Decision Makers
Senior Project Manager
This Senior Project Manager is in charge of making important choices. E-mail: n****@thunderbird.com, Phone: 12066820295 is available on SoftwareOfficial.
Chief Operating Officer
They oversee business operations of the company and ensure that its operational and financial procedures are correct. E-mail: c****@fastmail.com, Phone: 12066820295 is available on SoftwareOfficial.
Company Details
Last Update
Jul 14, 2022
Doing business as
LEVIATHAN SECURITY GROUP, INC
Location
3220 1St Ave S SUITE 100, Seattle, WA 98134
900 1 Ave S, Seattle, WA 98134
Phone
(***) ***-0295
Industry
Computer & Network Security
Computer Related Services
Specialties
Risk Assessment and Management
Information Security Consulting
Security Strategy Development
Code Review and Design, SDL
Founded
2006
Number of Employee
11-50 employees
NAICS
541 - Professional, Scientific, and Technical Services
FAQs about decision-makers at Leviathan Security Group
What address or location can Leviathan Security Group be found in?
The company Leviathan Security Group is registered in Seattle, Washington.
What are the industries connected with Leviathan Security Group?
The industries connected with the company Leviathan Security Group are Computer & Network Security and Computer Related Services.
Is there any phone number of Leviathan Security Group?
The phone number of the company Leviathan Security Group decision-makers is 12066820295.
What are the names of the main decision-makers in Leviathan Security Group?
The decision-makers of this company are Chad Thunberg, Nadja Honeywell etc.
What are the professions of the main decision-makers in Leviathan Security Group?
The professions of the company decision-makers are Senior Project Manager or Chief Operating Officer etc.
What is the other name of Leviathan Security Group?
The alias for the company Leviathan Security Group is LEVIATHAN SECURITY GROUP, INC.
What are the specialties of Leviathan Security Group?
The specialties for Leviathan Security Group are Risk Assessment and Management, Information Security Consulting, Security Strategy Development, Code Review and Design, SDL, and Evaluate Software and Hardware