
Ping Identity
Secure Identity Defined.
Fortinet is a global leader in broad, integrated, and automated cybersecurity solutions. The company’s mission is to deliver the most innovative, highest performing network security fabric to secure and simplify your IT infrastructure. Fortinet secures the largest enterprise, service provider, and government organizations around the world. The company’s broad portfolio of solutions enables organizations to securely accelerate their journey to digital transformation. Fortinet’s Security Fabric platform delivers security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses. The company’s solutions are backed by FortiGuard Labs, an industry-leading threat intelligence and research organization.
Report this company
Named Account Manager – Public Sector Location: Zurich – SwitzerlandAs a Named Account Manager, you will play an integral role in new business pitches, hold responsibility for the effective on-boarding of…

EMEA Recruiter As Fortinet continues to experience hyper growth – 30% growth targeted for FY26 we are looking for a professional recruiter to join our existing team. In a fast growing…
Some companies operating in Computer & Network Security industry.

Secure Identity Defined.

Wiz is a cloud security platform that helps organizations proactively identify, prioritize, and remediate risks across their cloud environments.

We empower organizations to securely transform their networks and applications with cloud-native Zero Trust security solutions.

Recorded Future secures the world by empowering businesses, governments, and other organizations to stay one step ahead of today’s relentless threat actors.

Empower businesses to build trust

Entrust offers solutions critical to enabling trust for multi-cloud deployments, mobile identities, hybrid work, machine identity, electronic signatures, encryption and more.

Use Intruder for real-time discovery and prioritization of attack surface weaknesses. Focus on the fixes that matter.

The architect of exposure management, helping you know, expose and close cyber risk with robust cloud security and vulnerability management tools.
Jobicy
614 professionals pay to access exclusive and experimental features on Jobicy
Free
USD $0/month
For people just getting started
Plus
USD $8/month
Everything in Free, and: