My

services

Why me, and what specialists I can find for your company.

Because I specialise in Security

That is what sets me apart from other recruiters. I know Security because I have been working in the industry for 5 years before shifting to recruitment. I have the know-how, and certification to back that.

I believe in doing the right thing. It is personal for me - if I can not build a business by doing the right things, I still have a great career in Security that I can return to.

a man riding a skateboard down the side of a ramp
a man riding a skateboard down the side of a ramp

I will find candidates you want to hire for roles in:

  • core, technical Cybersecurity positions. Because of the name sprawl, I tried to group job names that are the same together. Please know that even though the original difference between engineering and analyst positions can be distilled to a level of technical knowledge - engineers are more technical, analysts are more facing the customers - the current job market uses those names interchangingly. To not duplicate, I decided to stick with the analyst.

    I am also recruiting for managerial openings for the below positions.

    • SIEM / SOAR / SOC analyst - SIEM solution allows to collect and analyze the data across all company. SOAR tool allows for the automation of repetitive tasks. While different, they work in complementary ways, and most companies will require one person to cover the workload on those two systems. The core of the role consists of detecting an attack, stopping it, and patching vulnerabilities that allowed an attacker to get in. In most big companies, positions will be a part of the Security Operations Center that runs 24/7.

    • EDR / XDR analyst - laptops, workstations, servers, mobile phones & IoT devices - are all considered network endpoints. Endpoint Detection & Response (EDR) solution monitors that they are safe, and in case of an alert contains them for future analysis. The advent of remote work showed the need for email, network & cloud environment scrutiny - and that those are the areas that the Extended Detection & Response (XDR) watches over, in addition to the endpoints EDR originally included.

    • MDR analyst - sometimes it is best to let an external company take responsibility for some / all aspects of your company's security. External consultants working in the Managed Detection & Response (MDR) center offer an external SOC that you can pay for.

    • Security Architect - a person responsible for designing & implementing the applications, networks & other solutions with alignment to the company security standards. The architect will review the solutions used in the company, and collaborate across a company to adhere them to the industry best practices.

    • Information Security Advisor / Security Consultant - after assessing the customer security environment, the advisor/consultant's role is to recommend measures that will bring the company security to an acceptable level. Secure means safe with regards to the threat that it is facing, not unpenetrable - this person's job is to make a realistic evaluation of what is useful and possible, and then to advise how to get there, taking the budget into account.

    • Identity & Access Management - is all about ensuring that the right person has access to the right information. Most companies distinguish between IAM analysts, who perform periodical reviews & work on everyday access-granting processes & procedures, and IAM engineers, who write the code to integrate safe authentication solutions into the company environment.

    • Firewall Management - regardless if you install the firewall locally, or buy a cloud service - your organization still needs a person who will manage the firewall configuration. A misconfigured firewall will block access to the services that you need, and having a dedicated agent respond within an acceptable timeframe is usually pricy. That is why some companies decide to employ their own network specialist.

    • Penetration Tester / Ethical Hacker / Red Team Member / Offensive Security Engineer - there are many names that describe the same activity - testing and improving the security of network/system/application. A point of the role is to check the security level & patch the vulnerabilities before external actors attack and gain access. Or at least to provide a penetration report that indicates what systems have been checked and how have they been checked, so an organization can secure the perimeter on its own.

    • Threat Hunter / Intrusion Analyst - a threat hunter assumes that an organization is ongoing an attack - always. This person is focusing on what SOC analysts and detection algorithms did not discover. They start with a hypothesis of attack and look for Indicators of Compromise for this specific scenario. It is good for threat hunters to have previous experience in SOC, penetration testing or company security architecture. Knowing what to look for and where makes them much more effective.

    • Cyber Threat Intelligence / Intelligence Analyst / Threat Analyst / Security Researcher - Gartner defines Cyber Intelligence as the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications, and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The role of a threat intelligence team is to provide the best intel they can. The better the defense team understands the adversary, the better they can advise on how to defend.

    • Product Manager / Product Analyst - this position is with the companies that offer Cybersecurity products, be it SIEM, EDR, or specific Security services. The product department works closely with the sales and marketing department to make sure that the company product has a competitive edge. To do that, they influence the marketing to highlight the unique, attractive product characteristics, as well as impact the product development team when they see that their product is lacking a functionality competition is offering.

  • position that circles around Security. They are usually placed in the Governance, Risk & Compliance department, namely:

    • GRC Analyst - even though GRC stands for Governance, Risk & Compliance, it is the Risk Analyst that is mostly looked after. And within the risk analysts, most companies look for IT Risk Analysts. The bigger the company, the bigger the amount of assets under control, and the bigger the risk register that records risks connected to the applications/solutions being used. They usually work in one standardized framework - that is why you see words like ISO 27001 | NIST | TISAX (for the automotive sector) | PCI DSS (for card payments) etc.

    • IT Auditor - control is the highest form of trust. That is what someone said one day, and we did not have to wait long for an auditor to check if we did our jobs properly. Security Auditors usually carry CISA (Certified Information Systems Auditor) certification from ISACA, or other respective certifications along with several years of relevant IT Audit experience.

My fee is 1 monthly wage gross + VAT, where this tax is included (inside of the European Union, customers outside of the EU are outside of the scope). This is a total cost.

For the reasons I mentioned in the FAQ (please check my Home page), I tend to stay away from technical positions not listed above. That includes software engineers, data analysts, or low-level Linux drivers architects etc. I think that there is a big amount of great companies that are doing already a terrific job at hiring them.

I noticed a lot of openings for sales positions in Cyber product companies. Even though it may sound like a contradiction considering what I just wrote, I am working to check if I can do business in that area as well.

My

services

Why me, and what specialists I can find for your company.

Because I specialise in Security

That is what sets me apart from other recruiters. I know Security because I have been working in the industry for 5 years before shifting to recruitment. I have the know-how, and certification to back that.

I believe in doing the right thing. It is personal for me - if I can not build a business by doing the right things, I still have a great career in Security that I can return to.

a man riding a skateboard down the side of a ramp
a man riding a skateboard down the side of a ramp

I will find candidates you want to hire for roles in core, technical Cybersecurity positions. Because of the name sprawl, I tried to group job names that are the same together. Please know that even though the original difference between engineering and analyst positions can be distilled to a level of technical knowledge - engineers are more technical, analysts are more facing the customers - the current job market uses those names interchangingly. To not duplicate, I decided to stick with the analyst.

I am also recruiting for managerial openings for the below positions.

SIEM / SOAR / SOC analyst - SIEM solution allows to collect and analyze the data across all company. SOAR tool allows for the automation of repetitive tasks. While different, they work in complementary ways, and most companies will require one person to cover the workload on those two systems. The core of the role consists of detecting an attack, stopping it, and patching vulnerabilities that allowed an attacker to get in. In most big companies, positions will be a part of the Security Operations Center that runs 24/7.

EDR / XDR analyst - laptops, workstations, servers, mobile phones & IoT devices - are all considered network endpoints. Endpoint Detection & Response (EDR) solution monitors that they are safe, and in case of an alert contains them for future analysis. The advent of remote work showed the need for email, network & cloud environment scrutiny - and that those are the areas that the Extended Detection & Response (XDR) watches over, in addition to the endpoints EDR originally included.

MDR analyst - sometimes it is best to let an external company take responsibility for some / all aspects of your company's security. External consultants working in the Managed Detection & Response (MDR) center offer an external SOC that you can pay for.

Security Architect - a person responsible for designing & implementing the applications, networks & other solutions with alignment to the company security standards. The architect will review the solutions used in the company, and collaborate across a company to adhere them to the industry best practices.

Information Security Advisor / Security Consultant - after assessing the customer security environment, the advisor/consultant's role is to recommend measures that will bring the company security to an acceptable level. Secure means safe with regards to the threat that it is facing, not unpenetrable - this person's job is to make a realistic evaluation of what is useful and possible, and then to advise how to get there, taking the budget into account.

Identity & Access Management - is all about ensuring that the right person has access to the right information. Most companies distinguish between IAM analysts, who perform periodical reviews & work on everyday access-granting processes & procedures, and IAM engineers, who write the code to integrate safe authentication solutions into the company environment.

Firewall Management - regardless if you install the firewall locally, or buy a cloud service - your organization still needs a person who will manage the firewall configuration. A misconfigured firewall will block access to the services that you need, and having a dedicated agent respond within an acceptable timeframe is usually pricy. That is why some companies decide to employ their own network specialist.

Penetration Tester / Ethical Hacker / Red Team Member / Offensive Security Engineer - there are many names that describe the same activity - testing and improving the security of network/system/application. A point of the role is to check the security level & patch the vulnerabilities before external actors attack and gain access. Or at least to provide a penetration report that indicates what systems have been checked and how have they been checked, so an organization can secure the perimeter on its own.

Threat Hunter / Intrusion Analyst - a threat hunter assumes that an organization is ongoing an attack - always. This person is focusing on what SOC analysts and detection algorithms did not discover. They start with a hypothesis of attack and look for Indicators of Compromise for this specific scenario. It is good for threat hunters to have previous experience in SOC, penetration testing or company security architecture. Knowing what to look for and where makes them much more effective.

Cyber Threat Intelligence / Intelligence Analyst / Threat Analyst / Security Researcher - Gartner defines Cyber Intelligence as the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications, and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The role of a threat intelligence team is to provide the best intel they can. The better the defense team understands the adversary, the better they can advise on how to defend.

Product Manager / Product Analyst - this position is with the companies that offer Cybersecurity products, be it SIEM, EDR, or specific Security services. The product department works closely with the sales and marketing department to make sure that the company product has a competitive edge. To do that, they influence the marketing to highlight the unique, attractive product characteristics, as well as impact the product development team when they see that their product is lacking a functionality competition is offering.

--------------------------------------------------------------------------------------

I also recruit for positions that circle around Security. They are usually placed in the Governance, Risk & Compliance department, namely:

GRC Analyst - even though GRC stands for Governance, Risk & Compliance, it is the Risk Analyst that is mostly looked after. And within the risk analysts, most companies look for IT Risk Analysts. The bigger the company, the bigger the amount of assets under control, and the bigger the risk register that records risks connected to the applications/solutions being used. They usually work in one standardized framework - that is why you see words like ISO 27001 | NIST | TISAX (for the automotive sector) | PCI DSS (for card payments) etc.

IT Auditor - control is the highest form of trust. That is what someone said one day, and we did not have to wait long for an auditor to check if we did our jobs properly. Security Auditors usually carry CISA (Certified Information Systems Auditor) certification from ISACA, or other respective certifications along with several years of relevant IT Audit experience.

--------------------------------------------------------------------------------------

My fee is 1 monthly wage gross + VAT, where this tax is included (inside of the European Union, customers outside of the EU are outside of the scope). This is a total cost.

For the reasons I mentioned in the FAQ (please check my Home page), I tend to stay away from technical positions not listed above. That includes software engineers, data analysts, or low-level Linux drivers architects etc. I think that there is a big amount of great companies that are doing already a terrific job at hiring them.

I noticed a lot of openings for sales positions in Cyber product companies. Even though it may sound like a contradiction considering what I just wrote, I am working to check if I can do business in that area as well.