{"id":86,"date":"2019-05-20T21:16:23","date_gmt":"2019-05-20T21:16:23","guid":{"rendered":"https:\/\/bullintegrationsgroup.com\/?page_id=86"},"modified":"2023-03-23T02:15:24","modified_gmt":"2023-03-23T02:15:24","slug":"cybersecurity-recruiting","status":"publish","type":"page","link":"https:\/\/bullintegrationsgroup.com\/?page_id=86","title":{"rendered":"Cybersecurity Recruiting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"86\" class=\"elementor elementor-86\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e0992fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e0992fd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11b8ba23\" data-id=\"11b8ba23\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6c2f78 elementor-widget elementor-widget-heading\" data-id=\"a6c2f78\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bull Integrations Group Places Cybersecurity Professionals<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3db7b9bc elementor-widget elementor-widget-text-editor\" data-id=\"3db7b9bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:36,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:359}\" x=\"\" :20=\"\" y=\"\" :36=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :359=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:36,&quot;w&quot;:222,&quot;h&quot;:290,&quot;abs_x&quot;:40,&quot;abs_y&quot;:359}\" x=\"\" :20=\"\" y=\"\" :36=\"\" w=\"\" :222=\"\" h=\"\" :290=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :359=\"\">Current world events have\u00a0brought focus to the need of trained, skilled, proficient Cybersecurity professionals who can protect and defend against the possible risks to governments, military, business owners, shopping malls, and schools.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:345,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:668}\" x=\"\" :20=\"\" y=\"\" :345=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :668=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:345,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:668}\" x=\"\" :20=\"\" y=\"\" :345=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :668=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:345,&quot;w&quot;:222,&quot;h&quot;:261,&quot;abs_x&quot;:40,&quot;abs_y&quot;:668}\" x=\"\" :20=\"\" y=\"\" :345=\"\" w=\"\" :222=\"\" h=\"\" :261=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :668=\"\">Internet-connected environments, including hardware, software, and data\u00a0enterprises must be protected against unauthorized access and from cyber attacks to data centers and other computerized systems.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:625,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:948}\" x=\"\" :20=\"\" y=\"\" :625=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :948=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:625,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:948}\" x=\"\" :20=\"\" y=\"\" :625=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :948=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:625,&quot;w&quot;:222,&quot;h&quot;:436,&quot;abs_x&quot;:40,&quot;abs_y&quot;:948}\" x=\"\" :20=\"\" y=\"\" :625=\"\" w=\"\" :222=\"\" h=\"\" :436=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :948=\"\">One of the most problematic elements of cybersecurity is the constantly evolving nature of security risks. The traditional approach has been to focus resources on crucial system components and protect against the biggest known threats, which meant leaving components undefended and not protecting systems against less dangerous risks.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1080,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1403}\" x=\"\" :20=\"\" y=\"\" :1080=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1403=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1080,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1403}\" x=\"\" :20=\"\" y=\"\" :1080=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1403=\"\"><!-- wp:paragraph {\"align\":\"left\"} --><\/p><p style=\"text-align: left;\" bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1080,&quot;w&quot;:222,&quot;h&quot;:261,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1403}\" x=\"\" :20=\"\" y=\"\" :1080=\"\" w=\"\" :222=\"\" h=\"\" :261=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1403=\"\">Whether it&#8217;s application security, Information security, network security, disaster recovery, and business continuity planning, Bull Integrations Group has you covered with certified Cybersecurity professionals.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1359,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1682}\" x=\"\" :20=\"\" y=\"\" :1359=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1682=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1359,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1682}\" x=\"\" :20=\"\" y=\"\" :1359=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1682=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1359,&quot;w&quot;:222,&quot;h&quot;:232,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1682}\" x=\"\" :20=\"\" y=\"\" :1359=\"\" w=\"\" :222=\"\" h=\"\" :232=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1682=\"\">The Bull Integrations Group has been focused on providing top tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1610,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1933}\" x=\"\" :20=\"\" y=\"\" :1610=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1933=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1610,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1933}\" x=\"\" :20=\"\" y=\"\" :1610=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1933=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1610,&quot;w&quot;:222,&quot;h&quot;:203,&quot;abs_x&quot;:40,&quot;abs_y&quot;:1933}\" x=\"\" :20=\"\" y=\"\" :1610=\"\" w=\"\" :222=\"\" h=\"\" :203=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :1933=\"\">Our extensive candidate pool, database, industry contacts, and the ability to generate highly skilled candidates with those hard to find skill sets separate us from the competition.\u00a0<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1832,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2155}\" x=\"\" :20=\"\" y=\"\" :1832=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2155=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1832,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2155}\" x=\"\" :20=\"\" y=\"\" :1832=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2155=\"\"><!-- wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:1832,&quot;w&quot;:222,&quot;h&quot;:523,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2155}\" x=\"\" :20=\"\" y=\"\" :1832=\"\" w=\"\" :222=\"\" h=\"\" :523=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2155=\"\">At the Bull Integrations Group, we search for and place candidates with unparalleled expertise in modern Cybersecurity techniques to prevent cyber attacks, data breaches, and identity theft through the hardening of computer infrastructures\u00a0for multiple industries including\u00a0the banking, communications, defense, government, transportation, education, manufacturing, and energy industries\u00a0by implementing a wide array of cutting edge Cybersecurity disciplines.<\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2373,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2696}\" x=\"\" :20=\"\" y=\"\" :2373=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2696=\"\"><!-- \/wp:paragraph --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2373,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2696}\" x=\"\" :20=\"\" y=\"\" :2373=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2696=\"\"><!-- wp:heading --><\/p><h2 bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2382,&quot;w&quot;:222,&quot;h&quot;:50,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2705}\" x=\"\" :20=\"\" y=\"\" :2382=\"\" w=\"\" :222=\"\" h=\"\" :50=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2705=\"\">Roles We Fill<\/h2><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2459,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2782}\" x=\"\" :20=\"\" y=\"\" :2459=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2782=\"\"><!-- \/wp:heading --><\/p><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2459,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2782}\" x=\"\" :20=\"\" y=\"\" :2459=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2782=\"\"><!-- wp:list --><\/p><ul bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:2459,&quot;w&quot;:222,&quot;h&quot;:1309,&quot;abs_x&quot;:40,&quot;abs_y&quot;:2782}\" x=\"\" :20=\"\" y=\"\" :2459=\"\" w=\"\" :222=\"\" h=\"\" :1309=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :2782=\"\"><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2459,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2782}\" x=\"\" :59=\"\" y=\"\" :2459=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2782=\"\">Chief Information Security Officer (CISO)<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2518,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2841}\" x=\"\" :59=\"\" y=\"\" :2518=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2841=\"\">Security Engineer<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2547,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2870}\" x=\"\" :59=\"\" y=\"\" :2547=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2870=\"\">Security Architect<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2576,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2899}\" x=\"\" :59=\"\" y=\"\" :2576=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2899=\"\">Security Analyst<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2605,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2928}\" x=\"\" :59=\"\" y=\"\" :2605=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2928=\"\">Ethical Hacker<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2634,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:2957}\" x=\"\" :59=\"\" y=\"\" :2634=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :2957=\"\">Information Assurance Analyst<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2692,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3015}\" x=\"\" :59=\"\" y=\"\" :2692=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3015=\"\">Information Assurance Manager<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2750,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3073}\" x=\"\" :59=\"\" y=\"\" :2750=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3073=\"\">Malware Analyst<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2779,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3102}\" x=\"\" :59=\"\" y=\"\" :2779=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3102=\"\">Incident Responder<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2808,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3131}\" x=\"\" :59=\"\" y=\"\" :2808=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3131=\"\">Computer Forensics Investigator<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2867,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3190}\" x=\"\" :59=\"\" y=\"\" :2867=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3190=\"\">Penetration Tester<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2896,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3219}\" x=\"\" :59=\"\" y=\"\" :2896=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3219=\"\">SCADA Security Analyst<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:2954,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3277}\" x=\"\" :59=\"\" y=\"\" :2954=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3277=\"\">Network Security Administrator<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3012,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3335}\" x=\"\" :59=\"\" y=\"\" :3012=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3335=\"\">Mobile Security Engineer<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3070,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3393}\" x=\"\" :59=\"\" y=\"\" :3070=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3393=\"\">Intrusion Detection Analyst<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3128,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3451}\" x=\"\" :59=\"\" y=\"\" :3128=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3451=\"\">Blockchain Developer \/ Engineer\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3187,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3510}\" x=\"\" :59=\"\" y=\"\" :3187=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3510=\"\">Cybersecurity Scrum Master\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3245,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3568}\" x=\"\" :59=\"\" y=\"\" :3245=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3568=\"\">Cloud Security Architect\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3303,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3626}\" x=\"\" :59=\"\" y=\"\" :3303=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3626=\"\">Cyber Intelligence Specialist\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3361,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3684}\" x=\"\" :59=\"\" y=\"\" :3361=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3684=\"\">Cyber Operations Specialist\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3419,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3742}\" x=\"\" :59=\"\" y=\"\" :3419=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3742=\"\">Cybersecurity Hardware Engineer<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3478,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3801}\" x=\"\" :59=\"\" y=\"\" :3478=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3801=\"\">Incident Responder<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3507,&quot;w&quot;:182,&quot;h&quot;:58,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3830}\" x=\"\" :59=\"\" y=\"\" :3507=\"\" w=\"\" :182=\"\" h=\"\" :58=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3830=\"\">Penetration Tester (Pen-Tester)<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3565,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3888}\" x=\"\" :59=\"\" y=\"\" :3565=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3888=\"\">Red Team Member<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3594,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3917}\" x=\"\" :59=\"\" y=\"\" :3594=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3917=\"\">Blue Team Member<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3623,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3946}\" x=\"\" :59=\"\" y=\"\" :3623=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3946=\"\">Vulnerability Assessor<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3652,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:3975}\" x=\"\" :59=\"\" y=\"\" :3652=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :3975=\"\">Virus Technician\u00a0<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3681,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:4004}\" x=\"\" :59=\"\" y=\"\" :3681=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :4004=\"\">Threat Hunter<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3710,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:4033}\" x=\"\" :59=\"\" y=\"\" :3710=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :4033=\"\">Source Code Auditor<\/li><li bis_size=\"{&quot;x&quot;:59,&quot;y&quot;:3739,&quot;w&quot;:182,&quot;h&quot;:29,&quot;abs_x&quot;:79,&quot;abs_y&quot;:4062}\" x=\"\" :59=\"\" y=\"\" :3739=\"\" w=\"\" :182=\"\" h=\"\" :29=\"\" abs_x=\"\" :79=\"\" abs_y=\"\" :4062=\"\">IT Security Architect<\/li><\/ul><p bis_size=\"{&quot;x&quot;:20,&quot;y&quot;:3786,&quot;w&quot;:222,&quot;h&quot;:0,&quot;abs_x&quot;:40,&quot;abs_y&quot;:4109}\" x=\"\" :20=\"\" y=\"\" :3786=\"\" w=\"\" :222=\"\" h=\"\" :0=\"\" abs_x=\"\" :40=\"\" abs_y=\"\" :4109=\"\"><!-- \/wp:list --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Bull Integrations Group Places Cybersecurity Professionals Current world events have\u00a0brought focus to the need of trained, skilled, proficient Cybersecurity professionals who can protect and defend against the possible risks to governments, military, business owners, shopping malls, and schools. Internet-connected environments, including hardware, software, and data\u00a0enterprises must be protected against unauthorized [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":17,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Recruiting - Bull Integrations Group<\/title>\n<meta name=\"description\" content=\"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bullintegrationsgroup.com\/?page_id=86\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Recruiting - Bull Integrations Group\" \/>\n<meta property=\"og:description\" content=\"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bullintegrationsgroup.com\/?page_id=86\" \/>\n<meta property=\"og:site_name\" content=\"Bull Integrations Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BullStaffingWorks\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T02:15:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@roland_matte\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bullintegrationsgroup.com\/?page_id=86\",\"url\":\"https:\/\/bullintegrationsgroup.com\/?page_id=86\",\"name\":\"Cybersecurity Recruiting - Bull Integrations Group\",\"isPartOf\":{\"@id\":\"https:\/\/bullintegrationsgroup.com\/#website\"},\"datePublished\":\"2019-05-20T21:16:23+00:00\",\"dateModified\":\"2023-03-23T02:15:24+00:00\",\"description\":\"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.\",\"breadcrumb\":{\"@id\":\"https:\/\/bullintegrationsgroup.com\/?page_id=86#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bullintegrationsgroup.com\/?page_id=86\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bullintegrationsgroup.com\/?page_id=86#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bullintegrationsgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industries We Staff\",\"item\":\"https:\/\/bullintegrationsgroup.com\/?page_id=17\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Recruiting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bullintegrationsgroup.com\/#website\",\"url\":\"https:\/\/bullintegrationsgroup.com\/\",\"name\":\"Bull Staffing Co.\",\"description\":\"Security Cleared Recruiters\",\"publisher\":{\"@id\":\"https:\/\/bullintegrationsgroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bullintegrationsgroup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bullintegrationsgroup.com\/#organization\",\"name\":\"Bull Staffing Co.\",\"url\":\"https:\/\/bullintegrationsgroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bullintegrationsgroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bullintegrationsgroup.com\/wp-content\/uploads\/2019\/05\/cropped-perfect-logo-1.png\",\"contentUrl\":\"https:\/\/bullintegrationsgroup.com\/wp-content\/uploads\/2019\/05\/cropped-perfect-logo-1.png\",\"width\":646,\"height\":536,\"caption\":\"Bull Staffing Co.\"},\"image\":{\"@id\":\"https:\/\/bullintegrationsgroup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BullStaffingWorks\/\",\"https:\/\/twitter.com\/roland_matte\",\"https:\/\/www.linkedin.com\/company\/bull-staffing-works\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Recruiting - Bull Integrations Group","description":"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bullintegrationsgroup.com\/?page_id=86","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Recruiting - Bull Integrations Group","og_description":"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.","og_url":"https:\/\/bullintegrationsgroup.com\/?page_id=86","og_site_name":"Bull Integrations Group","article_publisher":"https:\/\/www.facebook.com\/BullStaffingWorks\/","article_modified_time":"2023-03-23T02:15:24+00:00","twitter_card":"summary_large_image","twitter_site":"@roland_matte","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bullintegrationsgroup.com\/?page_id=86","url":"https:\/\/bullintegrationsgroup.com\/?page_id=86","name":"Cybersecurity Recruiting - Bull Integrations Group","isPartOf":{"@id":"https:\/\/bullintegrationsgroup.com\/#website"},"datePublished":"2019-05-20T21:16:23+00:00","dateModified":"2023-03-23T02:15:24+00:00","description":"The Bull Integrations Group has been focused on providing top-tier Cybersecurity staffing solutions since our inception by applying more than 23 years of Cyber and Information Assurance Recruiting experience.","breadcrumb":{"@id":"https:\/\/bullintegrationsgroup.com\/?page_id=86#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bullintegrationsgroup.com\/?page_id=86"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bullintegrationsgroup.com\/?page_id=86#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bullintegrationsgroup.com\/"},{"@type":"ListItem","position":2,"name":"Industries We Staff","item":"https:\/\/bullintegrationsgroup.com\/?page_id=17"},{"@type":"ListItem","position":3,"name":"Cybersecurity Recruiting"}]},{"@type":"WebSite","@id":"https:\/\/bullintegrationsgroup.com\/#website","url":"https:\/\/bullintegrationsgroup.com\/","name":"Bull Staffing Co.","description":"Security Cleared Recruiters","publisher":{"@id":"https:\/\/bullintegrationsgroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bullintegrationsgroup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bullintegrationsgroup.com\/#organization","name":"Bull Staffing Co.","url":"https:\/\/bullintegrationsgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bullintegrationsgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/bullintegrationsgroup.com\/wp-content\/uploads\/2019\/05\/cropped-perfect-logo-1.png","contentUrl":"https:\/\/bullintegrationsgroup.com\/wp-content\/uploads\/2019\/05\/cropped-perfect-logo-1.png","width":646,"height":536,"caption":"Bull Staffing Co."},"image":{"@id":"https:\/\/bullintegrationsgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BullStaffingWorks\/","https:\/\/twitter.com\/roland_matte","https:\/\/www.linkedin.com\/company\/bull-staffing-works\/"]}]}},"_links":{"self":[{"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/pages\/86"}],"collection":[{"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=86"}],"version-history":[{"count":21,"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/pages\/86\/revisions"}],"predecessor-version":[{"id":690,"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/pages\/86\/revisions\/690"}],"up":[{"embeddable":true,"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=\/wp\/v2\/pages\/17"}],"wp:attachment":[{"href":"https:\/\/bullintegrationsgroup.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}