Greetings!
"It has become appallingly obvious that our technology has exceeded our humanity." ~Albert Einstein Within that notion from Albert Einstein lies the evident truth that as our advancements in technology increase, the need for securing these assets becomes equally important. According to the Bureau of Labor Statistics, IT Security Analysts will see a rise of over 37% between now and 2022. Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increase. From the Target hack to the iPhone virus, the number of attacks on information technology is becoming more frequent and mainstream. Many of ITC's clients are becoming more acutely aware of the negative effects of a potential hack or virus and therefore are bringing in IT Security Analysts to help identify potential hazards within their IT infrastructure. With certified consultants, ITC is poised to bridge this gap between clients looking to secure their systems and certified professionals to ensure reaching the company's goal. Let ITC help you search for your next IT Security Analyst. Sincerely,
Nicole McMackin
President
|
The Rise of the Security Analyst
|
The most sought-after quality in security hiring today is strategic knowledge versus technical know-how, a global workforce study says.
In recent years, CISOs have succeeded in getting more boardroom buy-in for security tools and staff. According to (ISC)2's most recent Global Information Security Workforce Study, two-thirds of C-level managers believe their security departments are too small. Employers are interested in expanding their security staff, but they can't find people to fill the positions. According to the study, the most sought-after quality is a broad knowledge of security -- more of a strategic understanding than technical know-how -- followed by certifications. This is a tricky combination. Individual technical certifications don't provide a broad understanding of security strategy, and CISSP certifications are only given to people who already have five years of experience working as a security professional. Continue Reading Here |
Don't Use Your iPhone Before Reading This
|
Users of Apple computers and iPhones may be shaken to the core at news of a major security flaw that could allow cyber spies and hackers to grab emails, financial information and other data from their devices.
|
iPhone 6: All The Hardware Rumors So Far
|
Apple's next iPhone is always a heavily rumored affair. We gather all the whispers here and make sense of it.
With Mobile World Congress just around the corner, rumors about new and upcoming devices are as thick as San Francisco fog. However, one company that won't be in Barcelona next week is Apple. The Cupertino-based company prefers to steer clear of these big conferences and mass launch events, choosing instead to host their own exclusive events. That way, its news never gets lost in the flood of announcements (as if that could happen to the Apple of today).
What you may wonder, after hearing about all the new phones that are going to arrive through the spring and into the summer, is if the iPhone 6 is will match up to the MWC debutantes. Apple hasn't announced the device yet, and it's not expected to announce anything for a while. After all, the iPhone 5C and iPhone 5S were just announced and released in September. Though Apple has traditionally announced new phones at WWDC in June, it's thought the switch to September refresh will carry through to this year. So what can we expect come fall? Continue Reading Here
|
|
|
|
Looking for your next Software Developer opportunity?
|
|
Check out our new job posting here.
As always, you can view all of our jobs on our website.
|
|
 |
 |
|
Employee Spotlight
|
|
Shawn Jen is our newest ITC addition to the Recruiting Team! Shawn comes to ITC with over 6 years of recruiting experience.
Before recruiting, Shawn completed his degree work in biochemistry. He focused on prostate cancer research and worked to develop congestive heart failure diagnostic products. In 2005, Shawn switched career paths and began working in the business development side of the staffing industry. Working both sides of the desk, he felt drawn more to the recruiting side of the business. Shawn says that his favorite part of the recruiting cycle is "the ability to find someone a great career and to hear their excitement when they obtain the role."
In Shawn's free time, he enjoys doing fun things with his three kids, going to the park, bike riding, archery and snowboarding. His favorite movie is The Usual Suspects , and is a bookwork when it comes to books about the history of cars or motorcycles. Shawn enjoys trying new things and eating exotic foods.
Welcome to the ITC Team Shawn!
|
|
 |
 |
|
Why the Target Data Hack is Just the Beginning
|
|
Target first divulged a breach involving 40 million credit and debit card accounts on Dec. 19. It later revealed that information on 70 million customers-including names, addresses, and phone numbers-had also been hacked. Continue Reading Here
|
|
|
 |
|