Clicks is a Cyber Security Recruitment Specialist
Cyber Security Architect
A Cyber Security Architect is an expert in designing and implementing secure information technology systems. They are responsible for identifying potential vulnerabilities and designing security controls to protect against cyber attacks. Cyber Security Architects work to ensure the confidentiality, integrity, and availability of information and systems, and stay up to date with emerging threats and technologies.Cyber Security Analyst
A Cyber Security Analyst is a professional responsible for monitoring, detecting, and responding to cyber threats to an organisation’s information technology systems. They analyse security logs, conduct vulnerability assessments, and investigate security incidents. Cyber Security Analysts work to maintain the security and integrity of an organisation’s data and systems.Cyber Security Engineer
A Cyber Security Engineer is a specialist who designs and implements secure IT systems and networks to protect against cyber attacks. They work to identify vulnerabilities and develop security controls and protocols to mitigate risks. Cyber Security Engineers also investigate security incidents and develop incident response plans to ensure quick and effective resolution.Penetration Testers
A Penetration Tester, also known as an ethical hacker, is a professional who conducts controlled attacks on an organisation’s IT systems to identify vulnerabilities and weaknesses. They simulate real-world cyber attacks to test the effectiveness of an organisation’s security controls and protocols. Penetration Testers provide recommendations for improving the organisation’s security posture.Cyber Security Monitoring & Response
Cyber Security Monitoring & Response professionals are responsible for detecting and responding to cyber threats to an organisation’s IT systems. They monitor security logs and conduct real-time analysis of network traffic to identify potential security incidents. Cyber Security Monitoring & Response professionals also develop and implement incident response plans to quickly and effectively respond to security incidents.Information Security Analyst
An Information Security Analyst is responsible for assessing and managing an organisation’s information security risks. They evaluate the effectiveness of existing security controls and develop policies and procedures to improve the organisation’s security posture. Information Security Analysts also monitor security logs and investigate security incidents to ensure the integrity and availability of an organisation’s data and systems.Cyber Security Administrator
A Cyber Security Administrator is responsible for managing an organisation’s cyber security infrastructure. They configure and maintain security controls such as firewalls and intrusion detection systems, and monitor security logs for potential security incidents. Cyber Security Administrators also provide user training and support, and assist with incident response and disaster recovery.Cyber Threat Engineer
A Cyber Threat Engineer is a specialist who anticipates and identifies emerging cyber threats to an organisation’s IT systems. They conduct research and analysis to understand the motivations and tactics of cyber attackers, and develop countermeasures to mitigate risks. Cyber Threat Engineers also provide recommendations for improving an organisation’s security posture.Cyber Security Manager
A Cyber Security Manager is responsible for managing an organisation’s cyber security program. They develop and implement policies and procedures to mitigate cyber risks, and oversee security operations to ensure the confidentiality, integrity, and availability of an organisation’s data and systems. Cyber Security Managers also provide leadership and guidance to security professionals within the organisation.Cyber Security Administrator
A Cyber Security Administrator is responsible for managing an organisation’s cyber security infrastructure. They configure and maintain security controls such as firewalls and intrusion detection systems, and monitor security logs for potential security incidents. Cyber Security Administrators also provide user training and support, and assist with incident response and disaster recovery.Head of Cyber Security
The Head of Cyber Security is a senior executive responsible for overseeing an organisation’s cyber security program. They provide strategic leadership and direction to ensure the confidentiality, integrity, and availability of an organisation’s data and systems. The Head of Cyber Security works with stakeholders to establish and maintain policies and procedures for managing cyber risks.Cyber Security Strategist
A Cyber Security Strategist is a professional responsible for developing and implementing a comprehensive cyber security strategy for an organisation. They work to align cyber security initiatives with business objectives and manage risks to the organisation’s data and systems. Cyber Security Strategists also stay up to date with emerging threats and technologies, and provide guidance to security professionals within the organisation.
Clicks is a Specialist Cyber Security Recruitment Agency

Network & App Security
- Cisco ASA
- Palo Alto Networks
- Fortinet
- Check Point
- OpenVPN
- WireGuard
- Astra Security
- Acunetix
- SonicWall
- NordLayer
- BurpSuite
- CylancePROTECT
- Juniper Networks
- Perimeter 81

Security Information & Event Management (SIEM)
- IBM QRadar
- Azure Sentinel
- SolarWinds Security Event Manager
- LogRhythm NextGen SIEM Platform
- Splunk Enterprise Security
- ArcSight
- AT&T Cybersecurity
- Rapid7 InsightIDR
- ELK Stack
- RSA NetWitness
- Exabeam Security Management Platform
- Graylog
- McAfee Enterprise Security Manager (ESM)
- McAfee ePolicy Orchestrator (ePO)

Penetration Testing
- Metasploit
- Burp Suite
- Nikto
- W3AF
- SQLMap
- Zed Attack Proxy
- BeEF
- Cobalt
- Nessus
- OpenVAS
- Nmap
- Wireshark
- Fiddler
- Hydra

Intrusion Detection/Prevention
- Cisco ASA
- ModSecurity
- Snort++
- Snort
- Suricata
- Bro/Zeek
- OSSEC
- Security Onion
- Log360
- IBM QRadar
- Datadog Security Monitoring
- Cisco Firepower
- Qualys
- Rapid7 InsightVM
With a dedicated Sourcing Team, we’ll find a Cyber Security expert ready for your team.
