This is what we do
There are many possible paths within IT Infrastructure & Security. We are happy to help you find the right path to suit your needs and work experience. We turn your ambition into a career. Our working method differs for each professional: our guidance is aimed at helping you to grow further as a professional in a way that suits you. Therefore, every type of contract is different and may or may not fit your needs.
Are you looking for a permanent job or would you rather work as a freelancer? Listening to your wishes allows us to offer customised advice. Then we can guide you to the next step. So how do you prefer to work? In permanent employment, freelance or on a contract project basis? Read more here.
Tergos is focused on a market where there is a great need for interim professionals. Our consultants are specialised in IT Infrastructure & Security. Thanks to our extensive knowledge of the market, we can help you move forward as a professional. We not only look at the content of the assignment, but also at the duration, the rate and the type of client that suits you.
Choose the employer contract model
An increasing number of IT Infrastructure & Security professionals are working for Tergos. We are happy to offer you a career within our ambitious organisation. Enjoy the benefits of a permanent job and the variety of assignments.
Choose Search & Selection
Tergos knows which positions are open in the IT Infrastructure & Security market. Based on your specific wishes and expectations, we are sure to find your next employer. Your wishes and expectations with regard to a permanent job serve as the starting point for our search for your ideal employer. We prepare you for job interviews, give you honest feedback and advise you on salary negotiations.
Our specialist consultants will be happy to give you more information about the different ways we work and the career opportunities this offers. Contact us for more information.
How do you protect yourself against ransomware?
Cyber criminals are increasingly using ransomware to blackmail companies and extort money. What are the different types of ransomware? How do ...
Read more >
Rapid transition to telecommuting and the cloud places new demands on security
In March 2020, millions of people around the world were forced to work from home virtually overnight. This posed significant challenges to IT team...
Read more >