Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Lead on a Certified Ethical Hacker

Posted on 2009-04-10
3
Medium Priority
?
315 Views
Last Modified: 2012-05-06
Hello,
Please let me know if this is inappropriate to ask in this venue.  I don't know where else to find someone of this caliber.
I have a client (attorney) who may need the services of a CEH.  I would like to know if anyone is interested in subcontracting their services through my company for a job.
If so,  please inform me of your certifications and let me know how we would communicate further.
Again, I hope this is not out of line.
JLG
0
Comment
Question by:4rg
3 Comments
 
LVL 31

Accepted Solution

by:
Paranormastic earned 1600 total points
ID: 24117803
Personally I would suggest posting a listing at a job board like dice, monster, careerbuilder, etc. instead of EE, although I can understand your reasoning for the post here.

Make sure you know what terms you are looking for to find the best candidate.  For certifications, CEH is a good one, other good ones would be CISSP or GSEC - Secuirty+ is a nice cert but is probably more general than what you are looking for - it is a nice addition but not a replacement.

For example, are you looking for intrusion detection, penetration testing (pen testing), malware detection, physical compromise, physical intrusion, wireless hacking, firewall hacking, web site hacking, forensics, etc.  Don't overdo it when looking - determine what you need and ask for that - for example, if your client doesn't use wireless don't ask for it.

A candidate may also need to know up front if this is in response to an incident or for prevention, testing, testimony, etc. although your client may not want that posted in the job listing some people get touchy if it is in response to an incident.

If you are looking in response to an incident, you may be better off reporting the incident to the police and let their computer forensics team handle it - if it is a smaller town a lot of times they will work with a larger force to bring someone in.  Even if they don't send someone, there would be record of the report being made if your client needed to followup with a lawsuit or criminal charges.
0
 
LVL 4

Assisted Solution

by:TurboBorland
TurboBorland earned 400 total points
ID: 24118506
Coming out of high-school knowing little about security, a person can acquire CEH.  Personally, I hate certifications as they don't really show talent, unless it's a hands-on type of certification.  I like to know where they've been and what they've done over what certs they've taken.

However, if you were to go this route, CISSP is the best certification, in my opinion, to want to look for.
0
 
LVL 1

Author Closing Comment

by:4rg
ID: 31568939
Thanks, I appreciate your time and input.  I will post as advised or just put more feelers out there.  If you know anyone please let me know at abyte58@yahoo.com.  
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question