Home » blog » Page 2

blog

June Current Openings

As we head into summer, we wanted to highlight just a few of the amazing job openings we currently have with Fortune 500 companies!

Our job openings are constantly changing, and we have many more than just the below available for you. Reach out to one of the recruiters below with your resume! Or you can give us a call at our toll-free office number (800) 276-6306. Our goal is to find you a position that suits not only your professional goals but your personal life as well.

Follow us on LinkedIn here for daily updates!

Not sure if AP Professionals will fit into your lifestyle and goals? Check out what others have to say in Blog No. 7 here!


Title: COBOL Mainframe Developer

Type: W2 – Remote

Description:  Will be involved in system enhancements, defect resolution, responses to user requests, and other system maintenance activities that will require you to collaborate closely with other team members. Code and test solutions based upon the technical designs using the methodologies, procedures, architectures, and standards of the system and to be able to incorporate these into the construction process for the system.

Top 3 skills:  COBOL, DB2, CICS

Pay Rate:  $50-70/hr.

Recruiter: Kerri Tenenbaum – LinkedIn


Title: Sr Project Manager – Cybersecurity

Position: 100% Remote

Description:  Responsible for managing multiple simultaneous cybersecurity projects within a cybersecurity PMO. Responsible for planning, executing and managing medium to large projects. Projects typically require both a business and technology focus. Facilitate project team meetings, monitor, track, and control outcomes to resolve issues, conflicts, dependencies, and critical path deliverables. Will work analytically and creatively using teamwork, innovation, and excellence to solve problems. Develop and execute a communication strategy for all the different project stakeholders and report on project status, progress, metrics, risks, test results, and deployment activities.

Top 3 skills:  5+ years of IT Project Management experience for enterprise scale companies and experience managing cybersecurity projects such as IAM, vulnerability management, GRC, etc.

Salary:  FTE conversion salary $115,000 plus benefits. Typical conversion is in 6-9 months.

Recruiter: Neil Tenenbaum – LinkedIn


Title: Principal Network Architect

Position: 100% Remote

Description:  This will be a contract to hire (FTE) role. Networking route/switch/wireless, Firewall, Cloud, SASE, SD-WAN, Datacenter networking required. Looking for a highly experienced Architect with 4-7 years minimum experience.

Top 3 skills:  SASE, SD-WAN, Azure, Network

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn


Title: Data Scientist

Position: Hybrid with up to two days per week onsite in Phoenix, AZ. Must reside in Phoenix area.

Description:  Data Scientist is responsible for generating insights and recommendations from the company’s history of observational data. The Data Scientist will build descriptive, predictive, and prescriptive models with the goal of maximizing the value of current and historical data.

Top 3 skills:  Agile/Scrum development methodology, Azure DevOps, experience manipulating big data using open-source frameworks, experience with business intelligence and data analytic tools such as Tableau.

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn


Title: Master Data Management Business Analyst

Position: Hybrid with up to two days per week onsite in Phoenix, AZ. Must reside in Phoenix area.

Description:  Responsible for contributing to the master data discovery and MDM implementation. Responsibilities will include working to make informed decisions on prioritizing new sources to ingest, querying databases for data profiling and data quality, creating dashboards, and enabling system integration. The Analyst in this role will document processes and workflows and will work closely with business stakeholders to develop and mature our MDM program.

Top 3 skills:  Agile/Scrum development methodology, Azure DevOps, Strong business analysis skills, familiarity with one or more of Master Data Systems.

Salary:  Negotiable

Recruiter: Neil Tenenbaum – LinkedIn

June Current Openings Read More »

Multifactor authentication Apps

Black background with green colored coding of zeros and ones in vertical lines. An image of a closed locker lock in the center with the text "multifactor authentication apps. what are they, which ones we like the best & what to keep an eye out for Blog No. 19" The AP logo appears in the bottom right corner.

Multifactor Authentication Apps: What they are, if they help, which ones we like the best & what to keep an eye out for.

When it comes to keeping your personal information safe, you might consider using a multifactor authenticator (MFA) app. However, there are so many apps to choose from, how do you know which ones are the safest? Below is all you need to know to make the most informed decision for yourself and/or your company.

What are multifactor authenticators?

Multifactor authentication apps (MFA) help to make it basically impossible for hackers to get into your personal/business accounts. As a matter of fact, any online account that you have can be secured with an MFA app. When you first download the MFA app you will be asked to link the account you desire to the app using a unique to you QR code. Once linked, each time you log into that account, a one-time passcode will be generated in real time to your MFA app. Enter in the one-time code (that only lasts about 30 seconds) and you’re securely into your account!

Do MFA apps really help?

Yes! Statistics report that in 2017 only 28% of accounts were secured with an MFA app. In 2021, 78% of accounts were secured with an MFA app. MFA applications use one-time codes that automatically reset every 30 seconds. These one-time use codes are sent to both your login account & your authenticator account. The codes are generated independently of each other to link point A to point B, making it difficult for anyone to intercept the code. Since the codes only last 30 seconds, they are updated on both ends in real time. Microsoft reported that 99.9% of compromised account attacks were blocked when an MFA was in use.  

Which apps are the front runners?

MFA apps that you will see listed over & over again are Microsoft Authenticator, Google Authenticator, and Authy. All serve the same purpose, are easy to use, provide a high level of security and work with both Android and iOS systems. Check out the articles below that we found extremely helpful for a deeper dive into each of these most popular apps. Others that we came across with significant positive research results were Duo & LastPass Authenticator.

However, with all technology, keep an eye out for scams.

In January of 2023, a scam authenticator app made its way into the Google Play Store. Unfortunately, over 10,000 users downloaded the scam authenticator and put all of their personal data in jeopardy. The app was created and called 2FA Authenticator. This app lasted in Google’s Play Store for Android users to download for 15 days before being removed. Once downloaded, the malicious code would use keylogging and screen recording to gather usernames & passwords entered into any account used on the device. Unfortunately, it is very hard to tell the difference between which apps you can or can’t trust in the Google Play or Apple Store. Be sure to only download an app that has thousands of downloads, positive reviews and only after you have researched it on your own! You can read more about the scam authenticator app at the link below.

Articles referenced to check out:

HP Tech Takes

NY Times Best Two-Factor Authentication App

PCMag News Malicious Android 2FA Authenticator App

17 Essential Multifactor Authentication Statistics 2023.

Multifactor authentication Apps Read More »

How to Identify a Real Recruiter from a Scam Account

Rectangle Graphic of a new message bubble with the text "How to identify a real recruiter from a scam account Blog No. 18" a smaller message bubble with the text "unsure if you were contacted by a real recruiter or a fake one? Go through this list & see if these signs match up with your experience." Along the bottom are icons of a computer, notes, inbox and recycle bin. The AP professionals logo shows up on the bottom right hand corner

Unsure if you were contacted by a real recruiter or a fake one? Go through this list & see if these signs match up with your experience.

As technology & social media become more prevalent in our world, it becomes easier for a scammer to target everyday individuals. This started (and still continues) with fake phone calls, which moved into fake emails & links. Then into full catfish accounts on social media platforms. Unfortunately, this is no different when it comes to job hunting. As sites like LinkedIn, Indeed, Monster, Dice and more have gained popularity, how do you know the person on the other end of a direct message is a real recruiter?

We have some tips below to help you weed out the real recruiters with real job opportunities from the fake ones, who will ultimately try to gain personal information & money from you. Even if these things don’t happen to you, trust your gut instinct! If something feels off, it most likely is.

If the profile that messaged you, looks brand-new.

A tell-tale sign that you might encounter if you are engaging with a scam account is, if the profile that messaged you does not have a profile picture, has a very low connection count and little to no posts, stop engaging immediately. These are signs of a brand-new account that could have been created only minutes before reaching out to you. A real recruiter’s main job is to make connections with people! Their profile should have a profile photo, many post interactions & a log history of interactions.

If at any point the recruiter asks to share your contact details with other sources.

Recruiters should keep all of your personal information confidential between them & the end client. If at any point they ask to share your information with another recruiter or another agency, this could be a sign of a scammer. The only information they should be asking you for or sharing, is your resume. This will be required by the end client who will be conducting your interview. Even then, the recruiter is in charge of setting up your interview and should be the one gathering & keeping any information.

If the recruiter fails to explain the details of the job to you.

The recruiter reaching out to you should know all the ins & outs of the position they are asking you to apply for. Not only should be able to answer all of your questions with ease, but they should also be able to give you specific details on the requirements & the end client.

Also, keep in mind that a recruiter should never submit your profile to a job opening without your permission. It is best that they get your permission in writing before submitting you for an opening. If they fail to do so, you could be dealing with a fake account.

If the recruiter sends you an offer without completing proper interview formalities.

Let’s say you get a message regarding an open position on Monday and by Tuesday you receive an offer to take the job. They may have asked you some questions via direct message, but you never had an official interview. This is a strong indicator that you are being targeted. Real recruiters will always reach out to you and want to set up an interview for you with the end client. Most likely, there will be more than one interview that is required before an offer is sent out. If it seems like things are moving way too fast, this is a red flag.

If at any point, the recruiter asks for money, you are being scammed.

This is a huge red flag and it most likely won’t come right away. Scammers love to gain your confidence & trust before asking for these details. A real recruiter will never ask you for any form of payment. You do not have to pay them for their services as they are employed by a legit company. They also will never ask you to provide any credit card or banking information. Banking information should only be provided after acceptance of a job during the Onboarding process after all other items check-out. This is all after interviews, negotiations, face-to-face meetings. This will also come directly from the companies HR team via a secure system.

Remember to always trust your gut & never provide personal information to anyone without doing your research first! You should be able to google their name, the company they work for and find reputable sources that the recruiter who reached out is legit! If you can’t, block that profile as fast as you can!

How to Identify a Real Recruiter from a Scam Account Read More »

Scroll to Top