{"id":2815,"date":"2020-03-17T13:00:39","date_gmt":"2020-03-17T05:00:39","guid":{"rendered":"https:\/\/www.kingfisherintl.com\/?p=2815"},"modified":"2020-03-30T17:38:43","modified_gmt":"2020-03-30T09:38:43","slug":"types-of-information-security-talent","status":"publish","type":"post","link":"https:\/\/www.kingfisherintl.com\/zh\/2020\/03\/17\/types-of-information-security-talent\/","title":{"rendered":"Types of Information Security Talent"},"content":{"rendered":"<div id=\"fws_69e288bf6dbbc\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p><strong>The development of China\u2019s economy and international presence comes with an increased awareness and emphasis on information security in recent years. This trend has created a demand for information security talents to serve the needs of organizations in today\u2019s business environment. In the current talent market, there are several types of Information Security Human Resources. <\/strong><strong>It is essential for organizations to understand their information security needs before hiring as each talent is equipped with different skillsets.<\/strong><\/p>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 15px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p><strong>Connect with <a href=\"https:\/\/www.linkedin.com\/in\/zhangcharlie\/\">Charlie<\/a> on LinkedIn!<\/strong><\/p>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 15px;\" class=\"divider\"><\/div><\/div>\n<div class=\"nectar-animated-title\" data-style=\"color-strip-reveal\" data-color=\"extra-color-2\">\n\t<div class=\"nectar-animated-title-outer\">\n\t\t<div class=\"nectar-animated-title-inner\">\n\t\t\t<div class=\"wrap\"><h5 style=\"color: #ffffff;\">This article is written by Charlie Zhang - Consultant, IT Practice. He has 5 years of Executive Search experience. He specialize in Corporate IT functions including IT Upper Management, AI \/ BI Professionals, Security Officer, and ERP \/ CRM.<\/h5><\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"margin-top: 7.5px; height: 1px; margin-bottom: 7.5px;\" data-width=\"100%\" data-animate=\"\" data-animation-delay=\"\" data-color=\"accent-color\" class=\"divider-border\"><\/div><\/div><div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 30px;\" class=\"divider\"><\/div><\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69e288bf6f9aa\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h3>Types of <span style=\"color: #6dc01a;\">Information Security Officers\/ Engineers<\/span><\/h3>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 40px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h4>1. In-house IT Operations Background<\/h4>\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Information Security personnel of this background specialize in security configuration and operations of internal IT infrastructure elements such as server, firewall and network. Besides that, their daily responsibilities also include monitoring IT security logs, incidents and vulnerability scanning.<\/p>\n<p>This group of talents are suitable for organizations who do not require intensive information security measures to be put in place. Organizations who are of level 1 and 2 according to Information Security Grading in China will be appropriate. With that being said, Information Security Officers with in-house IT operations background will be sought in every organization to coordinate and deliver tasks in adherence to security governance.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69e288bf70c87\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 50px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h4>2. Information Security Governance &amp; Audit Background<\/h4>\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Talents of this background are usually officers or managers from big consulting firms. Their expertise lies in Information Security Governance &amp; Audit abiding by security laws &amp; regulations such as ISO 27000, GDPR and SOX.<\/p>\n<p>The expertise and experience of this group of talents will be suitable for group-size companies who require well-establish and robust security system in their daily business operations. This group of people can suit Enterprise Governance, Risk Management and Compliance requirement.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69e288bf71d69\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 50px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h4>3. Security Architect, Application Security Engineer Background<\/h4>\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Security Architects are experts in Infrastructure, Big Data and Microservice security. They are able to design sophisticated security architecture to meet the demands of big companies. On the other hand, Application Security Engineers are experts of Network Attack, Defense and Penetration Test.<\/p>\n<p>Most of the Information Security Professionals who fall into this category are working in Information Security consulting firms and big internet companies who requires robust Application Security.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69e288bf72db2\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 50px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h4>4. IoT Product Security Background<\/h4>\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>They are skillful in handling industrial regulations &amp; standards of IoT products. For example, smart household appliances and IoV (Internet of Vehicles).<\/p>\n<p>That\u2019s to say, these talents will be sought after by IoT\/IoV product companies and their related components vendors.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69e288bf73e3c\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 30px;\" class=\"divider\"><\/div><\/div><div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"margin-top: 7.5px; height: 1px; margin-bottom: 7.5px;\" data-width=\"100%\" data-animate=\"\" data-animation-delay=\"\" data-color=\"accent-color\" class=\"divider-border\"><\/div><\/div><div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 15px;\" class=\"divider\"><\/div><\/div>\n<div class=\"nectar-animated-title\" data-style=\"color-strip-reveal\" data-color=\"extra-color-2\">\n\t<div class=\"nectar-animated-title-outer\">\n\t\t<div class=\"nectar-animated-title-inner\">\n\t\t\t<div class=\"wrap\"><h5 style=\"color: #ffffff;\">In different stages of development of your organization, different types of information security talents will be required. The right talent can help your organization steer away from potential risks and threats which can be detrimental.<\/h5><\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"The development of China\u2019s economy and international presence comes with an increased awareness and emphasis on information security in recent...","protected":false},"author":3,"featured_media":2848,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[8],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Types of Information Security Talent | Kingfisher HR Solutions Group<\/title>\n<meta name=\"description\" content=\"The development of China\u2019s economy and international presence comes with an increased awareness and emphasis on information security in recent years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kingfisherintl.com\/zh\/2020\/03\/17\/types-of-information-security-talent\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Information Security Talent | Kingfisher HR Solutions Group\" \/>\n<meta property=\"og:description\" content=\"The development of China\u2019s economy and international presence comes with an increased awareness and emphasis on information security in recent years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kingfisherintl.com\/zh\/2020\/03\/17\/types-of-information-security-talent\/\" \/>\n<meta property=\"og:site_name\" content=\"Kingfisher HR Solutions Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KingfisherRecruitmentGroup\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-17T05:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-30T09:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kingfisherintl.com\/wp-content\/uploads\/2020\/03\/KF-Charlie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#organization\",\"name\":\"Kingfisher Recruitment Group\",\"url\":\"https:\/\/www.kingfisherintl.com\/zh\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/KingfisherRecruitmentGroup\/\",\"https:\/\/www.linkedin.com\/company\/13376814\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#logo\",\"inLanguage\":\"zh-CN\",\"url\":\"\",\"caption\":\"Kingfisher Recruitment Group\"},\"image\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#website\",\"url\":\"https:\/\/www.kingfisherintl.com\/zh\/\",\"name\":\"Kingfisher International Recruitment Group\",\"description\":\"Kingfisher HR Solutions Group is a global provider of Executive Search, Recruitment Process Outsourcing (RPO) and Leadership &amp; Talent Assessment Solutions.\",\"publisher\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.kingfisherintl.com\/zh\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#primaryimage\",\"inLanguage\":\"zh-CN\",\"url\":\"https:\/\/www.kingfisherintl.com\/wp-content\/uploads\/2020\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled-e1585037775686.jpg\",\"width\":500,\"height\":333,\"caption\":\"Information Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#webpage\",\"url\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/\",\"name\":\"Types of Information Security Talent | Kingfisher HR Solutions Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#primaryimage\"},\"datePublished\":\"2020-03-17T05:00:39+00:00\",\"dateModified\":\"2020-03-30T09:38:43+00:00\",\"description\":\"The development of China\\u2019s economy and international presence comes with an increased awareness and emphasis on information security in recent years.\",\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#\/schema\/person\/55a532eb5edf030347344b4b816357e2\"},\"headline\":\"Types of Information Security Talent\",\"datePublished\":\"2020-03-17T05:00:39+00:00\",\"dateModified\":\"2020-03-30T09:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.kingfisherintl.com\/2020\/03\/17\/types-of-information-security-talent\/#primaryimage\"},\"articleSection\":\"Industry\",\"inLanguage\":\"zh-CN\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kingfisherintl.com\/zh\/#\/schema\/person\/55a532eb5edf030347344b4b816357e2\",\"name\":\"Siew Ming Ong\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/posts\/2815"}],"collection":[{"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/comments?post=2815"}],"version-history":[{"count":0,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/posts\/2815\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/media\/2848"}],"wp:attachment":[{"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/media?parent=2815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/categories?post=2815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kingfisherintl.com\/zh\/wp-json\/wp\/v2\/tags?post=2815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}