The choice is yours...

 

Here at ThreatLocker™, we believe that you should choose what's happening on your network.  Join us to regain control of your computer systems from cybercriminals and control your own destiny.

ThreatLocker™ has built a suite of tools that help businesses, government agencies, and schools to take control of their networks.

 

Founders

Danny Jenkins - CEO

Danny Jenkins
Chief Executive Officer

Two decades of experience building and securing corporate networks. A technical guru with a deep understanding of corporate I.T. and security, with an entrepreneurial background. Danny has founded and held multiple previous C.E.O and C.T.O positions in cyber companies. 

sami2.png

Sami Jenkins
Chief of Staff

Over 15 years experience working with cyber startups. A strong background in building networks and teams around cybersecurity. 

John headshot.jpg

John Carolan
Chief Operating Officer

Over 7 years in development and operations of global infrastructure. John has a deep understanding of what is needed to run a global network. 

 

Associates & Staff

Joseph Davilla
Head of Internal Business Development

U.S. Army Veteran and Majoring in Electrical Engineering. Joseph brings structured and technical approach to customer development in cybersecurity. 

 

Austin Goodluck
Application Hunter

 

George Siragusa 

Sr. Business Adviser and Strategist to Growth Businesses. An experienced former Fortune 5 company executive, retired senior Naval Officer-turned Adjunct Professor and Small Business consultant, George provides entrepreneurs with needed street-wise leadership, sales, marketing and execution guidance

 

Open Positions


Internal Sales

Ambitious highly motivated telesales people to join our team and help spread the word that choice is the best way to secure businesses. 

 

Qualifications

  • Good understanding of business and cybersecurity needs. 
  • Cheerful disposition

Application Definition Engineer

ThreatLocker™ is made great by our market leading application database. The ability to use predefined application sets in key in accurate an unbreakable cybersecurity.  

Qualifications

  • Mathematical or computer science
  • Logical thinker. 
  • Understanding of operating architecture

Apply

Name *
Name
http://