Home » blog » Page 2

blog

Celebrating 25 Years of Business

We sincerely thank those that have made a significant impact on our journey of 25 years.

AP Professionals is proud to be celebrating 25 years of business! We sincerely thank those that have made a significant impact on our journey of 25 years.

A word from our President:

AP Professionals was founded in Scottsdale, AZ in August of 1998 with our first placement being an SAP consultant on September 1st, 1998. It is incredible for me think back on those days and marvel that we have placed thousands of technical associates since our inception 25 years ago. Our growth has been organic, and we now have opened offices in Portland, OR; Las Vegas, NV; Seattle, WA and Baltimore, MD. I am most proud that we have lived up to our Mission Statement “Building Relationships That Last a Lifetime”. My thanks to all of you that believed in us and trusted us throughout our journey.

Sincerely,
Jerry Tenenbaum
President

Celebrating 25 Years of Business Read More »

June Current Openings

As we head into summer, we wanted to highlight just a few of the amazing job openings we currently have with Fortune 500 companies!

Our job openings are constantly changing, and we have many more than just the below available for you. Reach out to one of the recruiters below with your resume! Or you can give us a call at our toll-free office number (800) 276-6306. Our goal is to find you a position that suits not only your professional goals but your personal life as well.

Follow us on LinkedIn here for daily updates!

Not sure if AP Professionals will fit into your lifestyle and goals? Check out what others have to say in Blog No. 7 here!


Title: COBOL Mainframe Developer

Type: W2 – Remote

Description:  Will be involved in system enhancements, defect resolution, responses to user requests, and other system maintenance activities that will require you to collaborate closely with other team members. Code and test solutions based upon the technical designs using the methodologies, procedures, architectures, and standards of the system and to be able to incorporate these into the construction process for the system.

Top 3 skills:  COBOL, DB2, CICS

Pay Rate:  $50-70/hr.

Recruiter: Kerri Tenenbaum – LinkedIn


Title: Sr Project Manager – Cybersecurity

Position: 100% Remote

Description:  Responsible for managing multiple simultaneous cybersecurity projects within a cybersecurity PMO. Responsible for planning, executing and managing medium to large projects. Projects typically require both a business and technology focus. Facilitate project team meetings, monitor, track, and control outcomes to resolve issues, conflicts, dependencies, and critical path deliverables. Will work analytically and creatively using teamwork, innovation, and excellence to solve problems. Develop and execute a communication strategy for all the different project stakeholders and report on project status, progress, metrics, risks, test results, and deployment activities.

Top 3 skills:  5+ years of IT Project Management experience for enterprise scale companies and experience managing cybersecurity projects such as IAM, vulnerability management, GRC, etc.

Salary:  FTE conversion salary $115,000 plus benefits. Typical conversion is in 6-9 months.

Recruiter: Neil Tenenbaum – LinkedIn


Title: Principal Network Architect

Position: 100% Remote

Description:  This will be a contract to hire (FTE) role. Networking route/switch/wireless, Firewall, Cloud, SASE, SD-WAN, Datacenter networking required. Looking for a highly experienced Architect with 4-7 years minimum experience.

Top 3 skills:  SASE, SD-WAN, Azure, Network

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn


Title: Data Scientist

Position: Hybrid with up to two days per week onsite in Phoenix, AZ. Must reside in Phoenix area.

Description:  Data Scientist is responsible for generating insights and recommendations from the company’s history of observational data. The Data Scientist will build descriptive, predictive, and prescriptive models with the goal of maximizing the value of current and historical data.

Top 3 skills:  Agile/Scrum development methodology, Azure DevOps, experience manipulating big data using open-source frameworks, experience with business intelligence and data analytic tools such as Tableau.

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn


Title: Master Data Management Business Analyst

Position: Hybrid with up to two days per week onsite in Phoenix, AZ. Must reside in Phoenix area.

Description:  Responsible for contributing to the master data discovery and MDM implementation. Responsibilities will include working to make informed decisions on prioritizing new sources to ingest, querying databases for data profiling and data quality, creating dashboards, and enabling system integration. The Analyst in this role will document processes and workflows and will work closely with business stakeholders to develop and mature our MDM program.

Top 3 skills:  Agile/Scrum development methodology, Azure DevOps, Strong business analysis skills, familiarity with one or more of Master Data Systems.

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn

June Current Openings Read More »

Multifactor authentication Apps

Black background with green colored coding of zeros and ones in vertical lines. An image of a closed locker lock in the center with the text "multifactor authentication apps. what are they, which ones we like the best & what to keep an eye out for Blog No. 19" The AP logo appears in the bottom right corner.

Multifactor Authentication Apps: What they are, if they help, which ones we like the best & what to keep an eye out for.

When it comes to keeping your personal information safe, you might consider using a multifactor authenticator (MFA) app. However, there are so many apps to choose from, how do you know which ones are the safest? Below is all you need to know to make the most informed decision for yourself and/or your company.

What are multifactor authenticators?

Multifactor authentication apps (MFA) help to make it basically impossible for hackers to get into your personal/business accounts. As a matter of fact, any online account that you have can be secured with an MFA app. When you first download the MFA app you will be asked to link the account you desire to the app using a unique to you QR code. Once linked, each time you log into that account, a one-time passcode will be generated in real time to your MFA app. Enter in the one-time code (that only lasts about 30 seconds) and you’re securely into your account!

Do MFA apps really help?

Yes! Statistics report that in 2017 only 28% of accounts were secured with an MFA app. In 2021, 78% of accounts were secured with an MFA app. MFA applications use one-time codes that automatically reset every 30 seconds. These one-time use codes are sent to both your login account & your authenticator account. The codes are generated independently of each other to link point A to point B, making it difficult for anyone to intercept the code. Since the codes only last 30 seconds, they are updated on both ends in real time. Microsoft reported that 99.9% of compromised account attacks were blocked when an MFA was in use.  

Which apps are the front runners?

MFA apps that you will see listed over & over again are Microsoft Authenticator, Google Authenticator, and Authy. All serve the same purpose, are easy to use, provide a high level of security and work with both Android and iOS systems. Check out the articles below that we found extremely helpful for a deeper dive into each of these most popular apps. Others that we came across with significant positive research results were Duo & LastPass Authenticator.

However, with all technology, keep an eye out for scams.

In January of 2023, a scam authenticator app made its way into the Google Play Store. Unfortunately, over 10,000 users downloaded the scam authenticator and put all of their personal data in jeopardy. The app was created and called 2FA Authenticator. This app lasted in Google’s Play Store for Android users to download for 15 days before being removed. Once downloaded, the malicious code would use keylogging and screen recording to gather usernames & passwords entered into any account used on the device. Unfortunately, it is very hard to tell the difference between which apps you can or can’t trust in the Google Play or Apple Store. Be sure to only download an app that has thousands of downloads, positive reviews and only after you have researched it on your own! You can read more about the scam authenticator app at the link below.

Articles referenced to check out:

HP Tech Takes

NY Times Best Two-Factor Authentication App

PCMag News Malicious Android 2FA Authenticator App

17 Essential Multifactor Authentication Statistics 2023.

Multifactor authentication Apps Read More »

Scroll to Top