JOBS > Careers


« Back to News

2016-02-03

The Tech Revolution Will Change Or Even Erase Your Job

The 4th Industrial Revolution is under way and while it could lead to the loss of more than 7 million jobs, it's good news for some specialisations.

2016-01-28

How Much Are You Worth?

This new online tool can tell you what you should be earning from automated analysis of your CV.

2016-01-22

2016 Is On The Cusp Of A Machine Revolution

The convergence of technologies across sensors, networks, artificial intelligence and robotics is making amazing things possible.

2016-01-18

Top 2016 Big Data Challenges: Skills Shortage

In 2016, big data will lend support to almost every function of a business. But there is a huge organisational challenge to staff big data projects.

2015-12-28

Intelligence Agencies Should Recruit Like Google

Finding good intelligence hires is difficult. Pehaps intelligence agencies should be using more unconventional methods.

2015-12-09

Young People’s Concerns About Job Automation

It turns out many young Britons have no understanding of how this could impact their career at all.

2015-12-08

How to Spot a Fake LinkedIn Profile in 60 Seconds.

The LinkedIn social media platform is an important professional tool. It is also rife with fraud and deceit.

2015-11-14

What the Next 10 Years of Automation Means for Job Market

Current trends in AI and automation with existing algorithms & technologies are likely to have a big influence in the job-market.

2015-11-14

The Top 10 Information Security Jobs

Demand for Cybersecurity workers is outstripping supply and pay is going up.

2015-11-02

Poaching On the Rise For Big Data Professionals

The pressure is building on companies to land top talent in the job market.

2015-10-28

Jobs Are Disappearing to the Digital Revolution

Gartner is forecasting some major changes in technology, especially in areas like 3D printing, machine learning and voice recognition.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.