• Office Hours: 8:00 AM – 7:45 PM
Shape
Career Opportunities

Why Work With Us?

Whether you excel in network security, cybersecurity analysis, risk management, or any other aspect of information security, we want to hear from you. We invite you to apply and submit your resume so we can keep you on file for future job opportunities that arise as our company continues to grow and secure new contracts.

Innovative Environment

We’re at the forefront of cybersecurity, working with the latest technologies and tackling complex challenges that keep our clients secure.

Career Growth

Your professional development is important to us. We offer comprehensive training, mentorship programs, and opportunities to advance your career.

Collaborative Culture

Join a diverse team of professionals who share a common passion for cybersecurity. Our collaborative culture encourages open communication, creative thinking, and active contributions from every member of the team.

Impactful Work

At Level Up Security Solutions, you’ll have the opportunity to work on projects that protect businesses from real-world cyber threats.

Career Opportunities

Join our team of cybersecurity experts and become part of a dynamic, forward-thinking company dedicated to protecting businesses and shaping the future of digital security. At Level Up Security Solutions, we believe our people are our greatest asset. We offer a collaborative and innovative environment where talent meets opportunity, and every team member can make a significant impact.

PositionResponsibilitiesSkills Needed
Security AnalystMonitor networks for security breaches, investigate incidents, conduct penetration testing, and develop strategies to prevent cyber attacks.Knowledge of firewalls, VPNs, IDS/IPS, risk assessment tools, and security frameworks (e.g., NIST, ISO 27001).
Security ConsultantProvide expert advice to organizations on how to protect their information systems. Conduct security audits, develop security policies, and implement security measures.Strong analytical skills, knowledge of compliance standards (e.g., GDPR, HIPAA), and experience with various security technologies.
Security EngineerDesign, implement, and maintain security infrastructure. Develop and maintain tools for monitoring and securing systems.Proficiency in scripting and programming languages (e.g., Python, Java), understanding of encryption and cryptography, and experience with cloud security.
Chief Information Security OfficerDevelop and implement an organization’s information security strategy, manage security teams, and communicate security policies to stakeholders.Leadership and management experience, strategic thinking, knowledge of regulatory requirements, and strong communication skills.
Incident ResponderRespond to security incidents, perform forensic analysis, and coordinate with other teams to mitigate threats.Knowledge of digital forensics, experience with incident response tools, and ability to work under pressure.
Security ArchitectDesign and implement secure systems and networks, develop security policies and procedures, and ensure systems comply with security standards.Deep understanding of network architecture, secure software development, and experience with security protocols and technologies.
Penetration Tester (Ethical Hacker)Simulate cyberattacks to identify and exploit vulnerabilities in systems, report findings, and recommend improvementProficiency in hacking tools and techniques, knowledge of various operating systems, and ability to think like a malicious hacker.
Forensic AnalystInvestigate cyber crimes, recover and analyze data from digital devices, and prepare evidence for legal cases.Knowledge of digital forensics tools and techniques, understanding of legal procedures, and strong analytical skills.
Security AuditorEvaluate an organization’s security policies and procedures, conduct audits to ensure compliance with standards, and recommend improvements.Knowledge of regulatory requirements, experience with audit tools, and attention to detail.
Malware AnalystAnalyze and reverse-engineer malware to understand its behavior and develop defenses against it.Understanding of assembly language, experience with reverse engineering tools, and knowledge of malware techniques.

How to Apply

We’re excited to meet professionals who are passionate about cybersecurity and ready to contribute to our mission

  • Review Openings
  • Submit Your Application
  • Join Our Talent Community
Start Now
Thumb
20
Open Position