Access "Information security resume do's and don'ts"
This article is part of the July 2006 issue of Exclusive: Security salary and careers guide
We all know an employer looks at a résumé for 30 seconds. Here are some surefire tips for standing out in the stack. Do: Write an appropriate objective statement (or omit it all together). Most employers will not read on if the objective does not match the position that they are hiring for. For example, if a candidate were applying for a manager of network security position at a financial services company, an effective objective statement would look like this: "Objective: To find a leadership position that enables me to utilize my five years of experience as a lead network security engineer and technical project manager at a global investment bank." Objective statements, however, are not a necessity. If a company has multiple positions that interest you, don't paint yourself into a corner. Focus on the position you're applying for. The résumé should be geared toward the requirements of the specific position. (It's OK to have different résumés for different positions, but be careful about just changing the objective statement--it sometimes leads to a ... Access >>>
Premium Content for Free.
- What's a Hot Pick?
Calculate You IT Security Salary
Learn how to calculate your IT information security salary based on certifications, job and years of experience, company size and industry.
Document Detective 2.0
- All In A Day's Work
The Right Stuff
SAVVY No two CISOs have the same background, but successful ones have similar skills.
- The XX Factor
What Are You Worth?
SALARY Six-figure security jobs have become common. Maybe you should slip this article into your boss's mailbox.
- 9 Habits of Highly Successful CISOs
Information security resume do's and don'ts
Get advice, and learn do's and don'ts for creating an information security technology or network security resume.
Hot Pick: Tenable offers solid vulnerability management
by Brent Huston, Contributing Writer
Product review: Tenable Network Security's Security Center 3.0 helps organizations throughout the vulnerability management lifecycle, from asset discovery to remediation.
Mobile Device Security
Mobile Guardian Enterprise Edition 5.1
Authentication: RSA SecurID Appliance 2.0
RSA SecurID Appliance 2.0
- Buy the Book
Moving On Up
SKILLS How do you rise in the security ranks? Don't speak geek; use the language of business.
Face-Off: Schneier and Ranum debate security certifications
Are security certifications valuable?
Perspectives: Security success sometimes hinges on politics and personalities
The best infosecurity professionals are situationally aware and attuned to what is happening to them and their environment.
Ping: Robert Garigue
- Editor's Desk
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...