Application Security

Find vetted application security experts

Alponsus Ajayi
Alponsus Ajayi
Alponsus Ajayi
Greater Houston
Senior Security Consultant
Consulting Program Evaluation
Priscilla Rumbeiha
Priscilla Rumbeiha
Priscilla Rumbeiha
Los Angeles, California, United States
Senior Cybersecurity Consultant
PowerPoint Microsoft Office
Stephanie Metzler
Stephanie Metzler
Stephanie Metzler
Mars, Pennsylvania, United States
Security Consultant
Research Teamwork
Abdul Zahid
Abdul Zahid
Abdul Zahid
Austin, Texas, United States
Senior Consultant
Amazon Web Services (AWS) Programming
Leticia Gomes
Leticia Gomes
Leticia Gomes
Dallas, Texas, United States
Cyber Security Consultant
Communication Problem Solving
Mike Janowski
Mike Janowski
Mike Janowski
Greater Chicago Area
Senior Security Consultant
Penetration Testing Reverse Engineering
Michael Jansen
Michael Jansen
Michael Jansen
San Antonio, Texas Metropolitan Area
Senior Managing Consultant
Team Leadership Leadership
Yaadhavi D
Yaadhavi D
Yaadhavi D
Seattle, Washington, United States
Senior Security Consultant
Information Security Incident Response
Brian Liu
Brian Liu
Brian Liu
Los Angeles, California, United States
Application Security Consultant
Medical Devices C++
Ray Lo
Ray Lo
Ray Lo
San Ramon, California, United States
Director, Cybersecurity SSDLC Engineering
Agile Methodologies Perl
Emily Hendrickson
Emily Hendrickson
Emily Wohl Hendrickson
Clayton, North Carolina, United States
Senior Principal Security Analyst
Intrusion Detection Computer Forensics
Zach Varnell
Zach Varnell
Zach Varnell
Lithia Springs, Georgia, United States
Information Security Consultant
Network Security Information Security
Nathan Ring
Nathan Ring
Nathan Ring
Baltimore, Maryland, United States
Senior Security Consultant
Wireshark Metasploit
Julie Cissp
Julie Cissp
Julie Newton Cissp
Austin, Texas, United States
Senior Director of Information Technology
Leadership Security Awareness
Ella Petreski
Ella Petreski
Ella Petreski
New York City Metropolitan Area
Cyber Security Consultant
C++ Python (Programming Language)
William Woodford
William Woodford
William Woodford
Inwood, West Virginia, United States
Lead security analyst
Information Security Security
Holly Gannon
Holly Gannon
Holly Gannon
New York, New York, United States
Content Reviewer
Art Therapy Play Therapy
Alan Debaene
Alan Debaene
Alan Debaene
Madison, Wisconsin, United States
Senior Cybersecurity Engineer
SCCM Active Directory
Steve H
Steve H
Steve H
Great Malvern, England, United Kingdom
Senior Security Consultant
Information Security Computer Security
Brian Ajayi
Brian Ajayi
Brian Ajayi
Baltimore, Maryland, United States
Senior Security Consultant
Customer Service Emergency Management
Nathan Taylor-Hoover
Nathan Taylor-Hoover
Nathan Taylor-Hoover
Austin, Texas, United States
Director of Information Security
Penetration Testing Computer Security
Rosemary Arends
Rosemary Arends
Rosemary Arends
Portland, Oregon, United States
Senior Cybersecurity Controls Consultant
Project Management Technical Writing
Corey Shell
Corey Shell
Corey Shell
Lexington, Kentucky, United States
Senior Cybersecurity Consultant
Troubleshooting Information Security
Jeremy W
Jeremy W
Jeremy W
Austin, Texas Metropolitan Area
Senior Cybersecurity Program Lead
Security Protocols Security Controls
Kameron Oscp
Kameron Oscp
Kameron Tinsley - Oscp
Tempe, Arizona, United States
Senior Security Consultant 1
Programming Windows
Henry Sykes
Henry Sykes
Henry Sykes
Philadelphia, Pennsylvania, United States
Professional Writer
SQL Java
Melissa R
Melissa R
Melissa R
Austin, Texas Metropolitan Area
Associate Director Cybersecurity Engineering
Agile Methodologies Project Management
Mubasser Kamal
Mubasser Kamal
Mubasser Kamal
Greater Minneapolis-St. Paul Area
Senior Security Consultant
Agile Project Management Front-end Development
Gilberto Arizpe
Gilberto Arizpe
Gilberto Arizpe
Houston, Texas, United States
Senior Cybersecurity Consultant
IEC 62304 NIST 800-53
Amanda Curry
Amanda Curry
Amanda Curry
Austin, Texas, United States
Senior AI Specialist
Guru Knowledge Management Software Artificial Intelligence (AI)
Mark Lucas
Mark Lucas
Mark Lucas
Greater Chicago Area
SAP Lead Security Analyst
SAP SAP Implementation
Lauren Walker
Lauren Walker
Lauren Walker
Dallas, Texas, United States
Senior Technology Consultant | Cybersecurity
Cyber Program Assessment Agile Project Management
David Gaudio
David Gaudio
David Gaudio
Greater Chicago Area
Senior Content Writer
Web Content Writing Digital Strategy
Michael Holmes
Michael Holmes
Michael Holmes
Spring Valley, California, United States
Senior Security Consultant
SIP Trunking Unified Communications
Jamil Haider
Jamil Haider
Jamil Haider
Buffalo, New York, United States
Cybersecurity Senior Solutions Consultant
Penetration Testing Information Security
Kumpa Chansombat
Kumpa Chansombat
Kumpa Chansombat
Austin, Texas, United States
Sr. Cybersecurity Consultant
Microsoft SQL Server Microsoft SQL Server 2005 / 2008
Andrei Scutariu
Andrei Scutariu
Andrei Scutariu
London, England, United Kingdom
Senior Security Consultant
C Java
Dharmen Samant
Dharmen Samant
Dharmen Samant
Round Rock, Texas, United States
Senior Security Consultant
Business Process Improvement Risk Assessment
Rishidhar V
Rishidhar V
Rishidhar V
Austin, Texas, United States
Senior Information Security Analyst
Active Directory Network Security
Aishwarya Ravishankar
Aishwarya Ravishankar
Aishwarya Ravishankar
Bloomington, Illinois, United States
Senior Cyber Security Consultant
Data Security IT Risk Management
Christopher Motley
Christopher Motley
Christopher Motley
San Antonio, Texas, United States
Cyber Security Consultant
Network Security Security Clearance
Jared Newcomer
Jared Newcomer
Jared Newcomer
Warrenton, Virginia, United States
Senior Cybersecurity Consultant
Teamwork Critical Thinking