IT Managers in organisations of all sizes and sectors are increasingly concerned about the rapid growth of advanced threats and cyber-attacks. With global digitalisation and as businesses continues to scale up and competes to improve their services with new Cloud services and products, it seems that everyone is playing catch up trying to close the security gap.
We place the best Cyber Security professionals into a wide variety of businesses and organisations from Global Big 4 Consultancies, Security Vendors and large enterprise clients. Areas covered include Security & Governance, Threat Management, and Vulnerability Management (Including Penetration Testing) , Incident Response (including Forensics) and, Compliance Management
Access Control, Arcsight Asymmetric Cryptography, Authentication, Border Gateway Protocol (BGP), Anti-Virus, Business Continuity, Computer Emergency Response Team (CERT), Configuration Management, Cryptography, Cyberark, Data Encryption Standard (DES), Decryption, Demilitarized Zone (DMZ), Denial of Service, Discretionary Access Control (DAC), Dynamic Routing Protocol, Encryption, Ethical Hacking, Firewalls, Identity Management, Malware, OSI Layers, Pharming, Phishing, PKI, Risk Assessment, Security Policy, Session Hacking, Threat Assessment, Token Ring, Topology, VPN,CISSP, CEH, CFHI, ENCE, CCCE, CEIC, GCFA, ECSA, GCFE, GIAC, GCIH, GWAPT,GPEN, GCIA GSE, CREST, ISO 27001, OSCP