SlideShare a Scribd company logo
1 of 1
Download to read offline
CYBER SECURITY RECRUITMENT
In an era where mobility of information is an integral part of both businesses’and people’s lives,
ARM Cyber Security has a proven track record of delivering best of breed professionals to clients
in the UK, Europe and beyond.
ARM Cyber Security is staffed with specialist consultants, specifically trained to ensure that they
fully understand our clients’needs, requirements and strategy.
T E W www.arm.co.uk/cybersecuritycybersecurity@arm.co.uk+44 (0)2392 228 282
CYBER SECURITY
We place high calibre contract/interim and permanent professionals into a range of businesses – from the vendors that develop
and sell products and solutions, to the consultancies that provide integration and value added services, plus the end users that
seek protection, assurance and compliance.
•	 Perimeter/Infrastructure Security – Firewalls, Content Filtering,
IDS / IPS, Cloud
•	 Data Loss Prevention - Network DLP, Endpoint DLP, Data ID, Detection
•	 Identity & Access Management – Authentication, DRM, Single Sign
On/Tokenization, PKI
•	 Threat & Vulnerability Management – CHECK, CREST, TIGER, Penetration
Testing, Gap Analysis
•	 Incident Response – Analysis, Remediation, Readiness, CIRT, CIRP
•	 Mobile Security – End Point, BYOD, Remote Access
•	 Security Incident & Event Management - SIM, SEM, SOC
•	 Governance Risk & Compliance (GRC) - ISO 27001, PCI-DSS, QSA
•	 Forensics - eDiscovery, Investigation, Extraction, Analysis
Follow us on:
The Cyber Security team places professionals within:
Linkedin - ARM Cyber Security
search search search
Facebook - ARM Cyber Security Twitter -	@ARMOfficial
| An operating division of ARMAn operating division of ARM
ARM Cyber Security
Tower 42, Old Broad Street, London, EC2N 1HQ
Langstone Technology Park, Langstone Road, Havant, PO9 ISA

More Related Content

Similar to ARM Cyber Security Brochure Sept 15

NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24
Umesh Starteck
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
Remo Hardeman
 
Capital Cyber Security Leaflet
Capital Cyber Security LeafletCapital Cyber Security Leaflet
Capital Cyber Security Leaflet
Theresa Cull
 
Capital International Cyber Security
Capital International Cyber SecurityCapital International Cyber Security
Capital International Cyber Security
Dean Gilbert
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
Tawnia Beckwith
 
SECTRALOG COMPANY PROFILE
SECTRALOG COMPANY PROFILESECTRALOG COMPANY PROFILE
SECTRALOG COMPANY PROFILE
marius ferreira
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
Tarek Medini
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015
Melissa Bulluck
 

Similar to ARM Cyber Security Brochure Sept 15 (20)

Telecommunications and Security Systems | Pepper Rutland
Telecommunications and Security Systems | Pepper RutlandTelecommunications and Security Systems | Pepper Rutland
Telecommunications and Security Systems | Pepper Rutland
 
NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24
 
Armor-Overview
Armor-OverviewArmor-Overview
Armor-Overview
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Capital Cyber Security Leaflet
Capital Cyber Security LeafletCapital Cyber Security Leaflet
Capital Cyber Security Leaflet
 
Capital International Cyber Security
Capital International Cyber SecurityCapital International Cyber Security
Capital International Cyber Security
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
About Marcum 0915 V2
About Marcum 0915 V2About Marcum 0915 V2
About Marcum 0915 V2
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Beyond the Firewall_ The Evolution of Endpoint Protection in Ontario.pdf
Beyond the Firewall_ The Evolution of Endpoint Protection in Ontario.pdfBeyond the Firewall_ The Evolution of Endpoint Protection in Ontario.pdf
Beyond the Firewall_ The Evolution of Endpoint Protection in Ontario.pdf
 
SECTRALOG COMPANY PROFILE
SECTRALOG COMPANY PROFILESECTRALOG COMPANY PROFILE
SECTRALOG COMPANY PROFILE
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Racks and Enclosures
Racks and EnclosuresRacks and Enclosures
Racks and Enclosures
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015
 
TFS Brochure 1_HUB
TFS Brochure 1_HUBTFS Brochure 1_HUB
TFS Brochure 1_HUB
 
C m-technical-services
C m-technical-servicesC m-technical-services
C m-technical-services
 

ARM Cyber Security Brochure Sept 15

  • 1. CYBER SECURITY RECRUITMENT In an era where mobility of information is an integral part of both businesses’and people’s lives, ARM Cyber Security has a proven track record of delivering best of breed professionals to clients in the UK, Europe and beyond. ARM Cyber Security is staffed with specialist consultants, specifically trained to ensure that they fully understand our clients’needs, requirements and strategy. T E W www.arm.co.uk/cybersecuritycybersecurity@arm.co.uk+44 (0)2392 228 282 CYBER SECURITY We place high calibre contract/interim and permanent professionals into a range of businesses – from the vendors that develop and sell products and solutions, to the consultancies that provide integration and value added services, plus the end users that seek protection, assurance and compliance. • Perimeter/Infrastructure Security – Firewalls, Content Filtering, IDS / IPS, Cloud • Data Loss Prevention - Network DLP, Endpoint DLP, Data ID, Detection • Identity & Access Management – Authentication, DRM, Single Sign On/Tokenization, PKI • Threat & Vulnerability Management – CHECK, CREST, TIGER, Penetration Testing, Gap Analysis • Incident Response – Analysis, Remediation, Readiness, CIRT, CIRP • Mobile Security – End Point, BYOD, Remote Access • Security Incident & Event Management - SIM, SEM, SOC • Governance Risk & Compliance (GRC) - ISO 27001, PCI-DSS, QSA • Forensics - eDiscovery, Investigation, Extraction, Analysis Follow us on: The Cyber Security team places professionals within: Linkedin - ARM Cyber Security search search search Facebook - ARM Cyber Security Twitter - @ARMOfficial | An operating division of ARMAn operating division of ARM ARM Cyber Security Tower 42, Old Broad Street, London, EC2N 1HQ Langstone Technology Park, Langstone Road, Havant, PO9 ISA