Cyber Security


Jon Fisher & Partners are proud to dedicate our expertise to the cyber security sectors. Our agents cover, information security, cyber security, IT security, technology risk and information risk. We are proud to be partnered with a number of Cyber Security Recruitment Specialists across the World, working on both permanent and contract roles.

We have built an extensive network of contacts across the banking and financial services, commercial, government and technology sectors, and we continually strive to enage with only the best talent.

Our services include: retained search, contract recruitment, interim and executive search.

Roles:

1.  Application Security Administrator

2. Artificial Intelligence Security Specialist 

3. Automotive Security Engineer 

4. Blockchain Developer / Engineer 

5. Blue Team Member 

6. Bug Bounty Hunter 

7. Cybersecurity Scrum Master 

8. Chief Information Security Officer (CISO

9. Chief Security Officer (CSO

10. Cloud Security Architect 

11. Counterespionage analyst 

12. Cryptanalyst 

13. Cryptographer

14. Cyber Insurance Policy Specialist 

15. Cyber Intelligence Specialist

16. Cyber Operations Specialist 

17. Cybercrime Investigator

18. Cybersecurity Hardware Engineer 

19. Cybersecurity Lawyer 

20. Cybersecurity Software Developer / Engineer .

21. Data Privacy Officer 

22. Data Recovery Specialist 

23. Data Security Analyst 

24. Digital Forensics Analyst 

25. Disaster Recovery Specialist

26. Ethical / White Hat Hacker 

27. Governance Compliance & Risk (GRC) Manager 

28. IIoT (Industrial Internet of Things) Security Specialist 

29. Incident Responder 

30. Information Assurance Analyst

31. Information Security Analyst 

32. Information Security Manager / Director 

33. Intrusion Detection Analyst 

34. IoT (Internet of Things) Security Specialist 

35. IT Security Architect 

36. Malware Analyst 

37. Mobile Security Engineer .

38. Network Security Administrator 

39. Penetration Tester (Pen-Tester) 

40. PKI (Public Key Infrastructure) Analyst 

41. Red Team Member 

42. SCADA (Supervisory control and data acquisition) Security Analyst 

43. Security Auditor 

44. Security Awareness Training Specialist 

45. Security Operations Center (SOC) Analyst 

46. Security Operations Center (SOC) Manager 

47. Source Code Auditor 

48. Threat Hunter 

49. Virus Technician

50. Vulnerability Assessor 


*Contact us for more information on how we can assist you with your staffing requirements.


If you are interested in a new role please upload your CV here.