Close

Protect your business and reputation by hiring the best

The business landscape is changing daily, with new risks and attack vectors coming from all directions. With the emergence of cloud computing, business data can be held in any country and accessible by anyone, including competitors. Candidates sometimes have difficult in attracting and securing the best for their IT security jobs, we work hard to keep abreast of industry knowledge, best practices and finding the best candidates.

To best protect our clients we attract, engage and recruit the best cyber security and risk candidates, to deliver world class protection.

The types of engagements we recruit for includes:

  • Chief Security Officers (CISO)
  • Risk Managers
  • Cyber security professionals
  • Security Architects
  • Penetration testers
  • Governance Managers
  • Security engineers – all levels

Our clients have the confidence that our candidates are fully vetted, and have the practical experience and certification to deliver robust security measures.


Key skills required for technology expert positions:

  • Chief Security Officers (CISO) – security focused, risk management, auditing, business continuity
  • Risk Managers – risk analysis, ISO 31000, vulnerability assessments
  • Cyber security professionals – Firewalls, IDS, penetration, vulnerabilities, patching
  • Security Architects – stack understanding Microsoft/Linux, database security, web architect, reverse proxies, encryption, TOGAF
  • Penetration testers – network assessments, physical security, web assessments, social engineering
  • Governance Managers – IT Governance, COBIT, AS8015-2005, CMM, Balance Scorecards
  • Security engineers – all level – deep understanding of network and software security, understanding of confidentiality, integrity and availability of data

IT Security jobs vary from client to client, but essentially they all require an analytic mind, level headed and focused personally during an incident and great communication skills.