Identify Recruiting Logo


‍‍‍‍‍‍Pen Testing

Copyright Identify Security 2018 ©‍‍‍

Identify Security‍‍‍ is a niche IT recruiting firm that was created to improve the efficiency of applying highly talented IT professionals to solve technology and security related business challenges.


[email protected]

  • Program Strategy Design and Development
  • Program Capability Maturity Assessment
  • Security Engineering:
    • SDLC touchpoints
    • DevOps Integration
    • SAST, DAST, IAST and RSAP implementation or optimization

Identify Security understands how DevOps is disrupting and transforming the Software Development Lifecycle. ‍‍‍

The ability to meet the demands of Continuous Development Continuous Deployment is changing the very nature of how Application Security team’s support their internal development customers.

Identify Security has been on the forefront of creating innovative talent pipelines to help our clients align their application and Product Security talent to meet industry changes.

Daily we are helping our clients to deliver  their  security programs, expand their security testing capabilities, automate their vulnerability management lifecycle and continuously scripting security automation.

Starting AppSec Journey: we can help from your first security professional, provide technical skills and pr‍‍‍oven experience to set your program up for success.

Mature AppSec Environment: we can provide you with secure software developers with expertise in frontend and backend development to help you build new security services.


‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍Learn Mor‍‍‍e About

Though the challenges businesses face are growing larger daily, the team behind Identify is more than large enough to handle new threats as they arise.

‍‍‍‍‍‍On-Demand Pen‍‍‍ Testing

Our Common Engagements‍‍‍:

  • ‍‍Threat Modeling
  • Code Reviews
  • Penetration Testing/Ethical Hacking
  • On-Demand Penetration testing:
  • Secure Software Development
  • Vulnerability Management
  • Secure Developer Training

Builders, Breakers, Defenders, and those SMEs who blend...‍‍‍‍‍‍

Application Security