Cyber Security

Cyber Security

Glocomms: Cyber Security recruitment

The world of Cyber Security is rapidly changing, and the demand for skilled professionals is increasing. Companies need to ensure their data and networks stay secure, and they are turning to the expertise of Cyber Security professionals to help them do just that.

Glocomms is your premier destination for top-notch cybersecurity talent, available for both permanent and freelance roles. Our adept consultants boast extensive knowledge of the cybersecurity landscape, enabling them to identify the ideal candidate tailored to your precise requirements. Whether you seek a permanent employee skilled in threat detection and response, network security, or cloud security, or a freelancer for short-term projects, our swift and efficient process ensures a perfect fit for your needs.

Our European based consultants are trained specialists in their fields, recruiting mid to senior level commercial talent across Cloud & infrastructure, Cyber Security, Big Data & Analytics, Fintech, Managed IT Service Providers, SaaS and more throughout the UK and Europe.

If you're a Cyber Security professional, please register your resume.

Register your CV

If you're looking for Cyber Security talent, please register your vacancy today.

Register your vacancy
or
Request a call back

Benefits of working with us

Our Cyber Security recruitment specialists support growing technology businesses source the right go-to-market strategy talent, manage the recruitment process and facilitate onboarding. With multi-lingual language support, we provide international recruitment expertise to secure business-critical talent across Europe.

Choose us for exceptional Cyber Security recruitment services, and watch your business thrive with the right talent by your side.

Our recruitment benefits

Experience

We have a decade’s worth ofCyber Securityexperience as a leading talent partner in Technology.

Network

A vast, global network of the best, in-demandCyber Securitytalent.

Knowledge

Our award-winning talent specialists offer bespoke, tailored guidance on the latest hiring trends.

Whether you seek swift placement for pivotal roles or aspire for strategic talent acquisition solutions, our arsenal of resources and proficiency ensures successful outcomes.Share your vacancy with us today.

Looking to hire? Request a call back

Cyber Security Jobs

Lead Threat Detection Engineer

Glocomms are with a globally leading Wealth Management firm in the search for an experienced Lead Threat Detection Engineer to drive the creation and engineering of advanced security solutions designed to detect and counteract cyber threats. This role will focus on building and implementing innovative threat detection systems that address threats not previously identified. The ideal candidate will have a robust technical background, a proactive approach to problem-solving, and a passion for developing novel security solutions. Key Responsibilities: Security Solution Engineering: Design, build, and engineer cutting-edge security solutions specifically aimed at detecting and mitigating novel and sophisticated cyber threats. Develop and deploy advanced threat detection systems that are tailored to the unique needs of firms environment. Threat Detection Content Development: Create and maintain custom threat detection content, including detection rules, signatures, and alerts, to enhance the effectiveness of the firms security infrastructure. Develop innovative detection techniques and methodologies to identify previously unknown threats and attack vectors. Innovative Threat Detection Strategies: Lead the development of new threat detection strategies and frameworks to address emerging threats and vulnerabilities. Collaborate with cross-functional teams to integrate and optimize these strategies within the firms existing security architecture. Threat Intelligence and Analysis: Stay informed about the latest cyber threats, vulnerabilities, and attack trends relevant to the financial sector. Analyze complex threat data to continuously improve detection capabilities and adapt security solutions accordingly. Leadership and Collaboration: Provide leadership and mentorship to a team of threat detection engineers, fostering an environment of innovation and excellence. Work closely with other cybersecurity teams, IT departments, and stakeholders to ensure seamless implementation and enhancement of threat detection solutions. Incident Response and Continuous Improvement: Assist in the investigation and response to security incidents, leveraging advanced detection solutions to effectively identify and address threats. Evaluate and refine threat detection processes and solutions based on incidents learnt and the evolving threat landscape. Documentation and Reporting: Develop and maintain detailed documentation for all threat detection content, security solutions, and incident response procedures. Generate and present comprehensive reports on the performance of threat detection systems, emerging threats, and strategic recommendations to senior management. Qualifications: Education: Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Advanced degrees or certifications (e.g., CISSP, CISM, or equivalent) are a plus. Experience: Minimum of 7-10 years of experience in cybersecurity with a strong focus on threat detection and response. Proven experience in engineering and developing security solutions to detect cyber threats. Technical Skills: Proficiency in security technologies and platforms, such as SIEM (e.g., Splunk, QRadar), IDS/IPS, and EDR. Strong knowledge of network protocols, operating systems, and programming/scripting languages (e.g., Python, PowerShell). Experience with threat intelligence platforms and advanced analysis tools. Analytical Skills: Exceptional analytical and problem-solving skills with the ability to translate complex information into actionable security solutions. Leadership: Demonstrated leadership abilities with experience managing and mentoring technical teams. Communication: Excellent written and verbal communication skills, capable of conveying technical information to both technical and non-technical stakeholders.

US$150000 - US$175000 per year
Clearwater
Apply

Head of Cyber Security SOC

Job Title: Head of Cybersecurity Security Operations Center (SOC) Glocomms are partnered with a Vehicle Manufacturing Firm which stands at the cutting edge of innovation in the automotive industry. Their commitment to excellence extends beyond vehicle manufacturing to encompass the security and integrity of their digital infrastructure. As the company continues to grow and evolve, they are seeking a dynamic and experienced Head of Cybersecurity Security Operations Center (SOC) to lead their cybersecurity operations and enhance their defense against cyber threats. Position Overview: The Head of Cybersecurity SOC will serve as a strategic leader responsible for overseeing the cybersecurity operations center. This role focuses on developing and executing advanced strategies to safeguard the company's digital assets. The ideal candidate will be a visionary leader with a deep understanding of cybersecurity threats, proven experience in driving team growth, and a strong dedication to ensuring rapid and effective threat detection and response. Key Responsibilities: Strategic Leadership: Develop and implement a comprehensive cybersecurity strategy for the SOC that aligns with the company's business objectives and risk management framework. Define and set SOC goals, objectives, and key performance indicators (KPIs) to enhance threat detection, response capabilities, and overall security posture. Collaborate with executive leadership and other departments to align cybersecurity initiatives with organizational priorities. Team Management and Development: Lead, mentor, and grow a high-performing team of cybersecurity professionals, including analysts, engineers, and incident responders. Foster a culture of continuous improvement and professional development within the SOC team through training, certifications, and skill development opportunities. Oversee recruitment and retention strategies to build a robust and skilled cybersecurity workforce. Threat Detection and Response: Implement and manage advanced threat detection technologies and methodologies to identify and mitigate cyber threats in real-time. Develop and refine incident response plans, ensuring effective and timely responses to security incidents and breaches. Conduct regular threat assessments and vulnerability analyses to proactively address potential security risks. Operational Excellence: Monitor and manage SOC operations to ensure efficient incident management, alert handling, and threat intelligence integration. Establish and maintain relationships with external partners, including law enforcement, industry groups, and cybersecurity vendors, to stay updated on emerging threats and best practices. Continuously evaluate and improve SOC processes, tools, and technologies to enhance operational efficiency and effectiveness. Compliance and Reporting: Ensure compliance with relevant industry regulations, standards, and best practices related to cybersecurity and data protection. Prepare and present regular reports to executive leadership on SOC performance, threat landscape, and incident response activities. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; an advanced degree or relevant certifications (e.g., CISSP, CISM, CISA) is preferred. A minimum of 10 years of experience in cybersecurity, with at least 5 years in a leadership role overseeing SOC operations. Proven expertise in threat detection, incident response, and cybersecurity technologies. Strong understanding of cybersecurity frameworks, standards, and compliance requirements. Excellent leadership, communication, and interpersonal skills with a demonstrated ability to manage and inspire teams. Experience in the automotive or manufacturing sector is a plus.

US$250000 - US$275000 per year
North Carolina
Apply

Senior Director of Cybersecurity

Glocomms is partnered with a prominent leader in the food and beverage industry dedicated to delivering safe, high-quality products to consumers while navigating the complex challenges of a dynamic marketplace. With a strong commitment to innovation and excellence, the client is seeking a Sr. Director of Information Security to spearhead their cybersecurity efforts and drive the company's mission to provide safe, reliable, and top-tier food products in an ever-evolving digital landscape. The Sr. Director of Information Security will lead the cybersecurity efforts for a leading food and beverage company, ensuring that the digital landscape supporting the production and distribution of private label packaged foods is secure, resilient, and aligned with the company's mission of delivering safe, high-quality products. This role combines cutting-edge cybersecurity practices with a deep understanding of the unique challenges faced by the food industry, where protecting sensitive information, ensuring supply chain integrity, and maintaining consumer trust are paramount. Primary Responsibilities: Craft and implement a cybersecurity vision that safeguards not just digital assets but also the processes that ensure the quality and safety of our food products. Your strategy will protect the company's recipes, proprietary processes, and sensitive supply chain data, ensuring the smooth and secure delivery of products from farm to table. Develop and maintain a cybersecurity risk management framework that addresses the specific challenges of the food and beverage industry, including protection against supply chain disruptions, contamination risks, and regulatory violations. Navigate the complex regulatory landscape of the food industry, ensuring that cybersecurity measures comply with industry-specific standards such as the FDA's Food Safety Modernization Act (FSMA) and other relevant food safety and quality regulations. Implement incident response plans tailored to the food industry's unique needs, ensuring rapid recovery not just of IT systems but also of critical production and supply chain operations in the event of a cybersecurity breach. Develop engaging, industry-specific cybersecurity training programs for employees, emphasizing the importance of protecting sensitive food safety data and the risks associated with digital threats in food production environments. Oversee relationships with vendors and suppliers critical to the food production process, ensuring they adhere to the company's cybersecurity standards while managing budgets to prioritize investments in technologies that enhance both security and operational efficiency. Regularly update stakeholders, including the Cybersecurity Steering Committee and executive leadership, on the cybersecurity program's impact on food safety, supply chain continuity, and consumer trust. Provide actionable insights that support the company's broader mission of delivering safe, high-quality foods to consumers. Key Qualifications: Bachelor's degree in Business Administration, Information Technology, Food Science, or a related field. Advanced degrees or specialized training in food safety/security are preferred. Proven senior leadership experience in information security and risk management within the food and beverage industry or other highly regulated environments. Experience with food safety, supply chain security, and regulatory compliance is highly desirable. Desired certifications include CISSP, CISM, CISA, and CRISC. Additional certifications in food safety or supply chain security are a plus. In-depth understanding of cybersecurity management frameworks (e.g., NIST, ISO/IEC 27001, ITIL, COBIT) and their application in the food and beverage industry. Familiarity with FSMA and other food safety regulations is a strong advantage. Ability to develop and implement cybersecurity strategies that protect both digital and physical assets, ensuring the integrity of food production and distribution processes. Skilled in working with cross-functional teams, including food safety, supply chain, and regulatory compliance, to integrate cybersecurity into broader business practices. Expertise in assessing the potential impact of cybersecurity threats on corporate and supply chain operations, with the ability to implement risk mitigation strategies. Experience managing complex projects in dynamic environments, ensuring that cybersecurity initiatives align with production schedules and business objectives. This role offers a unique opportunity to lead cybersecurity in a sector where the stakes are not just about data protection but also about the safety and trust of millions of consumers who rely on our client's products every day.

US$180000 - US$220000 per year
United States of America
Apply

Security Analyst

Summary: We are partnered with a private investment firm specializing in private equity, venture capital, credit, and public equity. This firm is consistently ranked among the top private equity firms globally, frequently appearing in rankings such as the PEI 300. Deeply invested in leveraging cutting-edge technology to enhance tech-driven investment strategies and operational capabilities, this firm is looking to bring a hybrid Security Analyst onto their growing team. This position will ensure confidentiality, integrity, and availability of the firm's systems, network, and data, while assisting in the implementation of security measures. The Senior Analyst will be responsible for: Continuously monitor and analyze security events across the firm's networks and systems, using Security Incident and Event Management (SIEM) tools to detect and respond to potential threats. Manage and respond to security incidents, including log monitoring and management, ensuring issues are resolved in a timely manner. Implement and maintain comprehensive security measures, including firewalls, encryption, web filtering, and network and operating system security. Provide technical security guidance and support across the organization, including recommendations for security software management and data protection. Utilize scripting languages such as Python and PowerShell to automate security tasks and enhance operational efficiency. Manage and configure security settings for local area networks, Active Directory, Group Policy Objects, and IAM/IDPs. Stay informed about the latest exploits and hacker techniques, proactively addressing vulnerabilities in the firm's systems. Oversee security measures for cloud environments, including AWS and Azure, ensuring adherence to best practices. Promote information security awareness across the organization to bolster overall security posture. The ideal candidate will possess the following qualifications: Bachelor's Degree in Computer Science, Management Information Systems (MIS), or Information Security. Solid understanding of cybersecurity fundamentals and hands-on experience with security software management and technical security guidance. Proficiency in Windows, Mac OS, and Unix/Linux operating systems. Experience with scripting languages such as Python and PowerShell. Knowledge of security concepts including IAM/IDPs, PAM, and encryption. Familiarity with local area networks, firewalls, Active Directory, Group Policy Objects, and security incident management. Experience with AWS and Azure cloud platforms. Strong analytical skills, attention to detail, and the ability to stay current with emerging threats and security trends. If you or someone you know is interested, apply directly below!

US$100000 - US$140000 per year
Boston
Apply

Security Engineer

Glocomms is partnered with a global alternative investment management firm looking to bring on a Security Engineer to play a vital role in protecting the firm's dynamic and evolving technological environment. The ideal candidate will have a strong background in information security within the financial industry and hands-on experience with Microsoft security solutions. Strong communication skills are a must, as this position will be tasked with providing senior leadership with clear and concise reports that accurately reflect the firm's cybersecurity posture and evolving risk landscape. Key Responsibilities: Implement and manage Microsoft security solutions, including desktop and server operating systems, Active Directory, Group Policy, EntraID, and Desired Configuration State. Ensure robust DNS and messaging security across the organization's infrastructure. Collaborate with development teams to integrate security measures in CI/CD pipelines using tools like Jenkins and Terraform. Manage and secure IaaS and SaaS solutions, ensuring seamless operation and compliance with security standards. Implement and manage authentication protocols, including SAML, OIDC, and Kerberos. Configure and maintain Office 365 security controls, including Azure Active Directory, Conditional Access, and Microsoft CAS. Develop and enforce Data Loss Prevention (DLP) policies and implement Azure Information Protection (AIP) solutions for data labeling, classification, and encryption. Ensure compliance with data protection regulations, such as GDPR and HIPAA, through effective use of DLP and AIP technologies. Utilize tools like EDR and SIEM for continuous monitoring and threat detection. Conduct vulnerability management and remediation efforts to safeguard the organization's assets. Write and maintain scripts in PowerShell for automation and enhanced security operations. Understand and analyze code in C#/.NET to ensure secure coding practices. Work independently and proactively within a fast-moving, high-pressure environment. Communicate and collaborate effectively with cross-functional teams to address security challenges and implement best practices. Qualifications: Bachelor's degree in Computer Science, Engineering, or a related field. 3-5 years of experience in a technical security role, preferably within the financial industry. Hands-on experience with Microsoft security solutions and related technologies. Proficient in managing Active Directory, Group Policy, and Azure AD. Strong scripting skills in PowerShell; familiarity with C#/.NET is a plus. Experience with CI/CD pipelines, Jenkins, Terraform, IaaS, and SaaS solutions. Knowledge of authentication protocols (SAML, OIDC, Kerberos) and security controls for Office 365. Relevant security certifications such as CISSP, GCIA, CISM, or product certifications (e.g., PingFederate, Azure, Windows, AD) are a plus. Ability to prioritize tasks in a high-pressure, fast-moving environment with a high sense of urgency. Strong problem-solving skills, proactive thinking, and the ability to work independently. Excellent communication and collaboration skills. This position will play a key role in the establishment and optimization of the firm's Information Security Governance framework. Interested candidates should have excellent oral and written communication skills and the ability to work cross-functionally with both technical and nontechnical teams. Candidates must be located in (or willing to relocate to) the Miami, FL area to be considered.

Negotiable
Miami
Apply

Senior Application Security Engineer

Glocomms is partnered with a cybersecurity SaaS platform who is seeking a fully remote Senior Application Security Engineer within Product Security, to play a critical role in safeguarding products from emerging threats. You will be responsible for designing, implementing, and managing security measures to protect applications and services. As a technical leader, you will collaborate with various teams to embed security best practices into every aspect of the product lifecycle, ensuring compliance with industry standards and regulatory requirements. Key Responsibilities: Develop a comprehensive understanding of products, services, and architectures to identify potential security risks and vulnerabilities. Conduct thorough security assessments, including threat modeling, secure architecture reviews, code reviews, and penetration testing of web and mobile applications. Interpret security vulnerability reports and provide actionable advice on prioritization, remediation, and mitigation to stakeholders with varying technical backgrounds. Collaborate with development teams to integrate security into all phases of the Software Development Life Cycle (SDLC), ensuring secure coding practices and adherence to industry standards. Create and maintain detailed documentation for security processes, protocols, and guidelines. Deliver accurate and concise security metrics to stakeholders and business leaders, providing clear insights into the organization's security posture. Stay up-to-date with the latest security vulnerabilities, tactics, techniques, and procedures (TTPs) to maintain high proficiency in relevant security topics. Develop and deliver security training and education programs across the organization to enhance security awareness and practices. Develop innovative and scalable tools, solutions, and processes to improve product security operations and effectiveness. Support the implementation of security tools, ensuring their effectiveness, and accurately interpreting results for relevant stakeholders. Qualifications: 8+ years of experience in Application Security roles, with a strong focus on application, API, database, and infrastructure security. Deep understanding of security vulnerabilities, defense techniques, and best practices. Ability to clearly explain vulnerabilities and their implications to stakeholders with varying levels of technical expertise. Proven experience in performing threat modeling and providing actionable recommendations based on results. High proficiency in scoring security vulnerabilities using the Common Vulnerability Scoring System (CVSS). Strong understanding of Secure Software Development Life Cycle (SSDLC) and experience with development and integration tools used in CI/CD pipelines. Experience in providing secure coding training and education to developers, going beyond generic remediation advice to offer tailored solutions. Knowledge of one or more major cloud providers (Azure, AWS, GCP) and their security practices. Experience with authentication and authorization standards and protocols, such as SAML, OAuth, LDAP, and Active Directory (AD). Practical knowledge of applied cryptography, including encryption at rest, TLS, hashing, and common cryptographic attacks. Ability to read and write code fluently, with a strong understanding of secure coding practices. Ability to thrive in a self-directed, highly collaborative, and cross-functional environment. A strong passion for researching vulnerabilities and staying ahead of the latest exploitation techniques.

US$160000 - US$180000 per year
Chicago
Apply

Penetration Tester

We are partnered with a leader in the data AI space who are actively seeking a skilled and experienced Penetration Tester with a strong background in software engineering to join their dynamic Security team. In this role, you will take ownership of evaluating the security of features and products, independently planning and executing penetration tests, and documenting your findings in accordance with industry best practices. As a key member of our team, you will advocate for and implement software security best practices, work closely with stakeholders to ensure that security is a fundamental part of the development process, and develop comprehensive threat models for proposed features. Qualifications: 3+ years of experience in application penetration testing and software engineering, preferably with enterprise software/systems. Proficiency in languages such as C#, Java, Ruby, Go, Python, etc. Proven ability to produce detailed penetration test reports tailored for both executives and developers, with clear prioritization and mitigation strategies. Strong experience with the OWASP testing guide and a deep understanding of industry-standard security practices. Familiarity with various web frameworks and technologies, including JavaScript, XML, SOAP, and JSON. Why This Role? You will have the independence to plan and execute penetration tests, showcasing your expertise in vulnerability identification and resolution. You'll play a crucial role in promoting software security best practices, driving a culture of security awareness within the organization. Work alongside stakeholders to integrate security into the design and development of features, ensuring robust security measures are in place. Lead the development of threat models and propose countermeasures, contributing to the proactive defense of our systems and applications. Our client is headquartered out of Boston, MA and this position is a fully remote opportunity** offering competitive compensation (base + bonus) and great benefits. If interested in learning more, please apply directly! **Hybrid (2-3 days a week) local to this company is preferred and will be prioritized over fully remote hires; however depending on circumstances our client is willing to consider fully remote employees.

US$140000 - US$160000 per year
New Boston
Apply

Junior Information Security Analyst

Information Security Analyst Location: Montreal, Canada (Hybrid 3-days on-site per week) Salary: Competitive base + bonus Working hours: 11:30am - 8:30pm EST Glocomms are partnered with a globally leading high-frequency trading firm with a security-first mindset in the search for an Information Security Analyst to join a highly technical team of Security Engineers and Analysts, focusing on preventing cyber intrusions and attacks via automation whilst identifying opportunities to further develop the existing security posture. Key responsibilities: Monitor SIEM, networks, and systems to identify potential security threats, incidents, and requests for information. Identify security exposure by developing/Implementing automated systems. Expand capabilities, optimize efficiency and exceed client expectations by engineering and administrating Security Infrastructure. Provide guidance and direction on security flaws, how to exploit and remediate such flaws. Assess the effectiveness of the firms' cyber defense and response time. Participate in hands-on Attack Simulations and threat emulation activities regularly. Have a heavy involvement in threat management, vulnerability management, and Incident Response activities. Work effectively as a senior team member, providing hands-on support to clients, maintaining communication, and keeping senior management up to date on progress. Ensure that appropriate standards, best practices, workplace policies, and procedures are followed. Experience required: Bachelors degree in Computer Science, Cyber/Information Security, IT, or a related field. Experience analyzing detected security evens and triaging incidents. Hands-on experience with SIEM, IDS/IPS, firewalls, DLP, and EDR/XDR. Strong knowledge of threat actor/group TTP's, network scanning, code activity, and DDOS. Experience programming in languages such as Python, PowerShell, or Bash for automation.

US$90000 - US$120000 per year
Montreal
Apply

Director of Laboratory Systems & Application Innovation

About the Company: A leading international pharmaceutical and biotechnology company is looking to expand their executive team with a tenured individual to oversee Operational Technology (OT) development and associated risk globally, for a pivotal pillar of their R&D team. Focused on systems and automation in a lab setting, this role will lead the strategic direction, roadmap development and associated maintenance for end-to-end lifecycle management as the department's impact continues to expand and grow. You'll collaborate across the organization with other technology-driven teams, assess and prioritize various risks, and ensure the proper standards and controls are in place for complete OT security compliance. This is a great next step for someone with previous success in a biotechnology, pharmaceutical or medical device setting, who understands the systems and applications used in laboratory research and related OT security / regulatory requirements that is looking to make an impact at the global level! Basic Qualifications: Bachelor's degree in Business, Science, Engineering, Information Technology, or a related field. 6+ years experience managing laboratory systems (preference if both validated and non-validated environments) 3+ years experience in a leadership role, managing large, multi-site, and international teams. Preferred Skills / Expertise: Masters, PhD or MBA, or post-graduate professional qualification in Business or Science, Engineering, Information Technology related discipline Proven success creating and driving vision / roadmap for multi-national organization. Confidence collaborating with various technical and non-technical stakeholders at all levels. Hands-on technical background, to demonstrate in-depth understanding of how various updates, modifications or new technologies are implemented. This is a hybrid position (2-3 days onsite) in Greater Boston, and offers a competitive compensation package inclusive of base + annual bonus + company shares and an extremely generous 401k match. If interested in learning more, please apply directly! **Relocation assistance may be available.

US$200000 - US$230000 per year + annual bonus, company shares
Boston
Apply

CyberArk Engineer

Role: CyberArk Engineer Location: Brussels, Belgium Hybrid: 1/2 days on site per week Start date: 2nd September 2024 Contract: 2 years ​ Job Summary: This company is seeking a highly skilled and experienced CyberArk Engineer. The ideal candidate will be responsible for the design, implementation, maintenance, and support of their CyberArk Privileged Access Management solutions. This role involves collaborating with cross-functional teams to ensure the security and compliance of privileged accounts and credentials across our enterprise infrastructure. Key Responsibilities: Design, deploy, and manage CyberArk solutions to secure privileged accounts and credentials. Configure and integrate CyberArk with various systems, applications, and platforms. Monitor, troubleshoot, and resolve issues related to CyberArk infrastructure and services. Conduct regular assessments and audits of privileged access activities to ensure compliance with security policies and standards. Develop and maintain documentation, including standard operating procedures and technical guides for CyberArk administration. Collaborate with IT and security teams to identify and mitigate potential risks and vulnerabilities. Provide training and support to end-users and stakeholders on CyberArk functionalities and best practices. Qualifications: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Minimum of 3-5 years of hands-on experience with CyberArk Privileged Access Management solutions. Strong knowledge of IT security principles, practices, and technologies. Proficiency in scripting with PowerShell. Experience with directory services (e.g., Active Directory) and authentication protocols. Familiarity with regulatory and compliance requirements related to privileged access management (e.g., GDPR, SOX, HIPAA). Excellent problem-solving skills and the ability to work effectively in a fast-paced, collaborative environment. Strong communication and interpersonal skills, with the ability to convey technical information to non-technical stakeholders. If this matches your experience, get in touch today to find out more!

€500 - €700 per day
Brussels
Apply

Delivery Manager

Delivery Manager Hybrid Working in either Paris, Angers, Grenoble or Lyon 3 Days per week on site, reduced to 2 after on-boarding period Occasional travel required to other sites (all expensed) Start Date : 02/09/2024 6-Month Initial Contract (Long-Term Engagement) TJM : 400-600€ Customer Details Our customer is one of the world's biggest Systems Integrators, they are a Cisco and Microsoft Gold Partner and partner with some of the biggest companies in the world providing technical, consulting and managed services. They have just won a project with a key player and market leader in the Healthcare space and require the support of an external Delivery Manager to help them guide and coordinate the project. Some great benefits of working with this customer include the long-term goals they have in mind, should this mission finish and they have another project for you, you will simply to moved over and your contract extended further. Glocomms have been working with this customer for over 5 years across Europe and been responsible for a huge number of key hires into their business. Job Details Delivery Manager The primary responsibilities of the position will include : Work closely with all the partners and stakeholders participating in the project to ensure everyone is aligned with the goals, timelines and project loads. After every deployment to run a risk analysis and report for the stakeholders Maintaining Confluency documentation and exchanging with the other Delivery Managers Technical Skills Required : Ideally looking for someone with 10 Years of experience working in similar positions in terms of context, environment size and International environment. Mastery of Agile methodologies (e.g. SCRUM, KANBAN, SAFe) and DevSecOps-type organisations with autonomous teams (business, development, operations) and associated tools (Jira/Confluence) Ability to invest in the business function Strong sensitivity to security from both a technological and process point of view Initiative, open-mindedness, sense of collaboration, pragmatism Ability to work on multiple tasks by managing priorities Ability to work with contractors Strong ability to dialogue, listening, sense of service and ability to convince Analytical and problem-solving skills Additional Skills : Given the International context of the business, the customer needs someone who can exchange at a professional level in both English and French. No specific certifications are required, but any relevant Project Manager or Agile Methodology certifications will certainly go a long way in supporting your application. The anticipated length of this specific assignment is 12-18 Months but there is chance for extension or for you to be moved onto a different customer project. Get in Touch james.evans(@)glocomms.com +44 203 758 8905 https://www.linkedin.com/in/jamesevansglocomms/

€400 - €600 per day
France
Apply

Senior Data Security Engineer

Location: Washington, DC or Richmond, VA Schedule: Hybrid (3 days onsite/2 days remote) Glocomms is partnered with a top consumer information and analytics firm in the search for a Senior Data Security Engineer. As a senior member of the growing Data Protection team, you will spearhead the development and execution of data security strategies to protect sensitive information and systems. You'll also guide junior team members and ensure compliance with industry standards and regulations. Overview of Responsibilities: Create, implement, and refine data security strategies, policies, and procedures to protect the organization's data assets. Manage and oversee the deployment of Microsoft Purview for data protection, loss prevention, and behavior analytics. Perform regular risk assessments to identify vulnerabilities and develop strategies to mitigate risks, working with cross-functional teams. Lead and manage data security incident response efforts, including detection, analysis, containment, eradication, and recovery. Review and enhance current data security architectures to improve protection, privacy, and regulatory compliance. Classify sensitive data and oversee the implementation and management of encryption technologies. Stay updated on data security regulations, standards, and compliance requirements, ensuring alignment with industry practices and legal obligations. Key Qualifications: Bachelor's Degree in information security or a related technical discipline from an accredited institution. At least 1 year of experience with Microsoft Purview (or its predecessor). Minimum of 6 years in data security, focusing on risk assessment, incident response, and security architecture. Strong understanding of data security frameworks, standards, and best practices (e.g., NIST, ISO 27001, CIS). Excellent communication and interpersonal skills, with the ability to convey technical concepts to non-technical audiences. Proven leadership and mentoring experience. Experience with regulations like GDPR, PCI-DSS, HIPAA, or similar is a plus. Familiarity with cloud data security practices and technologies is beneficial. Certification such as Certified Information Systems Security Professional (CISSP) is preferred. Interested candidates must be willing to work on-site Tuesdays, Wednesdays, and Thursdays if hired. This is a full-time position; candidates seeking contract or C2C/C2H work will not be considered. Unfortunately visa sponsorship is not available at this time.

US$160000 - US$220000 per year
Richmond
Apply

News & Insights

A Guide to Negotiating Your Notice Period Image
cyber-security

A Guide to Negotiating Your Notice Period

​In Germany, the average notice period is 3 months but can be as long as 6 months. There is a good reason behind this - to protect your rights as an employee in case of redundancy or termination. However, while a notice period should be treated with respect, there might be situations where proactively discussing your leaving date with your employer could be of benefit for you as well as both your current and future employers. This guide provides you an overview of factors to consider in this context and guidelines on how to professionally navigate the process.Benefits of shortening your notice periodThere may be several reasons for wanting to leave your current employer earlier, including to:Avoid awkwardness in the workplaceThere is a reason for the maxim, “Always leave the party when you’re still having fun.” The longer you stay, the more chance for things to sour. The last thing you want is to feel like a guest who has outstayed their welcome. You want to be remembered as a great employee who made a fantastic contribution to the success of your current employer, while you were there. Simultaneously, it is in the interest of your current employer and colleagues to maintain a harmonious work environment. Stay interested in your current workInevitably, once you have told an employer you plan to leave, they might start removing you from important projects. They may even place you on gardening leave if you are going to a competitor. Companies use gardening leave as a protectionist measure to ensure that the departure of senior executives has minimal impact on their reputation and success. But as an employee, a lengthened period of less responsibility in your current position or complete time away from the job might have a negative effect on your motivation. Gain a higher salary or better career experience soonerThere is a reason that you are embarking on a new job. Whether it is the chance to work for a specific company, on an incredible project, in a unique role that only comes once in a blue moon, or simply for a higher salary – something attracted you to go. The sooner you leave, the sooner you begin the next stage of your career. Whether it’s a new gadget or a new job, our brains are hardwired to seek new stimulus. A new job offers a huge amount of novel stimuli, but the longer you have to ruminate on it, the less exciting it might seem. Exiting within a reasonable time frame might help you to capitalize on the excitement of just having secured a new job.Have cross-over with your incumbentGenerally speaking, the more time you are able to spend with your predecessor in your new role, the more valuable information you will be able to acquire. No-one else will be a greater foundation of knowledge regarding the role ahead. They will also be able to define the rest of your team’s organisational structure. Furthermore, by building a rapport, not only will you build your reputation within the new firm, you might also be able to ask for their advice, if you ever face a difficult situation regarding the position in the future.How to negotiate your noticeAs the notice period is usually part of your official employment contract that has to be respected, it is not a simple conversation you have with your employer in passing. Proactively seeking a discussion while considering all of the following factors will demonstrate your respect for your current employer and underline your professionalism.Know your contract inside and out To avoid any unwelcome surprises, you need to know the terms of your employment inside and out. Check for any specific exit clauses, anti-competition clauses, and any clauses regarding your bonus or training repayments. Properly prepared, you’ll be in the best position to competently negotiate terms and understand what the best outcome can be.Hand in a formal resignationUsually, all you need to resign is a one-line letter letting your employer know your intention to resign, your official and preferred last date of employment. In Germany, your letter must be handwritten; your employer is not obliged to accept a resignation communicated digitally (see: Civil Code (BGB) §623). Your notice period starts when your employer acknowledges they have received your resignation, not when it is delivered, so try and get it signed as soon as possible. Your letter should be kept brief, remain professional, and doesn’t require reasons for your resignation. Express that you have appreciated the opportunities provided by the position, including developing your skills, building on your knowledge of your sector, or responsibilities or challenges you have felt particularly proud of. When seeking to shorten your notice period, it is vital to mention your willingness to assist your employer with the transition period around you leaving the company. State those projects you will be able to complete within your notice period, and what you can do to help your handover process go smoothly. Be realistic about the outcomeWhile your employer might accept your suggested exit date straight away, it is unlikely to happen without a formal conversation. Once you both agree on a leaving date that is earlier than your contractual notice period, you can both sign an "Aufhebungsvertrag" or compromise agreement. This agreement will terminate your contract on a mutually agreed date that you want to leave. Be realistic when making suggestions. What is the earliest that you can leave while being considerate of their needs? Empathize with your current employer.Your resignation is likely to be a shock. After all, you are a brilliant employee who has a significant impact on the success of your business (no wonder that you’ve been snapped up hungrily by someone else). Immediately, your boss will be concerned about several factors including loss of valuable expertise, an increased workload for the rest of the team, the cost of finding a suitable replacement, and even the potential damage to their reputation. For this reason, it’s best to revisit the notice period a few days after the initial resignation when your boss will be further along the change curve. Next, it is time to show that you’re prepared to help mitigate any negative impact from your departure. You can formalise this as part of the aforementioned compromise agreement with your employer for agreeing to a shortened notice period. This type of contract can be agreed after discussing factors such as sourcing and training your successor or completing projects within a certain time frame.Source and suggest a replacementMost likely, your employer’s primary concern is filling your shoes. The best way to allay their concerns and to successfully negotiate your notice period is to help them find a replacement. After all, you’re the ultimate resource for knowing what a good replacement looks like! If you did your research and developed relationships throughout your time with the company, you most likely know who would want to be in your role and also who would be a good replacement for you. Whether they are in your team or another department, reach out and explain the job requirements and why you think they would make a great match. The nature of your role may have evolved since you started, so it is advised to draw up a new job description and requirements. They will appreciate the effort and you will show that you are willing to go the extra mile to make your exit as smooth as possible. Sharing the position with your wider network on LinkedIn will also show you are still an advocate for the company; alleviating their concerns about any possible damage to their reputation. If you need any specialist help, get in touch. Glocomms can source a temporary or permanent replacement.Prepare a thorough handover or ‘operating manual’As tempting as it may be to ‘wind down’ during a notice period, it is important to leave a job on good terms. This will involve a last extra push of effort in creating a comprehensive handover process between you and your replacement. Work alongside your boss to see how your work and responsibilities can be picked up by others on your team, and how you can help your replacement hit the ground running when they join the business. In a longer notice period, you may even have time to train your replacement on workplace processes and the details of your work. You can brief the new employee with important information about clients and project status. Helping with your transition period is a great way to end your role on a positive note, and lessen the effect of your departure on your company. It will be appreciated both by your supervisor and your company’s new hire, and can result in a glowing reference.Use your annual leaveNext to a proactive and considerate conversation with your employer, you might also be able to shorten your notice period through using up your outstanding annual leave for the rest of the year. This time can be offset against your notice, meaning you can take all of your remaining annual leave, effectively shortening your work days. Employers also find this compromise attractive, as they are obligated to pay you for outstanding leave. While this can reduce the awkwardness of lingering in the workplace, you’ll nevertheless be considered an employee. At Glocomms, we’ve also helped candidates wield their annual leave as a bargaining chip. By giving up their remaining annual leave, tech professionals have successfully traded the days or weeks for an earlier termination date – enabling them to get started in their exciting new role quickly.Good to knowThe employment relationship is governed and regulated by statutory laws, the contract, and any collective agreements with the works council or collective bargaining agreements with the union. You can visit the website of the German Federal Ministry of Justice and Consumer Protection for an overview of your employment rights. Securing your bonusFrom tech candidates, one of the most frequent concerns we hear is about securing their bonus during negotiation. You will doubtless expect to receive your bonus if you have worked a full year, or a pro-rata payment if you leave before the year’s end. However, most contracts have bonus clauses that state: You need to be employed at the bonus payment date and/orYou must not be working under notice It is important though, to pay attention to how your bonus is formulated within your contract. If your bonus is partly granted in recognition of your performance during the relevant financial year, then your employer is legally obliged to pay it. Accordingly, if you leave before the end of the financial or calendar year, you should receive a pro-rata bonus payment. If your bonus is in no way tied to your performance but as an incentive to stay with the company, then your employer can make the payment conditional on your employment contract not being under notice. Moreover, if you resign within a certain date of receiving such a bonus your employer can demand you pay it back, so keep this in mind during the process of terminating your employment. Note: The law around bonuses in Germany is constantly under review. Stay up-to-date.Next stepsAvoid negativityHanding in your notice does not mean you have free reign to openly complain about your job, or slack on your work entirely during your notice period. Even if you are leaving a difficult atmosphere, be respectful and mindful on how you communicate this. Keep your (soon to be former) colleagues in mind, who may be facing a more difficult time without your support. Offer to help them the best you can so you don’t leave them in a tight spot.When discussing your reasons for leaving, try and stay on positive subjects and instead emphasise the benefits of the current role, what you have learned and how it has helped your career. There is little to gain from being negative, but there is a lot to gain from leaving on good terms. Leave on good termsThe tech market is surprisingly small, so don’t burn bridges. You’ll never know when you run into an old boss or colleague again – and you may return to them in the future! If it is in-line with the company practices and culture, you may wish to send individual farewell messages to your team members thanking them for the specific support they have provided throughout your time in the role. Bear in mind not to exclude colleagues that you did not get along with; a neutral message wishing them all the best for the future will still be appreciated.Look to the futureAs a specialist recruitment partner, Glocomms is here to support you throughout your career journey, including transition periods. Get in touch with the team for personal advice. Take the next step in your careerGlocomms is a leading talent partner specializing in multiple sectors across Technology, Data Science and Cyber Security. View our range of job opportunities across a variety of rapidly-growing industries and register your CV.

Read More
Cyber Security Talent Insights Image
cyber-security

Cyber Security Talent Insights

​​The cyber security market is predicted to grow to $266 billion by 2027, but with opportunity comes many risks, disruptions and challenges. With skilled business-critical cyber security professionals in high demand, companies must develop effective hiring solutions to capitalize on the market and protect their systems, networks, and data against cyber attacks and security breaches.In this report, our technology talent experts at Glocomms guide you through:Key trends in cyber security, from market risks to hiring approachesTop priorities for candidates in the cyber security fieldInsights from Katie Owston, Associate Vice President at GlocommsKey takeaways and recommendations for both hiring managers and professionalsDownload your copy of the 'Cyber Security Talent Insights' report by completing the form below:​​

Read More
Performance over Presence Image
cloud-infrastructure

Performance over Presence

​For the past year, the high-speed mass adoption of flexible working required employers to redefine and re-examine the workplace. As expected, forward-thinking Tech and IT companies that embrace digital transformation were the ones that continued to thrive in this new environment. If flexible agility, cloud technology, and secure infrastructures are signs of permanent change, what does this mean for technology firms? ​Our latest Career Insight, ‘Performance over Presence’ offers an in-depth analysis into the hybrid-remote approach; a business model which intertwines remote with working present on-site. If the evolving experience-based hybrid approach is to be established, institutions may be likely to explore the potential benefits and caveats to this structure.Does the hybrid-remote model support workers and simultaneously avoid an eroding of company culture? How can leaders manage performance with geographically dispersed teams? Can hybrid working arrangements prevent a cacophony between employers and employees? At Glocomms, these are the questions that have defined our post-pandemic conversations. Perhaps, the hybrid-style approach allows employees to be part of an integrated strategy and offers a window into a more purpose-driven and brighter future for the workplace. ​

Read More
Cybersecurity Market Update Image
cyber-security

Cybersecurity Market Update

​Glocomms' insight on the 2018 Cybersecurity Landscape Across the End-User and Vendor ArenasIntroductionGlocomms was founded on the premise of Cybersecurity becoming the most in-demand and integral part of technology across all industries. In 2017, we saw a multitude of high-profile cyberattacks targeting various companies including Uber, Deloitte and Equifax with the most prominent attacks being WannaCry and Petya. Given the visibility on the cybersecurity market, Glocomms expects to see a large focus on hiring resources and talent to develop and elaborate the hardening of security practices. Such developments include in-house security operation centers (SOC), increased spending on the most innovative threat intelligence products and AI talent and the adoption of automation and cloud security practices in order to properly protect customer and employee data.​The consequences of insufficient security and data protection were recently highlighted by Facebook stocks sliding nearly 15% in a 36-hour window, off the back of an exposed global data breach. Such high profile examples prove that Cybersecurity has the attention of the global media platform and consequently, the market is tightening as the need for remediation in real-time is becoming absolutely imperative.​In order to provide this level of service on a 24x7x365, vendors and end users are adopting advanced solutions. The two main trends we have seen in the first quarter of 2018 have been the integration of Artificial Intelligence & Data Science coupled with the need for Automation & Cloud Security. ​AI/Data Science & Cloud AutomationOur recruitment business gives us a unique look into these trends, as our business model is comprised of two main pillars of focus: Cybersecurity and AI/Data Science. We see the perspective of urgent needs for specific skillsets, as well as the perspective of building expertise through seeking new challenges and career options through working with stealth-mode to IPO vendors as well as the world’s largest global end-users.​When considering the impact AI can have on Cyber, it is clear why artificial intelligence, machine learning and data science will have a huge impact on the ability for software to be able to detect and remediate intrusions and vulnerabilities. Nonetheless, it is who brings the expertise that affects how analytics will impact the industry given these will be the individuals building models to analyze and make sense of the data.​In order to understand the talent pool, we need to understand what motivates individuals to bring their experience to the cybersecurity industry. Most frequently, we see these professionals are motivated by the exposure to working with novel, proprietary, and in this case, unknown data. Additionally, not only the access and exposure to the data is compelling, but also the advanced decision making predictable by the data that draws this talent into the industry.​We have also seen increased attention on the automation and acceptance of risk adverse cloud usage cases, the adoption of MSSP’s that offer integrated threat analytics/ threat management solutions, and new industry trends that dive deeper into the impact AI can have on this ever-changing landscape across the vendor and end-user arenas.​Artificial intelligence, machine learning and data science are being leveraged in a variety of ways and can be exhibited by the huge influx of neural network and deep learning talent transition into the threat analytics arena. Given the sheer magnitude and significance of personal information embedded within the data across industries such as healthcare, financial services and commerce, it is no surprise that data scientists are excited about an opportunity to advance security solutions and play an impactful role on the business/product at large. We know from speaking to these professionals that it is the access and exposure to novel and unique data across the abovementioned industries that drive and motivate their career interests.​Given that Data Science/AI & Cybersecurity are the two focal points of our Glocomms business, it is exciting to see the transfusion of these emerging technology industries shaping the future of the entire technology landscape across all industries.​Investment BanksCloud security is currently the hottest trend from an end-user perspective. This trend is clear, given the activity we have seen across the finance industry as they move towards the adoption of specific usage cases for the various open source cloud platforms. This is exciting because these have historically been some of the most proprietarily kept platforms in the world – some banks even used proprietary coding languages to build their platform! In order to be comfortable with these offerings, the institutions now need to put together documentation on the risk assessments attributed to such solutions. Once these frameworks and usage-cases are clearly determined and outlined, offerings will begin to spread across more and more business units. Currently, large asset managers and global investment banks offer their clients a commercialized version of their front-office risk systems but this is only one portion of what the cross-business platform has to offer.​The next step will be providing an integrated and secure cloud-based solution across all layers of the risk management platforms that each of the various firms offer. Some banks are in the midst of developing a similar type of cross-business platform and although they may be scrutinized for their late-arrival to the party, it might work to their advantage given the new technology currently available because having an opportunity to build a platform from scratch using the latest and greatest products for hardening security layers and adopting cloud offerings allows for a more integrated and theoretically, hardened solution! It seems cloud security will be at the top of the list for most in-demand and least- attainable skill sets in 2018. This has already been evident given the vast hiring and increased compensation bands for cloud security professionals across the end-user arena. We believe the reason for this is these professional all need to not only bring the expert technical skills to the table, but also need to be able to communicate internally and externally with key stakeholders around usage cases for cloud offerings.​Buy-Side PerspectiveFrom a Buy-Side perspective, we have seen large global hedge fund clients looking to hire Encryption Engineers to build proprietary security layers into their existing infrastructure (often cloud-based). This is an obvious step in the right direction, given in the past it seemed many funds were scared by the prospects of putting their ‘secret sauce’ out in the cloud. Additionally, we have seen vast hiring across the Security Incident Event Management (SIEM) arena, most of whom, seem to be moving to Splunk given the versatility of the product. This is also consistent with what we have seen in Investment Banks this year.​From a recruitment standpoint, we see a huge amount of potential on the buy-side in 2018 and expect to see talents being directly targeted from the tech giants as these are the professionals with the most amount of exposure to novel data with the best skillsets for architectural remediation and hardening. ​Vendor PerspectiveAs the vendors continue to offer more and more comprehensive and integrated analytical solutions, the need to stay on top of the market and hire professionals that have experience with the most cutting-edge products becomes even more imperative. We have seen massive hiring across the vendor arena given the influx of investment and the urgent need for this analytical talent. The data being analyzed is ever-increasing and the adoption of AI is not quite keeping up with the workload for the SOC. Thus, we have still seen a steady stream of hiring within these types of positions including: threat hunters, incident responders and security engineers. Not only the vendors are hiring these professionals across the mid-senior level, but also the end-users are building their own in-house SOC’s to reinforce internal security measures creating more intelligent solutions on the network to detect vulnerabilities more quickly and readily. We have seen a large increase this year of around 20% higher than the industry standard this year in the compensation bands for someone with 3-5 years of experience with the abovementioned skills.​Glocomms’ cybersecurity recruitment practice is broken down across the vendor and end-user arenas as we have a commercial practice that offers talent solutions for our vendors across the entire product development lifecycle.As mentioned above, the adoption of intelligent threat hunting, incident response and vulnerability management has been clearly exhibited in a hiring trend of AI talent into the vendor and MSSP arena. ​Candidate TrendsAn interesting trend to note has been the movement of security professionals from the defense industry transition and partner with the financial services employees, in an attempt to continue to broaden the level of expertise and attention on security related problems. This talent is coming out of New York, Boston, Washington DC Metro Area, Texas, and California and heading to new security hubs forming in the Atlanta, South Carolina, Minneapolis and Colorado.Additionally, we have seen a large interest on the Financial Services side to hire talent from the Tech Giants given their background and exposure to massive amounts of data, enterprise level architecture, and forwards thinking technical skillsets.​Given the sheer magnitude of talent required, in the last 5 months, we have placed over 15 individuals for one Cybersecurity start-up that is still in stealth-mode on a retained basis! This project is ongoing and we expect to fill nearly 40+ roles this year with this one client given how perfectly our business models align, we have been able to deliver​Thus far in 2018 we have worked closely with a number of small to mid sized organizations (20-200 employees) on both Coasts undergoing large growth initiatives. Rapid growth is not uncommon for start-ups in this industry; these companies are primarily seeking analytical/AI talent, software engineers who are building their propriety platform and security professionals to advance the offerings. One interesting thing to note has been that security software engineers are receiving larger portions of equity given the impact their development of the platform will have on the multiplier attributed to the growth potential and in turn, value of the business.​For this type of endeavor we recommend a Multi-Hire Campaign (MHC) as we are able to best align our services with a companies specific and often urgent needs directly impacting our clients’ growth through an all-encompassing recruitment solution.​Many of our institutional clients are entirely revamping their security business units given the ever-changing nature of the available technology within the industry. As a result, we have staffed multiple senior, CISO/Strategic Leaders for our end-user clients whom will drive the growth initiatives going forward in 2018 and years to come. ​Mergers & AcquisitionsOur final cybersecurity market trend we wanted to highlight in this report corroborates the above with respect to focus and attention on new, cutting-edge, AI-driven threat management platforms. Security Vendors are being acquired by the big Tech Giants and large cyber players. The options are narrowing and the solutions are becoming far more comprehensive and integrated. Recent examples of this include: SQRRL were acquired by Amazon for $40 million; Phantom Cyber is being acquired by Splunk for $350 million; and CloudLock is bought by Cisco for $293 million. This showcases that the big-players are aware of the trends outlined above and are looking to eat up the market share and gain control of the growth and opportunity that is ravishing the emerging technologies marketplace. ​Diversity & InclusionDiversity and Inclusion awareness is at an all time high in the technology industry, with female representation and wage parity dominating the headlines. At Glocomms we find that identifying good practice, policies and initiatives to improve workforce diversity and inclusion are paramount for our clients. Throughout 2018, alongside our parent company, Phaidon International, we will be running a number of positive, action-orientated client events with relevant guest speakers and industry experts. The common themes of these initiatives will be to share pragmatic and proven successful practices that can tangibly improve diversity and inclusion within the workplace. By doing so our valued clients can enhance their access to wider talent pools for their meritocratic workplaces.​In relation to Cybersecurity – this is one of the most homogenized verticals within the technology arena and female-talent is highly scrutinized for being absent. Males hold 3 out of 4 jobs in tech, but specifically within cybersecurity, the numbers reflect that only 14% of the U.S. workforce in cybersecurity is female. [1] However, out of all of the areas within technology, we believe that Cybersecurity is the field that truly needs a diverse talent pool.​Working in Cybersecurity involves dealing with hugely complex issues and problems – teams need diversity so that problems are attacked with different viewpoints. At Glocomms we focus heavily on sourcing diverse talent within this field and working closely with our clients in creating a work environment to allow such talent to excel in their careers. In the past six months, 24% of the placements we have made in the Cybersecurity field are female. Whilst we still have a long way to go we are dedicated to doing our part to empower females to succeed in the industry.​In addition to females, Glocomms is committed to contributing to and being the driving force of change across all marginalized groups with respect to Diversity and Inclusion. Most recently, on March 24th, Glocomms was a sponsor for the second annual Out in Tech Talks[2], an event that united 400+ leading and aspiring LGBTQ+ and allied voices to advance the dialogue around diversity in tech and address the power of tech to create social change. It was an incredible event, showcasing the progress achieved while illuminating the massive amount of work left to do in reshaping the industry. Impressive panels included the leaders in Diversity and Inclusion at Amazon, Linked in and Youtube, an MD/Business Leader for the Cybersecurity business at a Leading Global Investment Bank and our own Executive Director at Glocomms.​Closing ThoughtsThis report was written and prepared by Giancarlo Hirsch, Vice President at Glocomms and accurate as of March 2018.​Glocomms has offices in NY and SF and is looking to launch offices in Boston, Chicago, Dallas and Charlotte in the coming 18 months. For more information or to get in touch with the team at Glocomms, please do reach out to usa@glocomms.com!​-------About UsGlocomms is a leading specialist recruitment agency for the technology sector. We were founded in 2013 to give clients and candidates peace of mind that the recruitment process is in expert hands. Our continual investment in best-in-class technologies and consultant training enables us to recruit with speed, precision and accuracy. Today, Glocomms provides contingency, retained search and project-based contract recruitment across our offices in San Francisco, New York, London and Berlin. Find out how Glocomms can help you.

Read More

Looking for something specific?

View more blogs