Solved

Lead on a Certified Ethical Hacker

Posted on 2009-04-10
3
308 Views
Last Modified: 2012-05-06
Hello,
Please let me know if this is inappropriate to ask in this venue.  I don't know where else to find someone of this caliber.
I have a client (attorney) who may need the services of a CEH.  I would like to know if anyone is interested in subcontracting their services through my company for a job.
If so,  please inform me of your certifications and let me know how we would communicate further.
Again, I hope this is not out of line.
JLG
0
Comment
Question by:4rg
3 Comments
 
LVL 31

Accepted Solution

by:
Paranormastic earned 400 total points
ID: 24117803
Personally I would suggest posting a listing at a job board like dice, monster, careerbuilder, etc. instead of EE, although I can understand your reasoning for the post here.

Make sure you know what terms you are looking for to find the best candidate.  For certifications, CEH is a good one, other good ones would be CISSP or GSEC - Secuirty+ is a nice cert but is probably more general than what you are looking for - it is a nice addition but not a replacement.

For example, are you looking for intrusion detection, penetration testing (pen testing), malware detection, physical compromise, physical intrusion, wireless hacking, firewall hacking, web site hacking, forensics, etc.  Don't overdo it when looking - determine what you need and ask for that - for example, if your client doesn't use wireless don't ask for it.

A candidate may also need to know up front if this is in response to an incident or for prevention, testing, testimony, etc. although your client may not want that posted in the job listing some people get touchy if it is in response to an incident.

If you are looking in response to an incident, you may be better off reporting the incident to the police and let their computer forensics team handle it - if it is a smaller town a lot of times they will work with a larger force to bring someone in.  Even if they don't send someone, there would be record of the report being made if your client needed to followup with a lawsuit or criminal charges.
0
 
LVL 4

Assisted Solution

by:TurboBorland
TurboBorland earned 100 total points
ID: 24118506
Coming out of high-school knowing little about security, a person can acquire CEH.  Personally, I hate certifications as they don't really show talent, unless it's a hands-on type of certification.  I like to know where they've been and what they've done over what certs they've taken.

However, if you were to go this route, CISSP is the best certification, in my opinion, to want to look for.
0
 
LVL 1

Author Closing Comment

by:4rg
ID: 31568939
Thanks, I appreciate your time and input.  I will post as advised or just put more feelers out there.  If you know anyone please let me know at abyte58@yahoo.com.  
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Suggestions on remote printing. 3 38
fb messenger security and privacy 15 100
save browser passwords 11 74
exchange, activesync 2 46
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question