified candidates eligible to work full-time in the United States are encouraged to apply. Unfortunately visa sponsorship (including F1-OPT) is not available for this position. Candidates seeking C2C/C2H employment will not be considered. Interested candidates must be willing to work a HYBRID (3 days/week onsite) schedule to be considered for this position. **Company is an Equal Employment Opportunity Employer. The firm maintains a drug-free workplace and conducts pre-employment substance abuse testing.**

Negotiable
Washington
Apply

DevSecOps Engineer

Locations: Washington, DC Metro Area or Richmond, VA Environment: Hybrid - 3 days onsite / 2 days remote per week. Glocomms is partnered with a real estate analytics pioneer dedicated to transforming the industry through digital innovation - enabling people to uncover properties, insights, and connections that enhance their business and personal lives. The client's portfolio includes over 75 other platforms and high-traffic web applications. The firm's robust platform security environment incorporates both commercial and custom-developed security controls across various platforms, including IDEs, CI/CD systems, cloud, and Kubernetes. The DevSecOps Engineer will contribute to a team employing infrastructure as code, scripting, and API integrations to implement scalable security measures consistently across all web applications. The position may range from associate to lead architect level. Primary Responsibilities: As part of our dynamic team, you will be responsible for building and advancing features of our product platform security suite, including: Providing real-time vulnerability feedback within IDEs for insecure build patterns and artifacts (including first-party code, third-party code, containers, infrastructure as code, and secrets) Enforcing vulnerability remediation SLAs during environment builds Conducting dynamic runtime scans of pre-production environments to prevent vulnerabilities from reaching production Performing continuous attack surface management, penetration testing, and exploit validation Managing cloud security posture and workload protection Ensuring security for cloud IAM and Kubernetes runtime controls Conducting cloud platform threat hunting and API security management Implementing WAF and Bot controls Integrating runtime/drift vulnerability feedback into product development teams' bug tracking systems Enhancing federated cloud security hardening, detection, and enforcement Managing data security posture Identifying and addressing secrets and sensitive data leakage in logs, code, and documentation Qualifications: Bachelor's degree from an accredited institution, preferably in Computer Science, Cybersecurity, or a related field Proven track record of dedication to previous employers 3+ of experience in applying security at scale within CI/CD systems, Kubernetes platforms, cloud environments, or CDNs Proficiency in scripting or infrastructure as code using Python, PowerShell, Ansible, CloudFormation, Terraform, or similar languages Experience in a software development environment with mature CI/CD practices Strong passion for solving complex challenges, innovating, and being deeply engaged in your work Excellent communication skills, capable of engaging with both software development teams and leadership Thorough understanding of various security assessment tools Knowledge of infrastructure operations, including databases, networking, and system administration Ability to convey risk and urgency for remediation to different levels of leadership Capability to mentor and guide team members in prioritizing security efforts effectively Self-starter with the initiative to advance the application security program and follow through on ideas to completion Hands-on experience integrating security tools into CI/CD pipelines Experience with testing serverless cloud deployments Benefits and Perks: The client offers competitive compensation and performance-based incentives along with professional and academic growth opportunities including internal training, tuition reimbursement, and an inter-office exchange program. The comprehensive benefits package includes: Medical, vision, dental, and prescription drug coverage Life, legal, and supplementary insurance Mental health counseling services, both virtual and in-person, for individuals and families Commuter and parking benefits 401(k) retirement plan with matching contributions Employee stock purchase plan Paid time off Tuition reimbursement Access to onsite fitness centers or reimbursement for fitness center memberships, with options for yoga, personal training, and group exercise classes Complimentary gourmet coffee, tea, hot chocolate, fresh fruit, and healthy snacks All qualified candidates eligible to work full-time in the United States are encouraged to apply. Unfortunately visa sponsorship (including F1-OPT) is not available for this position. Candidates seeking C2C/C2H employment will not be considered. Interested candidates must be willing to work a HYBRID (3 days/week onsite) schedule to be considered for this position. **Company is an Equal Employment Opportunity Employer. The firm maintains a drug-free workplace and conducts pre-employment substance abuse testing.**

Negotiable
Richmond
Apply

Cyber Security Engineer

Title: Cyber Security Engineer. Location: Minneapolis, MI Compensation: Open/Competitive Glocomms are partnered with a global boutique Hedge Fund in the search for an experienced Cyber Security Engineer to join a new division focused on Enterprise Infrastructure Security. In this role you will focus on creating policies for the cloud security environment (Azure), general IT infrastructure, and SecOps, whilst implementing and maintaining security systems. Key responsibilities: Create security policies, procedures, and standards in line with industry best practices and regulations. Conduct vulnerability and patch management. Spearhead incident response activities. Create and implement security architecture for networks, systems, applications, whilst ensuring compliance standards are adhered to. Ensure regular penetration testing is conducted whilst maintaining/upgrading network protocols, intrusion detection and response, firewalls, endpoints, and mitigation of security risks. Qualifications: 7+ years of experience in Security Infrastructure Engineering/Architecture. Experience working in a secure Windows/Linux environment as well as security related operating systems. Experience working on cloud security and SaaS application posture hardening. Knowledge of firewalls, network protocols, IAM, endpoints, pen-testing, and the security risk/threat landscape. Excellent communication skills.

US$150000 - US$200000 per year
Minneapolis
Apply

Product Security Engineer

Location: Manhattan (Midtown) | 100% Onsite Overview: Glocomms is partnered with a premier quantitative hedge fund dedicated to leveraging advanced mathematical models and cutting-edge technology to achieve superior investment performance. The new Product Security Engineer role is critical in ensuring the security and integrity of the firm's trading platforms and products. The ideal candidate will have strong knowledge of Secure Software Development Life Cycle (SSDLC) practices and excellent programming skills. This position will work closely with development teams to integrate security throughout the development process, proactively identifying and mitigating potential security risks. Key Responsibilities: Collaborate with development teams to integrate security best practices into the SDLC. Conduct threat modeling, security reviews, and code audits to identify and address security vulnerabilities. Develop and implement security requirements, guidelines, and standards for our products and systems. Perform static and dynamic analysis of code to identify and remediate security issues. Design and implement security features and controls to protect sensitive data and systems. Monitor and respond to security incidents and alerts, conducting root cause analysis and implementing corrective actions. Provide technical guidance and training to development teams on secure coding practices and security tools. Stay current with emerging security threats, vulnerabilities, and industry best practices. Qualifications: Bachelor's or Master's degree in Computer Science or a related technical field. 4-7 years of experience in product security or a related role. Proficient in one or more programming languages (e.g., Python, Java, C++, Go). Experience with security tools and technologies (e.g., static analysis tools, dynamic analysis tools, penetration testing tools). Strong understanding of common security vulnerabilities and attack vectors (e.g., OWASP Top Ten). Experience with cloud security (e.g., AWS, Azure, GCP) and container security (e.g., Docker, Kubernetes). Excellent problem-solving skills and attention to detail. Strong communication and collaboration skills, with the ability to work effectively in a fast-paced environment. Preferred Qualifications: Relevant security certifications (e.g., CISSP, CEH, OSCP) are a plus. Experience in the financial services or trading industry is preferred. Knowledge of cryptographic principles and practices. Benefits: Competitive salary and performance-based bonuses Comprehensive health, dental, and vision insurance Retirement savings plan with company match Professional development opportunities Collaborative and innovative work environment This is an opportunity to join a team of world-class professionals who continuously push the boundaries of quantitative finance, making this coveted Manhattan office space a dynamic and exciting place to work. This role is located in the firm's Midtown Manhattan office, close to Grand Central Station for easy commuting within the New York Metropolitan Area. Candidates must be willing to work on-site 5 days per week. Full-Time, Direct Hire only (no C2C/C2H). Resumes must include first and last name and contact information to be considered.

US$175000 - US$250000 per year
New York
Apply

News & Insights

A Guide to Negotiating Your Notice Period Image
cyber-security

A Guide to Negotiating Your Notice Period

​In Germany, the average notice period is 3 months but can be as long as 6 months. There is a good reason behind this - to protect your rights as an employee in case of redundancy or termination. However, while a notice period should be treated with respect, there might be situations where proactively discussing your leaving date with your employer could be of benefit for you as well as both your current and future employers. This guide provides you an overview of factors to consider in this context and guidelines on how to professionally navigate the process.Benefits of shortening your notice periodThere may be several reasons for wanting to leave your current employer earlier, including to:Avoid awkwardness in the workplaceThere is a reason for the maxim, “Always leave the party when you’re still having fun.” The longer you stay, the more chance for things to sour. The last thing you want is to feel like a guest who has outstayed their welcome. You want to be remembered as a great employee who made a fantastic contribution to the success of your current employer, while you were there. Simultaneously, it is in the interest of your current employer and colleagues to maintain a harmonious work environment. Stay interested in your current workInevitably, once you have told an employer you plan to leave, they might start removing you from important projects. They may even place you on gardening leave if you are going to a competitor. Companies use gardening leave as a protectionist measure to ensure that the departure of senior executives has minimal impact on their reputation and success. But as an employee, a lengthened period of less responsibility in your current position or complete time away from the job might have a negative effect on your motivation. Gain a higher salary or better career experience soonerThere is a reason that you are embarking on a new job. Whether it is the chance to work for a specific company, on an incredible project, in a unique role that only comes once in a blue moon, or simply for a higher salary – something attracted you to go. The sooner you leave, the sooner you begin the next stage of your career. Whether it’s a new gadget or a new job, our brains are hardwired to seek new stimulus. A new job offers a huge amount of novel stimuli, but the longer you have to ruminate on it, the less exciting it might seem. Exiting within a reasonable time frame might help you to capitalize on the excitement of just having secured a new job.Have cross-over with your incumbentGenerally speaking, the more time you are able to spend with your predecessor in your new role, the more valuable information you will be able to acquire. No-one else will be a greater foundation of knowledge regarding the role ahead. They will also be able to define the rest of your team’s organisational structure. Furthermore, by building a rapport, not only will you build your reputation within the new firm, you might also be able to ask for their advice, if you ever face a difficult situation regarding the position in the future.How to negotiate your noticeAs the notice period is usually part of your official employment contract that has to be respected, it is not a simple conversation you have with your employer in passing. Proactively seeking a discussion while considering all of the following factors will demonstrate your respect for your current employer and underline your professionalism.Know your contract inside and out To avoid any unwelcome surprises, you need to know the terms of your employment inside and out. Check for any specific exit clauses, anti-competition clauses, and any clauses regarding your bonus or training repayments. Properly prepared, you’ll be in the best position to competently negotiate terms and understand what the best outcome can be.Hand in a formal resignationUsually, all you need to resign is a one-line letter letting your employer know your intention to resign, your official and preferred last date of employment. In Germany, your letter must be handwritten; your employer is not obliged to accept a resignation communicated digitally (see: Civil Code (BGB) §623). Your notice period starts when your employer acknowledges they have received your resignation, not when it is delivered, so try and get it signed as soon as possible. Your letter should be kept brief, remain professional, and doesn’t require reasons for your resignation. Express that you have appreciated the opportunities provided by the position, including developing your skills, building on your knowledge of your sector, or responsibilities or challenges you have felt particularly proud of. When seeking to shorten your notice period, it is vital to mention your willingness to assist your employer with the transition period around you leaving the company. State those projects you will be able to complete within your notice period, and what you can do to help your handover process go smoothly. Be realistic about the outcomeWhile your employer might accept your suggested exit date straight away, it is unlikely to happen without a formal conversation. Once you both agree on a leaving date that is earlier than your contractual notice period, you can both sign an "Aufhebungsvertrag" or compromise agreement. This agreement will terminate your contract on a mutually agreed date that you want to leave. Be realistic when making suggestions. What is the earliest that you can leave while being considerate of their needs? Empathize with your current employer.Your resignation is likely to be a shock. After all, you are a brilliant employee who has a significant impact on the success of your business (no wonder that you’ve been snapped up hungrily by someone else). Immediately, your boss will be concerned about several factors including loss of valuable expertise, an increased workload for the rest of the team, the cost of finding a suitable replacement, and even the potential damage to their reputation. For this reason, it’s best to revisit the notice period a few days after the initial resignation when your boss will be further along the change curve. Next, it is time to show that you’re prepared to help mitigate any negative impact from your departure. You can formalise this as part of the aforementioned compromise agreement with your employer for agreeing to a shortened notice period. This type of contract can be agreed after discussing factors such as sourcing and training your successor or completing projects within a certain time frame.Source and suggest a replacementMost likely, your employer’s primary concern is filling your shoes. The best way to allay their concerns and to successfully negotiate your notice period is to help them find a replacement. After all, you’re the ultimate resource for knowing what a good replacement looks like! If you did your research and developed relationships throughout your time with the company, you most likely know who would want to be in your role and also who would be a good replacement for you. Whether they are in your team or another department, reach out and explain the job requirements and why you think they would make a great match. The nature of your role may have evolved since you started, so it is advised to draw up a new job description and requirements. They will appreciate the effort and you will show that you are willing to go the extra mile to make your exit as smooth as possible. Sharing the position with your wider network on LinkedIn will also show you are still an advocate for the company; alleviating their concerns about any possible damage to their reputation. If you need any specialist help, get in touch. Glocomms can source a temporary or permanent replacement.Prepare a thorough handover or ‘operating manual’As tempting as it may be to ‘wind down’ during a notice period, it is important to leave a job on good terms. This will involve a last extra push of effort in creating a comprehensive handover process between you and your replacement. Work alongside your boss to see how your work and responsibilities can be picked up by others on your team, and how you can help your replacement hit the ground running when they join the business. In a longer notice period, you may even have time to train your replacement on workplace processes and the details of your work. You can brief the new employee with important information about clients and project status. Helping with your transition period is a great way to end your role on a positive note, and lessen the effect of your departure on your company. It will be appreciated both by your supervisor and your company’s new hire, and can result in a glowing reference.Use your annual leaveNext to a proactive and considerate conversation with your employer, you might also be able to shorten your notice period through using up your outstanding annual leave for the rest of the year. This time can be offset against your notice, meaning you can take all of your remaining annual leave, effectively shortening your work days. Employers also find this compromise attractive, as they are obligated to pay you for outstanding leave. While this can reduce the awkwardness of lingering in the workplace, you’ll nevertheless be considered an employee. At Glocomms, we’ve also helped candidates wield their annual leave as a bargaining chip. By giving up their remaining annual leave, tech professionals have successfully traded the days or weeks for an earlier termination date – enabling them to get started in their exciting new role quickly.Good to knowThe employment relationship is governed and regulated by statutory laws, the contract, and any collective agreements with the works council or collective bargaining agreements with the union. You can visit the website of the German Federal Ministry of Justice and Consumer Protection for an overview of your employment rights. Securing your bonusFrom tech candidates, one of the most frequent concerns we hear is about securing their bonus during negotiation. You will doubtless expect to receive your bonus if you have worked a full year, or a pro-rata payment if you leave before the year’s end. However, most contracts have bonus clauses that state: You need to be employed at the bonus payment date and/orYou must not be working under notice It is important though, to pay attention to how your bonus is formulated within your contract. If your bonus is partly granted in recognition of your performance during the relevant financial year, then your employer is legally obliged to pay it. Accordingly, if you leave before the end of the financial or calendar year, you should receive a pro-rata bonus payment. If your bonus is in no way tied to your performance but as an incentive to stay with the company, then your employer can make the payment conditional on your employment contract not being under notice. Moreover, if you resign within a certain date of receiving such a bonus your employer can demand you pay it back, so keep this in mind during the process of terminating your employment. Note: The law around bonuses in Germany is constantly under review. Stay up-to-date.Next stepsAvoid negativityHanding in your notice does not mean you have free reign to openly complain about your job, or slack on your work entirely during your notice period. Even if you are leaving a difficult atmosphere, be respectful and mindful on how you communicate this. Keep your (soon to be former) colleagues in mind, who may be facing a more difficult time without your support. Offer to help them the best you can so you don’t leave them in a tight spot.When discussing your reasons for leaving, try and stay on positive subjects and instead emphasise the benefits of the current role, what you have learned and how it has helped your career. There is little to gain from being negative, but there is a lot to gain from leaving on good terms. Leave on good termsThe tech market is surprisingly small, so don’t burn bridges. You’ll never know when you run into an old boss or colleague again – and you may return to them in the future! If it is in-line with the company practices and culture, you may wish to send individual farewell messages to your team members thanking them for the specific support they have provided throughout your time in the role. Bear in mind not to exclude colleagues that you did not get along with; a neutral message wishing them all the best for the future will still be appreciated.Look to the futureAs a specialist recruitment partner, Glocomms is here to support you throughout your career journey, including transition periods. Get in touch with the team for personal advice. Take the next step in your careerGlocomms is a leading talent partner specializing in multiple sectors across Technology, Data Science and Cyber Security. View our range of job opportunities across a variety of rapidly-growing industries and register your CV.

Read More
Cyber Security Talent Insights Image
cyber-security

Cyber Security Talent Insights

​​The cyber security market is predicted to grow to $266 billion by 2027, but with opportunity comes many risks, disruptions and challenges. With skilled business-critical cyber security professionals in high demand, companies must develop effective hiring solutions to capitalize on the market and protect their systems, networks, and data against cyber attacks and security breaches.In this report, our technology talent experts at Glocomms guide you through:Key trends in cyber security, from market risks to hiring approachesTop priorities for candidates in the cyber security fieldInsights from Katie Owston, Associate Vice President at GlocommsKey takeaways and recommendations for both hiring managers and professionalsDownload your copy of the 'Cyber Security Talent Insights' report by completing the form below:​​

Read More
Performance over Presence Image
cloud-infrastructure

Performance over Presence

​For the past year, the high-speed mass adoption of flexible working required employers to redefine and re-examine the workplace. As expected, forward-thinking Tech and IT companies that embrace digital transformation were the ones that continued to thrive in this new environment. If flexible agility, cloud technology, and secure infrastructures are signs of permanent change, what does this mean for technology firms? ​Our latest Career Insight, ‘Performance over Presence’ offers an in-depth analysis into the hybrid-remote approach; a business model which intertwines remote with working present on-site. If the evolving experience-based hybrid approach is to be established, institutions may be likely to explore the potential benefits and caveats to this structure.Does the hybrid-remote model support workers and simultaneously avoid an eroding of company culture? How can leaders manage performance with geographically dispersed teams? Can hybrid working arrangements prevent a cacophony between employers and employees? At Glocomms, these are the questions that have defined our post-pandemic conversations. Perhaps, the hybrid-style approach allows employees to be part of an integrated strategy and offers a window into a more purpose-driven and brighter future for the workplace. ​

Read More
Cybersecurity Market Update Image
cyber-security

Cybersecurity Market Update

​Glocomms' insight on the 2018 Cybersecurity Landscape Across the End-User and Vendor ArenasIntroductionGlocomms was founded on the premise of Cybersecurity becoming the most in-demand and integral part of technology across all industries. In 2017, we saw a multitude of high-profile cyberattacks targeting various companies including Uber, Deloitte and Equifax with the most prominent attacks being WannaCry and Petya. Given the visibility on the cybersecurity market, Glocomms expects to see a large focus on hiring resources and talent to develop and elaborate the hardening of security practices. Such developments include in-house security operation centers (SOC), increased spending on the most innovative threat intelligence products and AI talent and the adoption of automation and cloud security practices in order to properly protect customer and employee data.​The consequences of insufficient security and data protection were recently highlighted by Facebook stocks sliding nearly 15% in a 36-hour window, off the back of an exposed global data breach. Such high profile examples prove that Cybersecurity has the attention of the global media platform and consequently, the market is tightening as the need for remediation in real-time is becoming absolutely imperative.​In order to provide this level of service on a 24x7x365, vendors and end users are adopting advanced solutions. The two main trends we have seen in the first quarter of 2018 have been the integration of Artificial Intelligence & Data Science coupled with the need for Automation & Cloud Security. ​AI/Data Science & Cloud AutomationOur recruitment business gives us a unique look into these trends, as our business model is comprised of two main pillars of focus: Cybersecurity and AI/Data Science. We see the perspective of urgent needs for specific skillsets, as well as the perspective of building expertise through seeking new challenges and career options through working with stealth-mode to IPO vendors as well as the world’s largest global end-users.​When considering the impact AI can have on Cyber, it is clear why artificial intelligence, machine learning and data science will have a huge impact on the ability for software to be able to detect and remediate intrusions and vulnerabilities. Nonetheless, it is who brings the expertise that affects how analytics will impact the industry given these will be the individuals building models to analyze and make sense of the data.​In order to understand the talent pool, we need to understand what motivates individuals to bring their experience to the cybersecurity industry. Most frequently, we see these professionals are motivated by the exposure to working with novel, proprietary, and in this case, unknown data. Additionally, not only the access and exposure to the data is compelling, but also the advanced decision making predictable by the data that draws this talent into the industry.​We have also seen increased attention on the automation and acceptance of risk adverse cloud usage cases, the adoption of MSSP’s that offer integrated threat analytics/ threat management solutions, and new industry trends that dive deeper into the impact AI can have on this ever-changing landscape across the vendor and end-user arenas.​Artificial intelligence, machine learning and data science are being leveraged in a variety of ways and can be exhibited by the huge influx of neural network and deep learning talent transition into the threat analytics arena. Given the sheer magnitude and significance of personal information embedded within the data across industries such as healthcare, financial services and commerce, it is no surprise that data scientists are excited about an opportunity to advance security solutions and play an impactful role on the business/product at large. We know from speaking to these professionals that it is the access and exposure to novel and unique data across the abovementioned industries that drive and motivate their career interests.​Given that Data Science/AI & Cybersecurity are the two focal points of our Glocomms business, it is exciting to see the transfusion of these emerging technology industries shaping the future of the entire technology landscape across all industries.​Investment BanksCloud security is currently the hottest trend from an end-user perspective. This trend is clear, given the activity we have seen across the finance industry as they move towards the adoption of specific usage cases for the various open source cloud platforms. This is exciting because these have historically been some of the most proprietarily kept platforms in the world – some banks even used proprietary coding languages to build their platform! In order to be comfortable with these offerings, the institutions now need to put together documentation on the risk assessments attributed to such solutions. Once these frameworks and usage-cases are clearly determined and outlined, offerings will begin to spread across more and more business units. Currently, large asset managers and global investment banks offer their clients a commercialized version of their front-office risk systems but this is only one portion of what the cross-business platform has to offer.​The next step will be providing an integrated and secure cloud-based solution across all layers of the risk management platforms that each of the various firms offer. Some banks are in the midst of developing a similar type of cross-business platform and although they may be scrutinized for their late-arrival to the party, it might work to their advantage given the new technology currently available because having an opportunity to build a platform from scratch using the latest and greatest products for hardening security layers and adopting cloud offerings allows for a more integrated and theoretically, hardened solution! It seems cloud security will be at the top of the list for most in-demand and least- attainable skill sets in 2018. This has already been evident given the vast hiring and increased compensation bands for cloud security professionals across the end-user arena. We believe the reason for this is these professional all need to not only bring the expert technical skills to the table, but also need to be able to communicate internally and externally with key stakeholders around usage cases for cloud offerings.​Buy-Side PerspectiveFrom a Buy-Side perspective, we have seen large global hedge fund clients looking to hire Encryption Engineers to build proprietary security layers into their existing infrastructure (often cloud-based). This is an obvious step in the right direction, given in the past it seemed many funds were scared by the prospects of putting their ‘secret sauce’ out in the cloud. Additionally, we have seen vast hiring across the Security Incident Event Management (SIEM) arena, most of whom, seem to be moving to Splunk given the versatility of the product. This is also consistent with what we have seen in Investment Banks this year.​From a recruitment standpoint, we see a huge amount of potential on the buy-side in 2018 and expect to see talents being directly targeted from the tech giants as these are the professionals with the most amount of exposure to novel data with the best skillsets for architectural remediation and hardening. ​Vendor PerspectiveAs the vendors continue to offer more and more comprehensive and integrated analytical solutions, the need to stay on top of the market and hire professionals that have experience with the most cutting-edge products becomes even more imperative. We have seen massive hiring across the vendor arena given the influx of investment and the urgent need for this analytical talent. The data being analyzed is ever-increasing and the adoption of AI is not quite keeping up with the workload for the SOC. Thus, we have still seen a steady stream of hiring within these types of positions including: threat hunters, incident responders and security engineers. Not only the vendors are hiring these professionals across the mid-senior level, but also the end-users are building their own in-house SOC’s to reinforce internal security measures creating more intelligent solutions on the network to detect vulnerabilities more quickly and readily. We have seen a large increase this year of around 20% higher than the industry standard this year in the compensation bands for someone with 3-5 years of experience with the abovementioned skills.​Glocomms’ cybersecurity recruitment practice is broken down across the vendor and end-user arenas as we have a commercial practice that offers talent solutions for our vendors across the entire product development lifecycle.As mentioned above, the adoption of intelligent threat hunting, incident response and vulnerability management has been clearly exhibited in a hiring trend of AI talent into the vendor and MSSP arena. ​Candidate TrendsAn interesting trend to note has been the movement of security professionals from the defense industry transition and partner with the financial services employees, in an attempt to continue to broaden the level of expertise and attention on security related problems. This talent is coming out of New York, Boston, Washington DC Metro Area, Texas, and California and heading to new security hubs forming in the Atlanta, South Carolina, Minneapolis and Colorado.Additionally, we have seen a large interest on the Financial Services side to hire talent from the Tech Giants given their background and exposure to massive amounts of data, enterprise level architecture, and forwards thinking technical skillsets.​Given the sheer magnitude of talent required, in the last 5 months, we have placed over 15 individuals for one Cybersecurity start-up that is still in stealth-mode on a retained basis! This project is ongoing and we expect to fill nearly 40+ roles this year with this one client given how perfectly our business models align, we have been able to deliver​Thus far in 2018 we have worked closely with a number of small to mid sized organizations (20-200 employees) on both Coasts undergoing large growth initiatives. Rapid growth is not uncommon for start-ups in this industry; these companies are primarily seeking analytical/AI talent, software engineers who are building their propriety platform and security professionals to advance the offerings. One interesting thing to note has been that security software engineers are receiving larger portions of equity given the impact their development of the platform will have on the multiplier attributed to the growth potential and in turn, value of the business.​For this type of endeavor we recommend a Multi-Hire Campaign (MHC) as we are able to best align our services with a companies specific and often urgent needs directly impacting our clients’ growth through an all-encompassing recruitment solution.​Many of our institutional clients are entirely revamping their security business units given the ever-changing nature of the available technology within the industry. As a result, we have staffed multiple senior, CISO/Strategic Leaders for our end-user clients whom will drive the growth initiatives going forward in 2018 and years to come. ​Mergers & AcquisitionsOur final cybersecurity market trend we wanted to highlight in this report corroborates the above with respect to focus and attention on new, cutting-edge, AI-driven threat management platforms. Security Vendors are being acquired by the big Tech Giants and large cyber players. The options are narrowing and the solutions are becoming far more comprehensive and integrated. Recent examples of this include: SQRRL were acquired by Amazon for $40 million; Phantom Cyber is being acquired by Splunk for $350 million; and CloudLock is bought by Cisco for $293 million. This showcases that the big-players are aware of the trends outlined above and are looking to eat up the market share and gain control of the growth and opportunity that is ravishing the emerging technologies marketplace. ​Diversity & InclusionDiversity and Inclusion awareness is at an all time high in the technology industry, with female representation and wage parity dominating the headlines. At Glocomms we find that identifying good practice, policies and initiatives to improve workforce diversity and inclusion are paramount for our clients. Throughout 2018, alongside our parent company, Phaidon International, we will be running a number of positive, action-orientated client events with relevant guest speakers and industry experts. The common themes of these initiatives will be to share pragmatic and proven successful practices that can tangibly improve diversity and inclusion within the workplace. By doing so our valued clients can enhance their access to wider talent pools for their meritocratic workplaces.​In relation to Cybersecurity – this is one of the most homogenized verticals within the technology arena and female-talent is highly scrutinized for being absent. Males hold 3 out of 4 jobs in tech, but specifically within cybersecurity, the numbers reflect that only 14% of the U.S. workforce in cybersecurity is female. [1] However, out of all of the areas within technology, we believe that Cybersecurity is the field that truly needs a diverse talent pool.​Working in Cybersecurity involves dealing with hugely complex issues and problems – teams need diversity so that problems are attacked with different viewpoints. At Glocomms we focus heavily on sourcing diverse talent within this field and working closely with our clients in creating a work environment to allow such talent to excel in their careers. In the past six months, 24% of the placements we have made in the Cybersecurity field are female. Whilst we still have a long way to go we are dedicated to doing our part to empower females to succeed in the industry.​In addition to females, Glocomms is committed to contributing to and being the driving force of change across all marginalized groups with respect to Diversity and Inclusion. Most recently, on March 24th, Glocomms was a sponsor for the second annual Out in Tech Talks[2], an event that united 400+ leading and aspiring LGBTQ+ and allied voices to advance the dialogue around diversity in tech and address the power of tech to create social change. It was an incredible event, showcasing the progress achieved while illuminating the massive amount of work left to do in reshaping the industry. Impressive panels included the leaders in Diversity and Inclusion at Amazon, Linked in and Youtube, an MD/Business Leader for the Cybersecurity business at a Leading Global Investment Bank and our own Executive Director at Glocomms.​Closing ThoughtsThis report was written and prepared by Giancarlo Hirsch, Vice President at Glocomms and accurate as of March 2018.​Glocomms has offices in NY and SF and is looking to launch offices in Boston, Chicago, Dallas and Charlotte in the coming 18 months. For more information or to get in touch with the team at Glocomms, please do reach out to usa@glocomms.com!​-------About UsGlocomms is a leading specialist recruitment agency for the technology sector. We were founded in 2013 to give clients and candidates peace of mind that the recruitment process is in expert hands. Our continual investment in best-in-class technologies and consultant training enables us to recruit with speed, precision and accuracy. Today, Glocomms provides contingency, retained search and project-based contract recruitment across our offices in San Francisco, New York, London and Berlin. Find out how Glocomms can help you.

Read More

Looking for something specific?

View more blogs