
Cyber Security
Jon Fisher & Partners are proud to dedicate our expertise to the cyber security sectors. Our agents cover, information security, cyber security, IT security, technology risk and information risk. We are proud to be partnered with a number of Cyber Security Recruitment Specialists across the World, working on both permanent and contract roles.
We have built an extensive network of contacts across the banking and financial services, commercial, government and technology sectors, and we continually strive to enage with only the best talent.
Our services include: retained search, contract recruitment, interim and executive search.
Roles:
1. Application Security Administrator
2. Artificial Intelligence Security Specialist
3. Automotive Security Engineer
4. Blockchain Developer / Engineer
5. Blue Team Member
6. Bug Bounty Hunter
7. Cybersecurity Scrum Master
8. Chief Information Security Officer (CISO)
9. Chief Security Officer (CSO)
10. Cloud Security Architect
11. Counterespionage analyst
12. Cryptanalyst
13. Cryptographer
14. Cyber Insurance Policy Specialist
15. Cyber Intelligence Specialist
16. Cyber Operations Specialist
17. Cybercrime Investigator
18. Cybersecurity Hardware Engineer
19. Cybersecurity Lawyer
20. Cybersecurity Software Developer / Engineer .
21. Data Privacy Officer
22. Data Recovery Specialist
23. Data Security Analyst
24. Digital Forensics Analyst
25. Disaster Recovery Specialist –
26. Ethical / White Hat Hacker
27. Governance Compliance & Risk (GRC) Manager
28. IIoT (Industrial Internet of Things) Security Specialist
29. Incident Responder
30. Information Assurance Analyst –
31. Information Security Analyst
32. Information Security Manager / Director
33. Intrusion Detection Analyst
34. IoT (Internet of Things) Security Specialist
35. IT Security Architect
36. Malware Analyst
37. Mobile Security Engineer .
38. Network Security Administrator
39. Penetration Tester (Pen-Tester)
40. PKI (Public Key Infrastructure) Analyst
41. Red Team Member
42. SCADA (Supervisory control and data acquisition) Security Analyst
43. Security Auditor
44. Security Awareness Training Specialist
45. Security Operations Center (SOC) Analyst
46. Security Operations Center (SOC) Manager
47. Source Code Auditor
48. Threat Hunter
49. Virus Technician
50. Vulnerability Assessor
*Contact us for more information on how we can assist you with your staffing requirements.
If you are interested in a new role please upload your CV here.