CyrusOne Announces New Senior Hire in Seattle to Support Hyperscale and Cloud Growth
CyrusOne a premier global data center REIT, today announced that John McCloskey has been hired to serve as the new Vice President of Hyperscale and Cloud Sales for CyrusOne. Based in Seattle, John brings 30 years of technology sales experience to CyrusOne. He will oversee enterprise cloud customers and help lead the development of the next generation of hyperscale accounts.
Prior to joining CyrusOne, John served as Senior Vice President, Global Sales at Akamai Technologies, where he led go-to-market within Akamai’s $1.5B web performance and security division. Prior to Akamai, John spent 6 years at Microsoft in a variety of leadership roles, including Global Head of Cloud + Enterprise Sales. He has also worked for Amazon Web Services as well as Oracle and IBM.
“Seattle continues to be a high growth market for CyrusOne, and we are thrilled to bring John onboard to help lead our growing portfolio of hyperscale cloud customers,” said John Gould, executive vice president and chief commercial officer, CyrusOne. “In his 30 years of experience he has built best-in-class sales teams for some of the world’s most impressive and largest technology organizations. John’s presence in the Seattle market will help spearhead our expansion in the region. His leadership will also be deployed across our enterprise cloud customers across the globe.”
CyrusOne operates more than 45 data center facilities across the United States, Europe, Asia and LATAM to provide customers with the flexibility and scale to match their specific IT growth needs. CyrusOne facilities are engineered to include the power-density infrastructure required to deliver high availability, including an architecture with the highest available power redundancy.
Industry: Data Centre News
- Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project, £75,000+
- United Kingdom
Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project DCL Search exclusive Identifier Project. To join a financial services business. Key hire to be part of / influence the cyber security capability and direction within the business. Hands on experience managing / monitoring / upgrading / implementing / using the following; · Firewalls: SonicWall and or Palo Alto · NAC: Cisco OR Macmon · WAF | CASB | MDM Experience with SIEM monitoring / vulnerability analysis also highly desirable. MUST have current hands on experience with vulnerability management tooling and best practice. Current Financial services is a nice to have. Learn new skills working within a collaborative team. Grow as a security professional.
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.