fb-pixel
Gain actionable insights about IT Salaries and Trends in Poland 2024.
The demand for skilled IT professionals remains on the rise. Our comprehensive report provides a detailed analysis of the IT job market in Poland, offering valuable insights into the market dynamics.

What will you find in the report?
  • The expanding scope of the IT market in Poland
  • Latest salary trends for IT roles, covering employment types and benefits
  • The demand for skilled professionals in IT roles
I agree to receive updates & other promotional information from Devs Data LLC and understand that I can withdraw at any time. Privacy Policy
Check circle
Thanks for subscribing.
Your gift is on the way.
check icon Link copied

IT Cyber Security Recruitment & Staffing: Our Experience

bookmark
A cybersecurity team collaborating at computer monitors in a modern professional office environment. testimonial
  • Specialized cybersecurity recruitment helps organizations hire faster while reducing security and compliance risk through role-specific technical and trust-based vetting.
  • Working with DevsData LLC leads to shorter time-to-hire, lower mis-hire risk, and stronger alignment between cybersecurity talent and real operational threats.

Introduction

While cyber risk is escalating across every industry, the supply of security professionals with proven, hands-on threat and compliance experience remains critically constrained. Roles such as Security Engineers, threat analysts, and compliance experts require validated experience with real attack scenarios, regulatory audits, and incident response, areas that generic hiring processes are rarely equipped to assess.

The stakes are high. According to Verizon’s 2024 Data Breach Investigations Report, nearly 30% of data breaches involved a third-party vendor or partner with access to internal systems. This represents roughly double the share reported the previous year, underscoring how external dependencies increasingly expose organizations to internal security risks. Hiring the wrong candidate, or relying on insufficiently vetted third-party contractors, can introduce serious risk, particularly in high-compliance or regulated environments.

This challenge is reinforced by urgent global and national trends. As of mid-2024, the global cybersecurity workforce faced a shortage of approximately 4 million unfilled positions, according to the World Economic Forum.

At DevsData LLC, we focus on bridging these critical talent gaps by delivering expert-led cybersecurity recruitment. In this article, we share our refined approach, highlight real-world success stories, and offer actionable insights to help your organization build a high-performing security team capable of defending against today’s most sophisticated threats.

What is cybersecurity recruitment?

Cybersecurity recruitment focuses on identifying professionals who can protect live systems, manage real incidents, and operate within strict compliance environments. The challenge lies in validating hands-on threat experience, regulatory awareness, and trustworthiness, none of which are reliably captured by CVs or generic interviews.

Definition and scope

At its core, cybersecurity recruitment focuses on building teams that protect against unauthorized access, data breaches, and evolving digital threats.

Recruiters in the cybersecurity space must be familiar with a broad range of technical domains. This includes network and cloud security, identity and access management (IAM), and security operations center (SOC) functions. They also need to understand governance, risk, and compliance (GRC), penetration testing and ethical hacking, as well as threat intelligence and incident response.

These professionals work with a wide array of tools and frameworks, including SIEM platforms (Splunk, QRadar), EDR solutions (CrowdStrike, SentinelOne), vulnerability scanners (Nessus, Qualys), firewalls and IDS/IPS systems, as well as cloud-native security services such as AWS Security Hub, Azure Defender, and GCP Security Command Center, alongside compliance frameworks like ISO 27001, SOC 2, and NIST.

Cybersecurity recruiters must also understand regulatory and industry-specific requirements, such as HIPAA in healthcare, PCI DSS in finance, or GDPR for data protection, so they can accurately match candidates to sensitive, high-stakes environments.

Typical roles recruited

Specialized cybersecurity recruitment covers a wide spectrum of roles, including but not limited to:

  • Security Engineers – Design and implement secure systems and infrastructure to prevent attacks.
  • Security Analysts (SOC Analysts) – Monitor systems, detect threats, and respond to incidents in real time.
  • Penetration Testers / Ethical Hackers – Simulate cyber attacks to find and address vulnerabilities before they can be exploited.
  • GRC Specialists – Ensure compliance with internal and external security regulations and frameworks.
  • Cloud Security Architects – Secure cloud infrastructure and ensure resilience in distributed environments.
  • Threat Intelligence Analysts – Analyze attack patterns and adversarial behavior to anticipate and prevent breaches.
  • CISOs / Heads of Security – Develop and lead enterprise-wide security strategies and manage cyber risk at the executive level.

How specialized recruitment differs from general hiring

Category Generalist Recruiter Specialized Cybersecurity Recruiter
Technical Understanding Limited knowledge of cybersecurity tools or concepts Deep understanding of threat models, zero-trust architecture, endpoint tools, etc.
Candidate Screening Relies on resumes and surface-level experience Evaluates real-world skills, certifications (CISSP, OSCP, CEH), and attack-response capabilities
Regulatory Awareness Often unaware of compliance needs Familiar with GDPR, HIPAA, SOC 2, NIST, ISO 27001
Behavioral Vetting Generic soft skills assessment Screens for trustworthiness, discretion, and ability to handle sensitive data
Hiring Alignment Misses nuances in risk posture or security maturity Matches candidates to org’s threat level, culture, and strategic needs
Hiring Risk Higher risk of poor hires and longer onboarding Reduced hiring risk, faster integration, stronger retention

Generalist recruiters often lack the domain depth to evaluate technical competencies or risk context, which is critical in cybersecurity hiring. A specialized cybersecurity recruiter knows how to distinguish between someone who has configured endpoint protection software and someone who architected a zero-trust network model.

It begins with technical screening, where candidates are assessed for relevant certifications such as CISSP, OSCP, CISM, or CEH, as well as their hands-on experience with real-world tools and attack scenarios.

Recruiters must also have a strong understanding of security frameworks and regulatory environments applicable to the role, whether it’s GDPR, NIST, SOC 2, or HIPAA compliance.

Another critical aspect is behavioral vetting, which ensures that candidates demonstrate trustworthiness, discretion, and the ability to work with sensitive or confidential data.

Finally, successful recruitment depends on the candidate’s alignment with the organization’s risk tolerance and security maturity level, ensuring a good long-term fit for both technical execution and strategic growth.

By focusing on threat-specific expertise, industry compliance, and hands-on capabilities, specialized cybersecurity recruiters significantly reduce the risk of a poor hire. They accelerate time-to-hire, improve talent retention, and build teams that can actively defend the organization in an ever-changing threat landscape.

At DevsData LLC, we’ve seen this firsthand across diverse industries. For a European fashion tech company, we built a team of developers with strict API security requirements and customer data protection responsibilities. For Norwegian SaaS firm Memory, we delivered technically rigorous candidates with a strong alignment to GDPR and ISO 27001 principles, helping them maintain high product integrity and compliance.

These and other success stories reflect our ability to meet complex hiring demands where trust, performance, and regulatory sensitivity are non-negotiable.

Key benefits of specialized cybersecurity recruitment

Hiring cybersecurity professionals through a specialized recruitment partner delivers distinct advantages over generalist hiring, empowering organizations to build more effective, resilient security teams.

In a landscape where the cost of a single mis-hire can lead to critical vulnerabilities, expertise in security-specific hiring is non-negotiable. These are the key benefits of partnering with a specialized recruiter:

Access to pre-vetted, highly skilled talent

Specialized recruiters ensure candidates come with proven technical skills, relevant certifications (CISSP, OSCP, CISM, CEH), and real-world exposure to cyber tools and threat scenarios.

Significant reduction in breach-related costs

According to IBM’s 2024 Cost of a Data Breach Report, more than half of breached organizations experienced severe cybersecurity staffing shortages, leading to an additional average cost of USD 1.76 million per breach compared to better-staffed peers. By filling critical roles quickly and accurately, specialized recruitment helps reduce this costly staffing gap.

Faster time-to-hire for niche roles

Cybersecurity talent is fiercely competitive. Filling roles like SOC Analyst or Cloud Security Architect through generalist channels often results in delays and lost candidates. Specialized recruiters maintain pipelines of vetted experts, reducing vacancy durations and limiting risk exposure.

Better long-term fit and retention

Hiring for cybersecurity isn’t just about technical chops, it’s also about integrity under pressure, discretion, and cultural alignment. A candidate mismatched in reliability or mindset can jeopardize systems and team coherence. Specialists ensure candidates align with your organization’s risk tolerance and security maturity, improving engagement and reducing turnover.

Specialized cybersecurity recruitment provides pre-vetted, mission-ready professionals, reduces costly staffing gaps, accelerates hiring in a competitive market, and ensures better alignment with long-term security goals. This enables organizations to proactively defend against today’s evolving threats.

Why cybersecurity recruitment is different from other tech hiring

Cybersecurity roles are judged not by what professionals build, but by the risks they prevent. Unlike developers, whose impact is visible in shipped features and code, cybersecurity specialists succeed when breaches don’t happen and threats are contained before they escalate.

This makes hiring in cybersecurity fundamentally more complex than recruiting for other technical roles. Beyond technical skills, recruiters must assess judgment under pressure, discretion with privileged access, and alignment with an organization’s risk tolerance, qualities that rarely appear on a CV and are difficult to validate through standard interviews.

Experience with security tools is also highly contextual. Familiarity with SIEM, EDR, or cloud security platforms only matters when paired with real-world exposure to specific threat models and compliance environments. Combined with the need for trust and regulatory awareness, this is why cybersecurity recruitment requires a specialized process that generalist agencies often lack.

Do you have recruitment needs?

🎧 Schedule a meeting

Challenges and how we address them

Hiring for cybersecurity roles presents its own set of complexities, from evolving threat landscapes to a scarcity of specialized talent. At DevsData LLC, we meet these challenges head-on with tailored strategies that prioritize precision, speed, and organizational alignment.

Challenge 1: Vague or inaccurate role definitions

Cybersecurity is a broad field, and job titles like “Security Engineer” or “Analyst” often mask vastly different responsibilities. This lack of clarity leads to mismatched candidates and wasted time.

Our solution:
We begin every engagement with structured alignment meetings involving technical leads, CISOs, and hiring managers. These discussions clarify the security frameworks (e.g., NIST, ISO 27001), tools (e.g., Splunk, CrowdStrike), and context (e.g., offensive vs. defensive security), ensuring that the job description accurately reflects the role’s responsibilities and requirements.

Challenge 2: Shortage of skilled cyber professionals

According to the World Economic Forum’s 2025 Global Cybersecurity Outlook, the cyber skills gap has widened by 8% since 2024, with only 14% of organizations confident they currently have the necessary talent. This talent gap is even more pronounced in specialized areas like cloud security or incident response.

Our solution:
We use advanced talent mapping across regions, focusing on untapped markets and diaspora professionals. Our network also includes candidates open to remote work or relocation, giving our clients access to a broader, more qualified pool.

Challenge 3: Evaluating both trust and technical expertise

In cybersecurity, a candidate’s trustworthiness is as important as their technical skills. However, general hiring processes rarely assess both adequately.

Our solution:
We conduct multi-layered assessments including technical scenarios, red team vs. blue team simulations, and behavioral evaluations. Beyond technical acumen, we evaluate soft skills and a candidate’s risk mindset through structured behavioral interviews, discretion-focused scenario testing, and integrity profiling. This includes assessing how candidates handle sensitive data, respond under pressure, and collaborate in high-stakes or regulated environments, traits essential for roles requiring trust, confidentiality, and sound judgment.

Challenge 4: Security clearance and compliance sensitivity

Many roles, especially in finance, defense, or government sectors, require security clearances or deep knowledge of compliance frameworks.

Our solution:
We maintain a vetted pipeline of candidates with existing clearances (e.g., EU Secret, NATO, US DoD) and experience in regulated environments. We also screen for familiarity with relevant legislation, such as GDPR, HIPAA, or PCI DSS.

Do you have recruitment needs?

🎧 Schedule a meeting

Myth vs. reality in cybersecurity hiring

Misconceptions around cyber hiring can lead to strategic missteps and security vulnerabilities. Below, we debunk three common myths and clarify the realities of hiring in this critical domain.

Myth #1: Any IT professional can “learn security” on the job

Some companies assume that developers or network admins can transition into a security role without deep specialization.

Reality:

Cybersecurity demands focused expertise in threat modeling, forensics, penetration testing, or compliance. Unlike generalist IT roles, security professionals must keep pace with evolving adversary tactics and tools, making on-the-job learning insufficient for mission-critical roles.

Myth #2: Certifications alone guarantee competence

It’s a common belief that certifications like CISSP or OSCP automatically validate a candidate’s practical ability.

Reality:
While certifications are useful signals, they don’t replace hands-on experience or contextual problem-solving. True competence comes from applying skills in real-world scenarios, understanding business risk, and aligning security measures with organizational priorities.

Myth #3: Internal teams can always hire faster and better

Some firms think their internal HR or IT teams can fill security roles more effectively than external specialists.

Reality:
Cybersecurity hiring requires niche networks, rigorous screening, and domain fluency that most internal teams lack. Specialist recruiters reduce time-to-hire, increase quality, and mitigate risk, especially for urgent, senior, or high-stakes positions.

Real-world examples from our experience

DevsData LLC website screenshot

Website: www.devsdata.com
Company size: ~60 employees
Founding year: 2016
Headquarters: Brooklyn, NY, and Warsaw, Poland

Founded in 2016, DevsData LLC is a trusted partner in specialized IT recruitment, with a strong track record in placing top-tier talent across cybersecurity, DevSecOps, and infrastructure roles. We go beyond traditional hiring by applying performance-driven strategies that align recruitment efforts with critical business risk, regulatory compliance, and operational continuity.

Our broader expertise in software engineering, cloud infrastructure, and data security enables us to support clients holistically, from sourcing incident response specialists to building entire security teams for regulated industries. With a proprietary candidate pool of over 95000 vetted professionals and a team of 60+ experts across the US and Europe, we combine AI-powered sourcing, rigorous technical screening, and domain-specific assessments to ensure precision and speed in hiring. We operate on a success fee model, meaning our clients only pay when a hire is successfully made, eliminating upfront risk and ensuring full alignment with hiring outcomes. This performance-driven approach, combined with our guarantee period, reflects our commitment to long-term client satisfaction and placement quality.

We’ve successfully supported organizations in Finance, Healthcare, eCommerce, and Government, delivering cybersecurity talent skilled in tools and frameworks such as Splunk, CrowdStrike, Palo Alto, AWS Security Hub, NIST, ISO 27001, and more. Whether the need is for a cloud security architect or a compliance-focused GRC analyst, our tailored approach consistently reduces time-to-hire, improves retention, and strengthens overall security posture.

With over 100 completed projects and 80+ global clients, our work is recognized through 5.0 ratings on Clutch and GoodFirms, a reflection of our commitment to excellence, responsiveness, and long-term client success.

Jonas_Lee testimonial

At DevsData LLC, we apply a performance-driven approach to cybersecurity recruitment that combines deep technical insight with structured, data-backed evaluation. Whether placing SOC analysts, DevSecOps engineers, or compliance leads, our focus remains on aligning talent with real-world security needs and measurable outcomes.

We leverage AI-powered sourcing tools, role-specific assessment workflows, and domain-aligned vetting processes to ensure every candidate we recommend can thrive under pressure and support long-term organizational defense strategies.

Recruiting cybersecurity specialists for ThreadDefence

We partnered with ThreadDefence, a next-gen cybersecurity technology provider, to recruit a Cybersecurity Analyst and a CrowdStrike-focused Security Developer. The analyst role required deep familiarity with incident detection and SIEM integration, while the developer position demanded hands-on experience with endpoint protection APIs and secure automation pipelines.

Key Learning:
This engagement demonstrated the importance of distinguishing between operational vs. platform-level security roles. By tailoring technical assessments to CrowdStrike’s development environment and real-time detection workflows, we ensured candidates were fully aligned with ThreadDefence’s core platform architecture and threat response goals.

Supporting Bayer in building cyber compliance leadership

Bayer, a global pharmaceutical leader, engaged us to recruit a Cybersecurity Compliance Officer for their European operations. The role required understanding of GDPR, ISO 27001, and pharmaceutical data protection regulations, along with the ability to communicate effectively with internal audit and legal teams.

Key Learning:
This role emphasized the increasing overlap between cybersecurity and regulatory affairs. To identify the right candidate, we implemented legal-scenario evaluations, assessed risk communication capabilities, and prioritized cultural alignment within a highly structured corporate environment.

Ethical hacking expertise for a proprietary investment firm

For Caladan.xyz, a Singapore-based proprietary trading and investment fund, we were tasked with hiring an Ethical Hacker to perform vulnerability testing on internally developed FinTech systems.

Key Learning:
The high-stakes nature of FinTech security, combined with the firm’s zero-tolerance risk culture, required us to assess not only offensive security skills, but also trustworthiness and discretion. Our process included challenge-based testing (custom CTF scenarios) and a behavioral integrity screen.

Cloud and DevOps roles with embedded security ownership

Across multiple clients, we’ve recruited Cloud Security Officers, Pentesters, and DevOps Architects with a strong emphasis on infrastructure-level security ownership. These hybrid roles often required cross-functional collaboration between engineering, infrastructure, and GRC teams.

Key Learning:
These cases revealed that technical fluency alone isn’t enough in security-adjacent roles, candidates must also demonstrate systems thinking, collaboration skills, and familiarity with secure CI/CD practices. Our tailored workflows assessed both individual expertise and a candidate’s ability to work in cross-functional, cloud-native environments.

Across industries, from pharmaceuticals and FinTech to infrastructure SaaS, our recruitment experience confirms that technical rigor, context-aware screening, and motivation profiling are essential for building resilient cybersecurity teams. By continually refining our sourcing and assessment methodologies, we ensure that our placements do more than meet technical criteria, they elevate the organization’s entire security posture.

Do you have recruitment needs?

🎧 Schedule a meeting

Tips for evaluating cybersecurity recruiters

Selecting the right recruitment partner for cybersecurity roles is crucial, especially when these professionals are responsible for protecting your systems, data, and reputation. Below are key tips to help you assess whether a recruiter has the technical depth, vetting rigor, and contextual understanding to deliver high-caliber cyber talent.

Ask about their technical screening process

Effective cybersecurity recruiters should use structured assessments to evaluate technical depth, not just scan for certifications. Ask how they test for hands-on skills in areas like penetration testing, SIEM configuration, cloud security, or threat analysis. Look for simulation-based tasks, code walkthroughs, and red/blue team scenarios in their process.

Review case studies and key metrics

A credible recruiter should provide real-world examples of successfully filled roles, ideally in cloud security, SOC, DevSecOps, or GRC functions. Look for data on time-to-fill, candidate retention rates, offer acceptance ratios, and security clearance experience.

Evaluate their understanding of frameworks and tools

Your recruiter should be fluent in cybersecurity tooling (e.g., CrowdStrike, Splunk, Nessus, Fortinet) and frameworks like NIST, ISO 27001, CIS Controls, or SOC 2. They should also understand the implications of each framework in terms of hiring (e.g., hiring for audit-readiness vs. real-time detection).

Check their domain awareness across industries

Cybersecurity threats and compliance requirements differ between sectors; finance, healthcare, defense, and SaaS all demand different expertise. A strong recruiter will know the difference between hiring a PCI DSS specialist for a FinTech firm and a HIPAA-aligned engineer for a hospital group.

Interactive quiz: Do you need a specialized cybersecurity recruiter?

Not sure whether your team would benefit from a specialized recruitment partner? Take this quick self-assessment to evaluate your needs. Count how many times you answer “Yes.”

Quiz Questions

  1. Do your roles require hands-on experience with security tools like SIEM, EDR, or cloud-native controls?
  2. Have you struggled to hire candidates with both security certifications and practical expertise?
  3. Are you spending more than 30 days trying to fill a cybersecurity position?
  4. Have recent hires lacked either integrity, discretion, or technical rigor?
  5. Do your roles require knowledge of frameworks like NIST, ISO 27001, or SOC 2?
  6. Is cultural fit and long-term trustworthiness just as important as technical ability?
  7. Are you hiring for niche areas such as cloud security, red teaming, or regulatory compliance (e.g., HIPAA, PCI-DSS)?

Results

Mostly Yes:
You’ll benefit significantly from partnering with a specialized cybersecurity recruiter. They’ll bring domain fluency, tailored sourcing strategies, and the screening rigor needed to reduce hiring risk and enhance security posture.

Mostly No:
Your current approach may be sufficient for general IT hiring. But as roles become more specialized or risk-sensitive, consider engaging a recruiter with cybersecurity-specific experience to ensure precision and quality.

Conclusion

Hiring for cybersecurity is no longer a matter of simply filling roles, it’s about protecting your organization from increasingly complex and costly threats. The professionals you bring in today will shape your resilience, compliance posture, and long-term operational stability.

At DevsData LLC, we’ve helped companies across finance, healthcare, government, and technology build security teams that don’t just meet requirements, they drive strategic defense and risk mitigation. Our approach is built on deep technical screening, domain fluency, and precision sourcing from a proprietary database of over 95000 vetted professionals.

Whether hiring a single Cloud Security Engineer or building an entire threat detection team, a specialized recruitment partner like DevsData LLC supports faster hiring without sacrificing candidate quality.

Learn more about how we can help at www.devsdata.com or contact our team directly at general@devsdata.com.

Discover how IT recruitment and staffing can address your talent needs. Explore trending regions like Poland, Portugal, Mexico, Brazil and more.

🗓️ Schedule a consultation

Tatia Tatoshvili Copywriter and Marketer

Tatia Tatoshvili is a Marketing and Communications professional with deep expertise in digital strategy and project management. Tatia’s experience includes implementing strategic marketing campaigns, elevating brand visibility, and building partnerships that expand education and job opportunities in the digital sector. She is passionate about fostering innovation and advancing digital literacy to create lasting impact.

virtual assistanceFrequently asked questions (FAQ)

DevsData – your premium technology partner

DevsData is a boutique tech recruitment and software agency. Develop your software project with veteran engineers or scale up an in-house tech team of developers with relevant industry experience.

Free consultation with a software expert

🎧 Schedule a meeting

Yahoo finance logo
Business Insider logo
Reviewed on

DevsData LLC is truly exceptional – their backend developers are some of the best I’ve ever worked with.”

Nicholas

Nicholas Johnson

Mentor at YC, serial entrepreneur

background
team image
Got a project idea or IT recruitment needs?
Schedule a call
with our team
  • check icon Build your project with our veteran developers.
  • check icon Explore the benefits of technology recruitment and tailor-made software.
  • check icon Learn how to source skilled and experienced software developers.
Schedule a call
Rebecca Botvin

Rebecca Botvin LinkedIn

Commercial Director

Tom Potanski

Tom Potanski LinkedIn

Manager

Trusted by
Varner Cubus Skycatch Novartis

Read these next

Enlarged Image
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.

I agree and accept that DevsData LLC will improve the user experience by collecting, analyzing, and cataloging information about the internet addresses my devices have connected to, as well as details about my devices’ specifications and software versions, and by making automated decisions (not involving sensitive data). This agreement remains in effect for the legally binding period or until either party withdraws. Withdrawal will result in the removal of the user’s data. For further details, please see our privacy policy.

We use cookies to provide the best experience for you. More about cookie policy

Book a call with our team

For software development projects, minimum engagement is $15,000.

Prefer email?
Prefer email?
Quote mark

Best backend engineers I've ever worked with.

"I interviewed about a dozen different firms. DevsData LLC is truly exceptional – their backend developers are some of the best I've ever worked with. I've worked with a lot of very well-qualified developers, locally in San Francisco, and remotely, so that is not a compliment I offer lightly. I appreciate their depth of knowledge and their ability to get things done quickly."

Avatar

Nicholas Johnson

CEO of Orange Charger LLC,

Ex-Tesla Engineer,

Mentor at YCombinator

Quote mark

Tailored recruitment process, trusted market expertise.

"DevsData reached out to us, as we've been looking to grow our engineering team in Europe and Poland. Communicating efficiently and professionally, DevsData made a strong impression with their understanding of the recruitment challenges we were facing. They designed a tailored recruitment process for our needs. I was impressed with the technical depth of their approach."

Avatar

Karim Butt

Co-Founder & CTO at GlossGenius, Inc.

Quote mark

Outstanding vendor, 21 engineers hired.

"Out of all the vendors we work with, DevsData clearly stands out. The quality of developers they deliver is beyond what we've received from any other vendor, and they've been able to send profile recommendations very quickly. I'm happy to be their reference for other companies from Israel and talk about their recruitment abilities and what they delivered for us."

Avatar

Ran Eyal

Senior Manager at

ZIM Integrated

Shipping Services Ltd.

Quote mark

Proactive partner, exceptional results.

"DevsData demonstrated a strong degree of proactivity, taking time to thoroughly understand the problem and business perspective, and continuously suggesting performance and usability enhancements. Their app exceeded my expectations. I've worked with DevsData on numerous projects over the last 3 years and I'm very happy. Being both responsive and honest in communication."

Avatar

Jonas Lee

Partner & Executive VP of Verus,

Financial LLC, Investor,

& Serial Entrepreneur

Rebecca Botvin's avatar

Rebecca Botvin Commercial Director

Tom Potanski's avatar

Tom Potanski Manager