Our Story

Intercast Global began in 2009 with one goal in mind: to partner with clients in emerging and under-serviced technology areas. With access to 25,000+ cybersecurity and data security specialists, we support enterprise security programs through both outcome-based services and embedded delivery models.

What began as a Cisco based recruiting practice has now evolved, one technology at a time, into a company dedicated to supporting  cybersecurity programs through services, advisory expertise, and specialized security and data talent.

Although our niche has expanded we remain true to our founding philosophy. As we grow, our expertise and reach continue to deepen, our commitment to the organizations and professionals we work with remains stronger than ever.

Team image 1

Cybersecurity Talent & Capability Solutions

Organizations across the cybersecurity ecosystem including enterprises, security technology vendors, IT solution providers, and managed security service providers partner with Intercast when they need highly specialized security expertise. We leverage our niche focus to help organizations identify and engage only qualified, certified and experienced professionals who can strengthen security programs and support critical initiatives.

We are passionate about our craft and pride ourselves to provide meaningful expertise while respecting the time and priorities of the organizations we support.

Team image 2

The Intercast Approach –  Continuous Engagement with the Security Community

‘All Day Every Day’ at Intercast, we remain deeply connected to the cybersecurity community across a wide range of domains to stay closely aligned with how modern security teams operate and the expertise they require.

Cybersecurity remains one of the most specialized and competitive areas in technology. the best person for your roles is already working somewhere else – you need a specialist who can quickly target these employed individuals and recruit them for your company.

Our team works closely with security leadership and hiring teams to clearly understand the technical requirements, operational context, and long-term objectives of each engagement. We then “headhunt” candidates who have the skills, experience and certifications you require.

Rather than relying on static databases, our approach is proactive and relationship-driven, allowing us to identify specialized cybersecurity expertise aligned with our clients’ security priorities and evolving program needs.

Who We Are

Photo of David Machlis

David Machlis

416-583-1950
[email protected]

Photo of Colin Rose

Colin Rose

416-583-1956
[email protected]

Photo of Kristofer Faric

Kristofer Faric

416-583-1951
[email protected]

Photo of Jerome Turkalj

Jerome Turkalj

416-583-1952
[email protected]

Photo of Nebai Tecleab

Nebai Tecleab

416-583-1958
[email protected]

Photo of Pawanpreet Kaur

Pawanpreet Kaur

416-583-1955
[email protected]

Photo of Taylor Enright

Taylor Enright

416-583-1959
[email protected]

Photo of Arsalaan Mahmood

Arsalaan Mahmood

416-583-1961
[email protected]

Photo of Aagam Shah

Aagam Shah

416-603-6518
[email protected]

Photo of Eric Pronio

Eric Pronio

416-306-8292
[email protected]

Photo of Meghna Tokas

Meghna Tokas

416-583-3821
[email protected]

Photo of Suryatej Umekar

Suryatej Umekar

416-583-1956
[email protected]