Our Approach
During the briefing with the client we agreed that the person needed to:
- create a coherent security strategy covering all systems and services,
- ensure compliance with regulations and partner requirements,
- embed security practices into the daily work of teams.
We broadened sourcing and focused on candidates with experience in large, regulated organizations who understood how to manage security at enterprise scale. This provided the client with access to candidates whose competencies matched the strategic requirements.
The recruitment process consisted of two stages:
- Technical and business interview - assessment of technical competencies and understanding of telecom-specific challenges.
- Meeting with the board - discussion of strategy and proposed actions, and assessment of cultural fit.
Twelve days after presenting the candidate, the client decided to make an employment offer.