Cyber competences2023-01-23T13:54:04+00:00

An overview of our fields of competence

We move extensively in the cyber security world and fill positions with outstanding individuals in almost all disciplines. Below please find an overview of the relevant fields of competence.

IAM & PKI

IAM & PKI

Join our clients in the following positions:

  • Identity and Access Management (IAM) Engineer
  • Identity Active Directory Engineer
  • Identity and Access Management Architect
  • Identity and Access Management Solutions Designer
  • Senior Idendity Engineer – PKI / MFA
  • Ping Idendity Technical Support Engineer

Cloud Security

Cloud Security

Join our clients in the following positions:

  • Cloud Identity Technical Support Engineer
  • Senior Cloud Architect
  • Cloud Security Consultant

Perimeter, Infrastructure & Network Security

Perimeter, Infrastructure & Network Security

Join our clients in the following positions:

  • Network Security Engineer
  • Network Security Architect
  • IT Security Engineer

Security Incident & Event Management

Security Incident & Event Management

Join our clients in the following positions:

  • SOC Analyst
  • SOC Team Lead
  • SOC Manager

Cryptography

Cryptography

Join our clients in the following positions:

  • Cryptography Engineer
  • Cryptography Consultant

Pen Testing & App Security

Pen Testing & App Security

Join our clients in the following positions:

  • Cyber Security Pen Tester
  • Cyber Security Ethical Hacker
  • Cyber Security Applications Engineers
  • Cyber Security Applications Consultants
  • Cyber Security Applications Managers

Threat and Vulnerability Management

Threat and Vulnerability Management

Join our clients in the following positions:

  • Head of Information Technology
  • Information Security Manager (ISO)
  • Vulnerability Management Analyst
  • Vulnerability Management Security Engineer
  • Cyber Threat Analyst

Digital Forensics & Incident Response

Digital Forensics & Incident Response

Join our clients in the following positions:

  • Cyber Security Forensics Consultant
  • CSIRT Consultant

Informations Security Management, Governance, Risk & Compliance

Informations Security Management, Governance, Risk & Compliance

Join our clients in the following positions:

  • Chief Information Security Officer (CISO)
  • IT Compliance Manager
  • IT Risk & Compliance Director
  • Risk Reporting Analyst
  • Business Analyst Governance, Risk and Controls
  • GDPR Manager
  • Chief Data Officer
  • Risk, IT Risk, GRC or GDPR Consultant
  • Compliance and Operational Risk Supervisor
  • Governance Risk & Compliance Consultant

Insights

Go to Top