contact

#recruiting focus

 

let’s meet your needs

 

We know what we are talking about. As established recruiting experts, we are here to answer your questions when it comes to your information security career.

We are specialised in the domain of information security. That means we understand your individual needs as a candidate or as a potential employer.

iam & pki

Join potential employers in the following positions, to name a few:

  • Identity and Access Management (IAM) Engineer – read more
  • Identity Active Directory Engineer
  • Identity and Access Management Architect
  • Identity and Access Management Solutions Designer
  • Senior Identity Engineer – PKI / MFA
  • Ping Identity Technical Support Engineer

cloud security

Join potential employers in the following positions, to name a few:

  • cloud identity technical support engineer – read more
  • senior cloud architect –
    read more
  • cloud security consultant

OT-, infrastructure-, & network-security

Join potential employers in the following positions, to name a few:

  • Network Security Engineer
  • Network Security Architect
  • IT Security Engineer
  • OT Security Specialist

security incident & event management

Join potential employers in the following positions, to name a few:

  • SOC Analyst
  • SOC Team Lead
  • SOC Manager

pen testing & app security

Join potential employers in the following positions, to name a few:

  • Cyber Security Pen Tester
  • Cyber Security Ethical Hacker
  • Cyber Security Applications Engineer
  • Cyber Security Applications Consultant
  • Cyber Security Applications Manager

cryptography

Join potential employers in the following positions, to name a few:

  • Cryptography Engineer
  • Cryptography Consultant

threat & vulnerability management

Join potential employers in the following positions, to name a few:

  • Head of Information Technology
  • Information Security Manager (ISO)
  • Vulnerability Management Analyst
  • Vulnerability Management Security Engineer
  • Cyber Threat Analyst

digital forensics & incident response

Join potential employers in the following positions, to name a few:

  • Cybersecurity Forensics Consultant
  • CSIRT Consultant

information security management, governance, risk & compliance

Join potential employers in the following positions, to name a few:

  • Chief Information Security Officer (CISO)
  • Information Security Officer (ISO)
  • IT Compliance Manager
  • IT Risk & Compliance Director
  • Risk Reporting Analyst
  • Business Analyst Governance, Risk and Controls
  • GDPR Manager
  • Chief Data Officer
  • Data Protection Officer
  • Risk, IT Risk, GRC or GDPR Consultant
  • Compliance and Operational Risk Supervisor
  • Governance Risk & Compliance Consultant

unsolicited application

 

In order to comply with the GDPR, we only
accept applications via upload.

#community blog

good to know

Immerse yourself in the dynamic world of cybersecurity. Here you will find the latest developments when it comes to all things IT-security. Gain valuable industry insights from articles, videos and events or get actively involved and inspire our community with your own contributions. Get to know exciting people, discover ambitious employers and expand your network.

 

find out more