{"id":6,"date":"2023-01-27T14:24:14","date_gmt":"2023-01-27T14:24:14","guid":{"rendered":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/?page_id=6"},"modified":"2023-02-06T15:23:23","modified_gmt":"2023-02-06T15:23:23","slug":"about-us","status":"publish","type":"page","link":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/about-us\/","title":{"rendered":"About Us"},"content":{"rendered":"
[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ background_color=”#f1fafe” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-08.png” custom_padding=”||0px|||” background_last_edited=”on|phone” background_position_tablet=”center_right” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”3_5″ _builder_version=”4.16″ global_colors_info=”{}”][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
We are a group of young talent who have worked in several IT areas and across varied industries(Retail, Health Care & Insurance, Financial services, most importantly Technology Focused). So through years of personal experiences we have accumulated a wealth of knowledge and skills in perfectly analyzing and delivering IT project requirements as well as IT org objectives and goals.<\/b><\/p>\n
As an IT Solutions Provider, we believe in integrity, respect and diversity in cultures and skills. We believe in demonstrating a commitment to personal growth through training and development for all our in house talent. We encourage everyone and personally believe in growing through continuous learning and being agile as our IT world is constantly evolving.<\/b><\/p>\n
Our hiring areas include contingent hires, direct hires, direct sourcing and inhouse technology sourcing for inhouse projects.<\/b><\/p>\n
We aspire everyday to do quality work for all groups of clients and assist our talent to work at some of the most amazing companies.<\/b><\/p>\n
Why AV Technologies, our MANTRA:<\/b><\/p>\n .\u00a0<\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” admin_label=”About” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-04.png” background_size=”contain” background_position=”bottom_center” custom_margin=”||16vw” custom_padding=”||16vw|||” top_divider_style=”slant” top_divider_height=”20vw” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”9vw||” custom_padding_tablet=”0vw||” custom_padding_last_edited=”off|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”29vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_image src=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-14.png” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-5vw|-10vw||-10vw||true” custom_margin_tablet=”0vw|0vw||0vw||true” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.18.0″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” hover_enabled=”0″ border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}” sticky_enabled=”0″][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_blurb title=”(805)-768-4855″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.18.0″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ icon_font_size=”24px” locked=”off” global_colors_info=”{}” sticky_enabled=”0″][\/et_pb_blurb][et_pb_blurb title=” <\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" About UsWe are a group of young talent who have worked in several IT areas and across varied industries(Retail, Health Care & Insurance, Financial services, most importantly Technology Focused). So through years of personal experiences we have accumulated a wealth of knowledge and skills in perfectly analyzing and delivering IT project requirements as well as […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":4,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":143,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/6\/revisions\/143"}],"wp:attachment":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n
\n
\n
Approach<\/h3>\n
Our Approach to Data and Analysis<\/h2>\n
Contact Us<\/h2>\n
\n1883 Fox Springs Cir
\nNewbury Park, CA 91320 USA
\n” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]<\/p>\nGet Started Now<\/h2>\n