Allocation of resources

Allocation of resources

Whether you have difficulties hiring specialized employees or are looking to fill an immediate need, BCI resources allocation service can help.
BCI has a national network of certified professionals with extensive experience in IT consulting services and information security, which can be mobilized quickly to meet your needs.

 

Certified professionals

 

BCI’s team of professionals possess various certifications such as CISSP, CISM, CISA, CRISC, GREM, CEH, CCSA, CCSE, CCNA, WSGA, MSGA, PMP, CCIE, MCSE, CIA, Eng. and MBA to name just a few.

 

The approach and methodologies our professionals use are based on the leading practices in information security such as ISO-27001, ISO-27002, Mehari and COBIT. BCI consultants hold certifications from various organizations including ISACA, SANS, ISC2, PMI, Microsoft, CheckPoint, ArcSight and HP. BCI also has a “skill level of investment” as described by the Ministry of Labour in the Canadian government.

 

A proactive recruitment approach

 

Through partnerships with placement firms, BCI recruits skilled consultants and negotiates the best rates. This allows BCI to be competitive and in some cases even more cost effective than most of the other security consulting firms.

 

In order to maintain a high level of quality in our candidate database, BCI retains only those who have worked successfully with business leaders, managers and subcontractors based on our stringent requirements. In addition to providing high-calibre resources, BCI consultants have access to leading edge intellectual capital, methodologies, diagnostic tools and templates.

 

Whether it is by hourly rate or as a package, BCI is committed to supporting its customers in all their IT and information security needs.

The top talent for your sector

Regardless of which sector you operate in, BCI provides custom consultant services adapted to your company’s needs to better navigate the complexities and risks associated with new business directions, legislative changes, increased conformity requirements or increased levels of security threats.