company? Let’s change
that.
Don't see your company?
Create a company profileCrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?
West Monroe is a digital services firm that was born in technology but built for business—partnering with companies in transformative industries to deliver quantifiable financial value. We believe that digital is a mindset—not a project, a team, or a destination—and it’s something companies become, not something they do. That’s why we work in diverse, multidisciplinary teams that blend management consulting, digital design, and product engineering to move companies from traditional ways of working to digital operating models—and create experiences that transcend the digital and physical worlds. Connected by the 13 founding values that drive our culture, our 2,000 employees work collaboratively across the firm with the belief that your success is our success.
Anduril is a defense products company. Unlike most defense companies, we don’t wait for our customers to tell us what they need. We identify problems, privately fund our R&D and sell finished products off the shelf. Ideas are turned into deployed capabilities in months, not years.
If your career aspiration when you were a child was to fight the “bad guys” while helping the good ones, keep reading. We’re Huntress. Through education, expertise and curiosity, our team protects our partners from today’s increasingly dangerous threat actors. Founded by former NSA Cyber Operators—and backed by a team of human ThreatOps researchers—we’re working to bring cybersecurity to the 99%: those businesses and mom-and-pop shops that lack the resources to defend themselves. Come join the hunt and make your childhood self proud (in a 21st century kind of way).
Cloudflare, Inc. is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.
Verkada protects people, assets, and privacy in physical spaces with its hybrid cloud security solution that makes it simple to manage devices at scale. Our vision is to power the modern, integrated building of the future.
Our mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, connecting businesses with their customers, and helping carriers secure their networks for all.
SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks.
ExtraHop secures the hybrid enterprise through network detection and response. ExtraHop provides cloud-native network detection and response for the hybrid enterprise. Our breakthrough approach analyzes all network interactions and applies cloud-scale machine learning for complete visibility, real-time detection, and intelligent response.
Hybrid conflict. Non-state actors. Digital hacktivists. Tribal politics. Advanced technology. Ancient beliefs. Rapid adaptation. Strategic uncertainty. Declining resources. Rising extremism. Today’s national security challenges are complex and multidimensional, requiring adaptive, interagency responses. For more than a decade, IDS International has delivered innovative training, research and operational civil-military services to help address these 21st century challenges. We are seasoned soldiers, aid workers, diplomats, intelligence professionals, cyber warriors, technical experts, political advisors, and more with a common understanding of how to train for and operate in conflict zones and transitional areas. Our team of interagency experts and field practitioners operate and train together daily, building on our global multidisciplinary understanding of challenges, best practices and new approaches. This wide range of perspectives permits us to serve as a liaison between civil society, military, government and technology to enhance coordination and effectively solve complex security and political problems.
IOActive is the only security consultancy with a global presence and deep expertise in hardware, software, and wetware assessments. Our mission is to make certain your enterprise is more secure in an era of pervasive and emerging threats.
Glympse is a team of people passionate about using location to improve consumer experiences. We are proud to have pioneered temporary, safe and secure location-sharing a decade ago, applying that same boundary-breaking spirit today to help our Fortune 1000 customers improve their customer satisfaction by eliminating the friction and anxiety of...
Information Security. Governance, Risk, and Compliance. Threat Modeling. Secure Development. Information Policy. We understand these. We understand how important they are to your business. We learn your business, and how you use information. We assess your organization's tolerance for risk, and then provide clear insight for your technology operations, development and management.
Trustless Authentication | Trusted Identity
Red Queen Technologies is a trusted information security consulting and security operations provider to midsize finance, transportation, healthcare, and supply/logistics companies, and we’re here to help you secure your product and world from today’s threats.
Applying Zero-Trust principles to supply chain security to make the software lifecycle secure by default.
Command Investigations, LLC is the preferred provider of Surveillance, SIU and Anti-Fraud Programming provided to P&C Carriers, Self-Insured Entities and Third-Party Administrators. Command is not a traditional vendor…but rather a strategic resource and committed investigative partner. We have successfully blended the most sophisticated technology platforms with the finest staff to create a unique combination that leverages man, woman and machine.
We are a venture capital backed security startup that is changing how some of the largest companies in the world combat increasingly sophisticated adversaries. Our technology brings a fresh approach to the long standing battle of fighting well resourced attackers.
CI Security’s technology and analysts provide IT security services to organizations in healthcare, financial services and the public sector — essential components for a functioning society. The company offers managed detection and response services, vulnerabilities scanning, and InfoSec consulting.
Work Your Passion. Live Your Purpose.