SERVICES

_

CYBER SECURITY

The Cyber Security market is full of innovation and all our Recruitment Consultants are continuously evolving to better understand how to communicate with clients and candidates on a deeper and more technical level. This is shown with our expert market in sites and thirst for knowledge.

The ability to work on and deliver to deeply technical mandates is what really sets us apart and a high number of placements we make in this area come from referrals and this is because we have built a trusted global network.

We cover the following:

  • Incident Response
  • SOC (security operations)
  • IAM (identity & access management)
  • Penetration Testers
  • Application Security
  • Security Architecture
  • Cloud Security
  • Security Risk & Compliance
  • Data Privacy / GDPR
  • Digital Forensic Investigations
  • eDiscovery
  • OT / SCADA / ICS Security
  • Cyber Security Sales

FORENSIC TECHNOLOGY

Since our inception Forensic Technology has also been a fundamental part of our recruitment services. Spreading across the full EDRM model from forensic collections to document review we partner with corporates, legal tech vendors / consultancies and legal firms as they build their Legal Tech teams worldwide.

SENIOR APPOINTMENTS

Hiring a Chief Information Security Officer isn’t easy, in fact many companies have different interpretations of what a CISO means to them, this includes reporting line and how to protect against internal and external threats, especially with data, regulations and customer satisfaction all paying their parts. We have supported organizations in start-up mode hiring their first CISO to global conglomerates needing a 30 year veteran in this space, and of course everything in between.

Iceberg has a proud history of successful retained search campaigns for senior level cyber security hires on a global level, with many references available. We love working in this way with our clients and it really allows us to lean on our expertise and network to introduce a diverse shortlist and talent pool.

RECRUITMENT MODEL

We have vast experience of delivering to global volume hiring campaigns with the ability to put in place technical and non-technical cyber security talent in a very short space of time. We do this by working with hiring managers and talent teams to understand the hiring and requirement objectives and what’s important to your ethos and values. In return this helps us support organisations in not only hiring the right candidates but retaining them too.

The IT and OT landscape are constantly evolving and so are the cyber risks. We offer organisations full access to our deep network of qualified contractors and freelancers who can be available at short notice. Whether it’s deploying a new SOC, securing cloud environments, project delivery or an interim CISO, Iceberg has the capacity to deliver talent on a Contract / Temp basis.

A retained search requires expert industry knowledge and the ability to network at a high level. At Iceberg we find retained searches work extremely well when hiring for CISO and security leaders, as well as engineering positions that require time and a wide network such as cloud security, OT security and IAM.

If you have a sensitive hire or looking for your first CISO, retained is a great option for you to consider.

MAKE AN ENQUIRY