The first level of vulnerability is an organic one – people. At aap3 Recruitment our specialist team understand the Cyber Security and Infosec environments, and the challenges faced in an ever changing IoT landscape.
With the help of aap3 IT Recruitment you can secure experienced Cyber professionals for contract and permanent skills gaps.
1. CYBERSECURITY CAPABILITY
1
UK & EMEA Lead: Carl Nichols (c.nichols@aap3.com)
US Lead: Kevin Harrison (k.harrison@aap3.com)
GlobalTechnical Director: Aaron Featherstone (a.featherstone@aap3.com)
2. WHY US?
2
In excess of 10-15 years combined defence,
aerospace & cybersecurity experience.
o IBM, BAE Systems, Lockheed Martin, Ministry
of Justice,GE, Cisco, at&t, Capita, HSBC,
Facebook, and many more
Internal aap3 Network Security IT services
capability.
o Network Security solutions conception,
implementation and managed services.
o Cybersecurity & Infosec solutions development.
In excess of 2000 qualified Cybersecurity specialists
(UK & EMEA).
o CISSP,CESG CLAS, ISO27001, CEH Ethical
Hackers, Offensive Security CP, and more
o IT Services & Niche recruitment specialist in
Cybersecurity & Network Defence
Strategic hiring planning & demand forecasting.
o Understanding the client’s aims & objectives,
future direction of the business, and its
commercial ecosystem.
3. GROWING NEW TALENT
We are partnering with universities to recruit MSc graduates in niche IT
skills such as the University of Southampton & City University Cyber
Academies, more partnerships also in progress.
3
4. ACCESS TO FULL END-TO-END CYBERSECURITY CAPABILITY
FOR ASSURED PROTECTION AND THREAT MITIGATION
4
CONSULTING & EXPERT ASSESSMENTS
Analysing current business & IT landscape of the
organisation and future plans impact:
o Mapping & modelling the architectural risks.
o Analysing threats from business/3rd party angles.
o Apps, infrastructure, network & cloud services endpoints
vulnerability analysis.
Securing the business and IT architecture:
o Threat & intrusion analytics and forecasting.
o Secure network design & architecture.
o Source code analysis.
Data responsibilities, issues & legal compliances:
o data at rest, data in flight, US Patriot Act vs
German Bundesdatenschutzgesetz act.
SECURITY IMPLEMENTATION
Cybersecurity technology implementation:
o Gateways, firewalls, proxy servers.
o Encryptions, VPN, tunnelling protocol, sandboxing.
o Operating systems hardening, vulnerability patching.
o Secure mobile apps containers.
Advanced/persistent threat testing:
o Ethical hacking, penetration testing,
o Machine-to-machine vulnerability analysis (especially in
automated processes)
SOC Services
o Vulnerability analysis & risks impact assessment
o Leading-edge Network Security implementation
o Threat & Intrusion detection & prevention (IDS/IPS),
o Incident management & forensics
MANAGED SECURITY SERVICES
Network security analysis, threat detection & prevention,
pen-testing, secure architecture design & management:
o DDOS, SQL injections, XSS, hacking, malware,
malvertising, Trojan horse, phishing, botnet zombies.
Mobile & BYOD security considerations:
o Mobile device management.
o Mobile networks management.
Incident management and business continuity:
o Incidents & Event alerts, management, response and
disaster recovery (SIEM)
Federated ID management:
o ID authentication & authorisation, SSO.
EXAMPLE PRE-SCREENED & ACCESS TO CYBERSECURITY SKILLS (UK & EMEA)
Cybersecurity consultants & secure design architects (>550 candidates)
Penetration testers, ethical hackers, zero-day vulnerability experts, forensics specialists (>250)
Network defence & security engineers, SOC specialists (>1.500)
Data analytics professionals for threat, intrusion & fraud analysis (>250)
Identity management specialists, encryption consultants (>500)
Security ware products specialists (>1,000)