Security and Risk

An overview of information systems security management including the confidentiality, integrity and availability of information, security governance principles, compliance requirements, legal and regulatory issues, procedures and policies, risk-based management concepts:

 

Hiring Options:
  1. Permanent
  2. Contract

 

The type of roles we will help you fill includes:

  • Chief Information Security Officers (CISO)
  • Information Security Managers
  • Security Consultants
  • Security and Risk Managers
C-Level Professionals

Let's Start Hiring


Twitter
LinkedIn
Wordpress Social Share Plugin powered by Ultimatelysocial