Information Security Recruitment and Employer Advisory Services

 

Our Recruitment Process

Step 1:

Discovery Call: Speak with one of our security staffing experts. Help us understand exactly what your expectations are for your open positions and what the ideal candidate looks like. What are the “real” expectations for the openings, beyond what the job description says?

Step 2:

Identify and Screen Candidates:  InfoSec Connect will perform in-depth screens with all candidates, vetting for technical ability and cultural fit. We only send you the most qualified candidates. 

Step 3:

Submit Highly Qualified Candidates:  InfoSec Connect will submit candidate resumes, CVs, Github profiles, and all relevant documentation to you (and anyone else on your team you’d like). We also include a Candidate Summary that covers motivation for making a move, skills, education, certifications, location, and other important factors.

Step 4:

Schedule Interviews: Let us know who you would like to interview. InfoSec Connect will handle the administrative tasks associated with interview scheduling, including sending meeting invites to candidates and your interviewers. Be as much or as little-involved in the process as you like!

Step 5:

Offer Negotiation: InfoSec Connect will negotiate offers with candidates for you, increasing the likelihood of converting interviewees to new employees! Our in-depth knowledge of industry trends and compensation figures gives us a unique perspective in offer negotiations and allows us to effectively negotiate on your behalf.

 
 

Positions We Fill: Contract, Contingency or Retained

C-Level Executive Placement

Whether you’re looking for a Chief Information Security Officer (CISO), Chief Information Officer (CIO), or Chief Technology Officer (CTO), InfoSec Connect has you covered.

Security Sales & Marketing

Security companies need people to market their products and services and security salespeople are in-demand, same as security practitioners.

Data Privacy

Data Privacy is quickly becoming one of the fastest growing subdomains in information security. Our candidates know all the latest privacy regulations.

IT Audit, Governance, Risk & Compliance

Our executive team has proven success in building teams of IT Auditors and Information Security Assessors for some of the industry’s  leading consulting firms.

Offensive Security

Penetration testing, Red Team, and Vulnerability Management professionals are always in high demand. We have the connections to bring you the best.

Digital Forensics & Incident Response

Data breaches are increasing by the day and Digital Forensics &  Incident Response professionals are highly sought after. We know the best in the business.