SlideShare a Scribd company logo
1 of 6
CYBERSECURITY CAPABILITY
1
UK & EMEA Lead: Carl Nichols (c.nichols@aap3.com)
US Lead: Kevin Harrison (k.harrison@aap3.com)
GlobalTechnical Director: Aaron Featherstone (a.featherstone@aap3.com)
WHY US?
2
In excess of 10-15 years combined defence,
aerospace & cybersecurity experience.
o IBM, BAE Systems, Lockheed Martin, Ministry
of Justice,GE, Cisco, at&t, Capita, HSBC,
Facebook, and many more
Internal aap3 Network Security IT services
capability.
o Network Security solutions conception,
implementation and managed services.
o Cybersecurity & Infosec solutions development.
In excess of 2000 qualified Cybersecurity specialists
(UK & EMEA).
o CISSP,CESG CLAS, ISO27001, CEH Ethical
Hackers, Offensive Security CP, and more
o IT Services & Niche recruitment specialist in
Cybersecurity & Network Defence
Strategic hiring planning & demand forecasting.
o Understanding the client’s aims & objectives,
future direction of the business, and its
commercial ecosystem.
GROWING NEW TALENT
We are partnering with universities to recruit MSc graduates in niche IT
skills such as the University of Southampton & City University Cyber
Academies, more partnerships also in progress.
3
ACCESS TO FULL END-TO-END CYBERSECURITY CAPABILITY
FOR ASSURED PROTECTION AND THREAT MITIGATION
4
CONSULTING & EXPERT ASSESSMENTS
Analysing current business & IT landscape of the
organisation and future plans impact:
o Mapping & modelling the architectural risks.
o Analysing threats from business/3rd party angles.
o Apps, infrastructure, network & cloud services endpoints
vulnerability analysis.
Securing the business and IT architecture:
o Threat & intrusion analytics and forecasting.
o Secure network design & architecture.
o Source code analysis.
Data responsibilities, issues & legal compliances:
o data at rest, data in flight, US Patriot Act vs
German Bundesdatenschutzgesetz act.
SECURITY IMPLEMENTATION
Cybersecurity technology implementation:
o Gateways, firewalls, proxy servers.
o Encryptions, VPN, tunnelling protocol, sandboxing.
o Operating systems hardening, vulnerability patching.
o Secure mobile apps containers.
Advanced/persistent threat testing:
o Ethical hacking, penetration testing,
o Machine-to-machine vulnerability analysis (especially in
automated processes)
SOC Services
o Vulnerability analysis & risks impact assessment
o Leading-edge Network Security implementation
o Threat & Intrusion detection & prevention (IDS/IPS),
o Incident management & forensics
MANAGED SECURITY SERVICES
Network security analysis, threat detection & prevention,
pen-testing, secure architecture design & management:
o DDOS, SQL injections, XSS, hacking, malware,
malvertising, Trojan horse, phishing, botnet zombies.
Mobile & BYOD security considerations:
o Mobile device management.
o Mobile networks management.
Incident management and business continuity:
o Incidents & Event alerts, management, response and
disaster recovery (SIEM)
Federated ID management:
o ID authentication & authorisation, SSO.
EXAMPLE PRE-SCREENED & ACCESS TO CYBERSECURITY SKILLS (UK & EMEA)
Cybersecurity consultants & secure design architects (>550 candidates)
Penetration testers, ethical hackers, zero-day vulnerability experts, forensics specialists (>250)
Network defence & security engineers, SOC specialists (>1.500)
Data analytics professionals for threat, intrusion & fraud analysis (>250)
Identity management specialists, encryption consultants (>500)
Security ware products specialists (>1,000)
SOME OF OUR CUSTOMERS
5
CONTACT US
TEL: 02380 762830
EMAIL: RECRUITMENT@AAP3.COM
6

More Related Content

What's hot

SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014Anton Bittner
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threatspattcom
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay Dereli
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
List of cybersecurity training courses by Tonex
List of cybersecurity training courses by TonexList of cybersecurity training courses by Tonex
List of cybersecurity training courses by TonexWesley Comal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)pijans
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 

What's hot (20)

SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
List of cybersecurity training courses by Tonex
List of cybersecurity training courses by TonexList of cybersecurity training courses by Tonex
List of cybersecurity training courses by Tonex
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...
 
InnoSec_leaflet
InnoSec_leafletInnoSec_leaflet
InnoSec_leaflet
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 

Similar to aap3 cybersecurity recruitment capabilities

Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Leonardo
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETTravarsaPrivateLimit
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 

Similar to aap3 cybersecurity recruitment capabilities (20)

How to get started in cybersecurity
How to get started in cybersecurityHow to get started in cybersecurity
How to get started in cybersecurity
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 

Recently uploaded

Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024ClearedJobs.Net
 
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...makika9823
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementBoundless HQ
 
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersHireQuotient
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.ShrayasiRoy
 
Intern Exit Interview Questions and Answers
Intern Exit Interview Questions and AnswersIntern Exit Interview Questions and Answers
Intern Exit Interview Questions and AnswersHireQuotient
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 29 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 GurgaonDelhi Call girls
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...PayScale, Inc.
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Dan Medlin
 
Copy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfCopy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfmarketing659039
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfmarketing659039
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessHireQuotient
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Situational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersSituational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersHireQuotient
 
Advantages of Human Resource Management System
Advantages of Human Resource Management SystemAdvantages of Human Resource Management System
Advantages of Human Resource Management SystemHireQuotient
 
How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsDavid Green
 
Ways to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsWays to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsSnapJob
 

Recently uploaded (20)

Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024
 
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
 
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership Management
 
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for Recruiters
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.
 
Intern Exit Interview Questions and Answers
Intern Exit Interview Questions and AnswersIntern Exit Interview Questions and Answers
Intern Exit Interview Questions and Answers
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 29 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 29 Gurgaon
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024
 
Copy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfCopy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdf
 
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdf
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational Success
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
 
Situational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersSituational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample Answers
 
Advantages of Human Resource Management System
Advantages of Human Resource Management SystemAdvantages of Human Resource Management System
Advantages of Human Resource Management System
 
How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People Analytics
 
Ways to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsWays to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time Jobs
 

aap3 cybersecurity recruitment capabilities

  • 1. CYBERSECURITY CAPABILITY 1 UK & EMEA Lead: Carl Nichols (c.nichols@aap3.com) US Lead: Kevin Harrison (k.harrison@aap3.com) GlobalTechnical Director: Aaron Featherstone (a.featherstone@aap3.com)
  • 2. WHY US? 2 In excess of 10-15 years combined defence, aerospace & cybersecurity experience. o IBM, BAE Systems, Lockheed Martin, Ministry of Justice,GE, Cisco, at&t, Capita, HSBC, Facebook, and many more Internal aap3 Network Security IT services capability. o Network Security solutions conception, implementation and managed services. o Cybersecurity & Infosec solutions development. In excess of 2000 qualified Cybersecurity specialists (UK & EMEA). o CISSP,CESG CLAS, ISO27001, CEH Ethical Hackers, Offensive Security CP, and more o IT Services & Niche recruitment specialist in Cybersecurity & Network Defence Strategic hiring planning & demand forecasting. o Understanding the client’s aims & objectives, future direction of the business, and its commercial ecosystem.
  • 3. GROWING NEW TALENT We are partnering with universities to recruit MSc graduates in niche IT skills such as the University of Southampton & City University Cyber Academies, more partnerships also in progress. 3
  • 4. ACCESS TO FULL END-TO-END CYBERSECURITY CAPABILITY FOR ASSURED PROTECTION AND THREAT MITIGATION 4 CONSULTING & EXPERT ASSESSMENTS Analysing current business & IT landscape of the organisation and future plans impact: o Mapping & modelling the architectural risks. o Analysing threats from business/3rd party angles. o Apps, infrastructure, network & cloud services endpoints vulnerability analysis. Securing the business and IT architecture: o Threat & intrusion analytics and forecasting. o Secure network design & architecture. o Source code analysis. Data responsibilities, issues & legal compliances: o data at rest, data in flight, US Patriot Act vs German Bundesdatenschutzgesetz act. SECURITY IMPLEMENTATION Cybersecurity technology implementation: o Gateways, firewalls, proxy servers. o Encryptions, VPN, tunnelling protocol, sandboxing. o Operating systems hardening, vulnerability patching. o Secure mobile apps containers. Advanced/persistent threat testing: o Ethical hacking, penetration testing, o Machine-to-machine vulnerability analysis (especially in automated processes) SOC Services o Vulnerability analysis & risks impact assessment o Leading-edge Network Security implementation o Threat & Intrusion detection & prevention (IDS/IPS), o Incident management & forensics MANAGED SECURITY SERVICES Network security analysis, threat detection & prevention, pen-testing, secure architecture design & management: o DDOS, SQL injections, XSS, hacking, malware, malvertising, Trojan horse, phishing, botnet zombies. Mobile & BYOD security considerations: o Mobile device management. o Mobile networks management. Incident management and business continuity: o Incidents & Event alerts, management, response and disaster recovery (SIEM) Federated ID management: o ID authentication & authorisation, SSO. EXAMPLE PRE-SCREENED & ACCESS TO CYBERSECURITY SKILLS (UK & EMEA) Cybersecurity consultants & secure design architects (>550 candidates) Penetration testers, ethical hackers, zero-day vulnerability experts, forensics specialists (>250) Network defence & security engineers, SOC specialists (>1.500) Data analytics professionals for threat, intrusion & fraud analysis (>250) Identity management specialists, encryption consultants (>500) Security ware products specialists (>1,000)
  • 5. SOME OF OUR CUSTOMERS 5
  • 6. CONTACT US TEL: 02380 762830 EMAIL: RECRUITMENT@AAP3.COM 6