Cybersecurity

Contact: Security@horizonconsulting.com.au

Horizon Consulting's two decades in the industry rests at the heart of our success. Throughout this time, we have cultivated immense knowledge, networks and channels across the APAC region which, combined, enable us to expertly guide entities through this major stage of development.

Whether you already have a presence in the region and are planning to build out your business via organic hires or you're a new market entrant looking to make your mark in this highly lucrative market via M&A, Horizon Consulting is your partner of choice to make it.

Within Security Horizon recruit across;

  • Advanced Persistent Threat
  • Cipher
  • Machine Learning and Evolution
  • CEH
  • Zombie
  • Security Architecture
  • Non-Repudiation
  • Information Assurance
  • Compliance
  • Exltration
  • SIEM
  • Chief Information Security Officer
  • Encode
  • Digital Signature
  • CCFP
  • Cryptanalysis
  • Adversary
  • Cloud Computing
  • Malware
  • Red Team
  • Firewall
  • Confidentiality
  • Authorization
  • ISO 27001
  • Encipher
  • CCSP
  • Data Breach
  • Risk
  • Trojan
  • Response
  • Security Consulting
  • Compliance
  • Hacker
  • Cybersecurity
  • Defence
  • CIxs
  • Denial of Service
  • Incident Response
  • Plan
  • CISA |Data Mining
  • Botnet
  • Spyware
  • Identity and Access Management
  • CCMA
  • Information Security
  • Penetration Testing
  • Application Security
  • Cybercrime
  • Data Leakage
  • Malicious Code
  • Network Resilience
  • Spam
  • Phishing
  • Investigation
  • Surveillance
  • GIAC
  • CompTIA Security
  • Disruption
  • Blacklist
  • Authenticate
  • Worm
  • RHCE
  • Traffic Light Protocol
  • Virus
  • Rootkit
  • Private Key
  • Intrusion Detection
  • Keylogger
  • Mitigation
  • Symmetric Encryption
  • Algorithm
  • Interoperability
  • Encode
  • Black Hat
  • Obfuscation
  • Collect & Operate
  • Attack Signature
  • CCSA
  • Availability
  • SFCP
  • Chief Security Officer
  • Insider Threat
  • Failure
  • Moving Target Defence
  • Oversight & Development
  • Precursor
  • Public
  • Key Encryption
  • CISSP
  • Access Manager
  • VPN
  • Network Layers
  • Vulnerability
  • Snort
  • Troubleshoot
  • CCIE Security
  • Embedded
  • Cloud Security
  • Intrusion
  • Exploit
  • Digital Rights Management
  • FCESP
  • Cyber Operations
  • SOC