"Culture eats strategy for breakfast."

Peter Drucker

Learn More

Cyber Security Recruitment

Technologies

Technologies

  • Identity Access Management
  • Privileged Access Management
  • Network Security
  • Information Security
  • Application Security
  • Endpoint Security
  • Cloud Security
  • SAP Security
  • Malware
  • Forensics
  • Incident Response
  • Risk Management
compliance

Compliance

  • NIST
  • NERC
  • ISO 27K Series
  • PCI-DSS
  • HIPPA
  • SOX
  • GDPR
  • FedRAMP
  • FISMA
Roles

Roles

  • Architect
  • Developer
  • Security Engineer
  • Program Manager/Project Manager
  • Product Management
  • Product Marketing
  • Technical Writer
  • Security Operations
  • Sales Professionals
  • Security Researchers
  • Threat Hunters
  • TAM
  • CISO
Engagements

Engagements

  • Contract Staffing (domestic/off-shore)
  • Staff Augmentation
  • Full Time Recruitment
  • Professional Services Augmentation
  • Recruitment Process Outsourcing

Confidentiality

Information you enter on our website or give us via questionnaire or by telephone will be stored securely and only used to improve the services we offer.

Learn More

Upcoming Events

Cisco Live!

May 31- June 4 2020

Las Vegas, NV

RSA Conference

Feb 23- Feb 27 2020

San Francisco, USA

Security B Sides Toronto

October 5-6 2019

Toronto, Canada

Toronto CISO Executive Summit

December 9 2019

Toronto, Canada

Black Hat

March 31- Apr 3 2020

Las Vegas, USA

Current Jobs

Current Job Postings

View More
Profile Examples

Profile Examples

Threat Hunter/ Threat Intelligence Analyst

Certifications: CEH , CISSP, CISM, OSCP, SANS-GCIA GPEN GCIH GWAPT GSEC, CCNA-Sec, CCNP-Sec, (DoD, TSC Clearance)

Vendors: SIEM = HP ArcSight, RSA Security Analytics, IBM QRadar,LogRhythm SIP, Mcafee EMS, Splunk ES, AlienVault OSSIM | VM = Tenable Nessus, QualyGuard, Rapid7 Nexpose, Mcafee VM, Ncircle Nmap | Pentesting = Burpsuite, Metasploit, WireShark, Open Source

Technologies: Incident Response, IDS/IPS, Digital Forensics, Threat Analysis, SIEM, Network Security, Firewalls, Penetration Testing, Vulnerability Scanning, Malware Analysis, Reverse Engineering, TCP/IP, Security Research

Customer GAP: Knowledge of leading SIEM technologies (HP ArcSight)

View More