Solved

Lead on a Certified Ethical Hacker

Posted on 2009-04-10
3
311 Views
Last Modified: 2012-05-06
Hello,
Please let me know if this is inappropriate to ask in this venue.  I don't know where else to find someone of this caliber.
I have a client (attorney) who may need the services of a CEH.  I would like to know if anyone is interested in subcontracting their services through my company for a job.
If so,  please inform me of your certifications and let me know how we would communicate further.
Again, I hope this is not out of line.
JLG
0
Comment
Question by:4rg
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 31

Accepted Solution

by:
Paranormastic earned 400 total points
ID: 24117803
Personally I would suggest posting a listing at a job board like dice, monster, careerbuilder, etc. instead of EE, although I can understand your reasoning for the post here.

Make sure you know what terms you are looking for to find the best candidate.  For certifications, CEH is a good one, other good ones would be CISSP or GSEC - Secuirty+ is a nice cert but is probably more general than what you are looking for - it is a nice addition but not a replacement.

For example, are you looking for intrusion detection, penetration testing (pen testing), malware detection, physical compromise, physical intrusion, wireless hacking, firewall hacking, web site hacking, forensics, etc.  Don't overdo it when looking - determine what you need and ask for that - for example, if your client doesn't use wireless don't ask for it.

A candidate may also need to know up front if this is in response to an incident or for prevention, testing, testimony, etc. although your client may not want that posted in the job listing some people get touchy if it is in response to an incident.

If you are looking in response to an incident, you may be better off reporting the incident to the police and let their computer forensics team handle it - if it is a smaller town a lot of times they will work with a larger force to bring someone in.  Even if they don't send someone, there would be record of the report being made if your client needed to followup with a lawsuit or criminal charges.
0
 
LVL 4

Assisted Solution

by:TurboBorland
TurboBorland earned 100 total points
ID: 24118506
Coming out of high-school knowing little about security, a person can acquire CEH.  Personally, I hate certifications as they don't really show talent, unless it's a hands-on type of certification.  I like to know where they've been and what they've done over what certs they've taken.

However, if you were to go this route, CISSP is the best certification, in my opinion, to want to look for.
0
 
LVL 1

Author Closing Comment

by:4rg
ID: 31568939
Thanks, I appreciate your time and input.  I will post as advised or just put more feelers out there.  If you know anyone please let me know at abyte58@yahoo.com.  
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question