SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
8
IT GOVERNANCE
INDUSTRY EXPERIENCE
As specialist consultants, we have a comprehensive understanding of IT Governance. We are committed to
understanding and creating original solutions for each and every recruitment mandate we receive, regardless
of contract level, length or salary. Our proven approach have has been widely adopted as best practice within
the industry, however it is the time we take to understand our clients’ needs and our candidates’ career
ambitions to achieve the ideal result for both parties that really sets us apart. This collaborative approach has
helped Morgan McKinley build honest, consistent and long-term partnerships with our clients. We believe our
exceptional track record only remains as good as our last assignment.
SPECIALISATION
TECHNOLOGY RISK INFORMATION SECURITY IT AUDIT
 Technology Risk
 IT Risk Management
 1LoD & 2LoD
 Risk & Controls
 Governance & Framework
 Programme Assurance & Project Risk
 Data Risk Management
 IT Regulatory & Compliance
 Threat & Vulnerability Management
 Security Monitoring & Analytics
 SOC Advisory
 Data Loss Prevention (DLP)
 Incident Response & Forensics
 Enterprise Security Architecture
 Cyber Operations
 Network & Application Security
 Identity & Access Management
 Information Risk
 Applications
 Infrastructure
 Data Analytics Audit
 Change Audit
 SME IT Audit Risk
9
MEET THE TEAM
YOGEN PARMAR
TECHNOLOGY RISK
LUKE PULSFORD
INFORMATION SECURITY
MITESH PARIKH
IT AUDIT
Yogen leads our Technology Risk Practice at
Morgan McKinley specialising in placing
Technology and IT Risk professionals into
Financial Services & Professional Services. With a
comprehensive personal network across
Technology and Finance, Yogen is dedicated to
matching the right talent with exceptional
opportunities and is passionate about creating
opportunities for time sensitive requisitions as
well as in-depth executive searches.
Luke leads our Information Security Division at
Morgan McKinley, specialising in head-hunting
and attracting the very highest calibre of
professionals in the Information Security & Cyber
space. With the ever increasing priority of Cyber
risk & vulnerabilities, Luke is passionately
dedicated in delivering a targeted and proactive
approach, whether that be both permanent or
contract opportunities.
Mitesh Leads the Technology, Data Analytics &
Change Audit Practice here at Morgan McKinley.
Being a Specialist IT Audit Recruiter, Mitesh
specialises in Applications, Infrastructure and IT
Security Audits ranging from AVP to MD Level.
Mitesh adopts a purely consultative approach to
both candidates and clients, for him transparency
is key.

Contenu connexe

En vedette

Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Maganathin Veeraragaloo
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The PasswordPriyanka Aash
 

En vedette (6)

Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The Password
 

IT Governance 2 pager

  • 1. 8 IT GOVERNANCE INDUSTRY EXPERIENCE As specialist consultants, we have a comprehensive understanding of IT Governance. We are committed to understanding and creating original solutions for each and every recruitment mandate we receive, regardless of contract level, length or salary. Our proven approach have has been widely adopted as best practice within the industry, however it is the time we take to understand our clients’ needs and our candidates’ career ambitions to achieve the ideal result for both parties that really sets us apart. This collaborative approach has helped Morgan McKinley build honest, consistent and long-term partnerships with our clients. We believe our exceptional track record only remains as good as our last assignment. SPECIALISATION TECHNOLOGY RISK INFORMATION SECURITY IT AUDIT  Technology Risk  IT Risk Management  1LoD & 2LoD  Risk & Controls  Governance & Framework  Programme Assurance & Project Risk  Data Risk Management  IT Regulatory & Compliance  Threat & Vulnerability Management  Security Monitoring & Analytics  SOC Advisory  Data Loss Prevention (DLP)  Incident Response & Forensics  Enterprise Security Architecture  Cyber Operations  Network & Application Security  Identity & Access Management  Information Risk  Applications  Infrastructure  Data Analytics Audit  Change Audit  SME IT Audit Risk
  • 2. 9 MEET THE TEAM YOGEN PARMAR TECHNOLOGY RISK LUKE PULSFORD INFORMATION SECURITY MITESH PARIKH IT AUDIT Yogen leads our Technology Risk Practice at Morgan McKinley specialising in placing Technology and IT Risk professionals into Financial Services & Professional Services. With a comprehensive personal network across Technology and Finance, Yogen is dedicated to matching the right talent with exceptional opportunities and is passionate about creating opportunities for time sensitive requisitions as well as in-depth executive searches. Luke leads our Information Security Division at Morgan McKinley, specialising in head-hunting and attracting the very highest calibre of professionals in the Information Security & Cyber space. With the ever increasing priority of Cyber risk & vulnerabilities, Luke is passionately dedicated in delivering a targeted and proactive approach, whether that be both permanent or contract opportunities. Mitesh Leads the Technology, Data Analytics & Change Audit Practice here at Morgan McKinley. Being a Specialist IT Audit Recruiter, Mitesh specialises in Applications, Infrastructure and IT Security Audits ranging from AVP to MD Level. Mitesh adopts a purely consultative approach to both candidates and clients, for him transparency is key.