Home  Post Resume Quick IT Job Search  Advanced IT Job Search 
Skip Navigation LinksHome » Job Details
Deerfoot I.T. Resources Ltd
  Company Profile
From our personal experiences, we had become a little disillusioned with the typical "IT recruitment agency" model. We considered that many agencies took a short term view with regard to relationship building. So few agencies were open about their charge fees. For many it was a case of charging as high a margin as was achievable in any given instant rather than offering a fixed fee to all. It was also a little difficult for a client to differentiate one agency from another.

We wanted to be a little different from our peers and felt the best way to do this was to initially build our business around a very "visible & modest fixed fee for all" model. We recognised that "cost" was not the only panacea for a good recruitment agency model, but we considered it a good place to start!

 
  Job Details 
Title: 

Exclusive Opening for IT / Network Security Officer

Posted On:  9/7/2020 1:50:35 AM
Designation: 

IT / Network Security Officer

No. of vacancies:  1
Qualifications:  Any Graduate - Any Specialization
Essential Skills: 
SkillsSpecializationYears
UNIX-3
SQL -<1
Sybase ASE -<1
Minimum Total Experience:  5
Job Tenure:  No Preference/Any
Salary Offered:  Salary expectations up to £40K
Job Location:  South Croydon South Croydon United Kingdom

  Job Description
* The role will involve liaising with third party clients, reviewing security assessments of our networks and coordinating end to end penetration testing. Key skills for this role are:

* Strong commercial experience in a security role, experience in formulating Business Contingency Planning or Disaster Recovery Planning.

* Must have "hands on experience" implementing and managing products and services to deal with threats and vulnerabilities. An excellent understanding of network and Internet security and be able to assess business impact and risk.

* Overall understanding of firewalls, IDS (NIDS, HIDS), server hardening techniques, Tripwire or similar, encryption principals and performance monitoring.

  Contact Information
Reference Name (If Any): 





 
Terms and Conditions | Privacy Policy | FAQ | Contact Us | Why?? | Link to us