Cyber competences2021-12-23T11:34:11+00:00

An overview of our fields of competence

We move extensively in the cyber security world and fill positions with outstanding individuals in almost all disciplines. Below please find an overview of the relevant fields of competence.

IAM & PKI

IAM & PKI

Join our clients in the following positions:

  • Identity and Access Management (IAM) Engineer
  • Identity Active Directory Engineer
  • Identity and Access Management Architect
  • Identity and Access Management Solutions Designer
  • Senior Idendity Engineer – PKI / MFA
  • Ping Idendity Technical Support Engineer

Job portal

Cloud Security

Cloud Security

Join our clients in the following positions:

  • Cloud Identity Technical Support Engineer
  • Senior Cloud Architect
  • Cloud Security Consultant

Job portal

Perimeter, Infrastructure & Network Security

Perimeter, Infrastructure & Network Security

Join our clients in the following positions:

  • Network Security Engineer
  • Network Security Architect
  • IT Security Engineer

Job portal

Security Incident & Event Management

Security Incident & Event Management

Join our clients in the following positions:

  • SOC Analyst
  • SOC Team Lead
  • SOC Manager

Job portal

Cryptography

Cryptography

Join our clients in the following positions:

  • Cryptography Engineer
  • Cryptography Consultant

Job portal

Pen Testing & App Security

Pen Testing & App Security

Join our clients in the following positions:

  • Cyber Security Pen Tester
  • Cyber Security Ethical Hacker
  • Cyber Security Applications Engineers
  • Cyber Security Applications Consultants
  • Cyber Security Applications Managers

Job portal

Threat and Vulnerability Management

Threat and Vulnerability Management

Join our clients in the following positions:

  • Head of Information Technology
  • Information Security Manager (ISO)
  • Vulnerability Management Analyst
  • Vulnerability Management Security Engineer
  • Cyber Threat Analyst

Job portal

Digital Forensics & Incident Response

Digital Forensics & Incident Response

Join our clients in the following positions:

  • Cyber Security Forensics Consultant
  • CSIRT Consultant

Job portal

Governance, Risk & Compliance

Governance, Risk & Compliance

Join our clients in the following positions:

  • Chief Information Security Officer (CISO)
  • IT Compliance Manager
  • IT Risk & Compliance Director
  • Risk Reporting Analyst
  • Business Analyst Governance, Risk and Controls
  • GDPR Manager
  • Chief Data Officer
  • Risk, IT Risk, GRC or GDPR Consultant
  • Compliance and Operational Risk Supervisor
  • Governance Risk & Compliance Consultant

Job portal

Insights

On- and Offboarding – Part 1: Methodical Onboarding: As relevant as ever in the post-pandemic world of home-office

By |08.11.2021|Categories: cyber security, it security|

Share this post: Written by Joshua Bucheli, AI [...]

Comments Off on On- and Offboarding – Part 1: Methodical Onboarding: As relevant as ever in the post-pandemic world of home-office
Go to Top