Analytics

10/31/2018
02:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

9 Traits of A Strong Infosec Resume

Security experts share insights on which skills and experiences are most helpful to job hunters looking for their next gig.
2 of 10

1. Show Your Whole Story
Regardless of the position you're going for, your resume should reflect what duties you owned in every job. In addition to showing what your team did, explain how you helped the group achieve its goals. What did you take ownership of? How did you help drive success?
'Having a clear, concise resume that effectively summarizes what you as a person were responsible for is critical,' says Drew Fearson, chief operating officer at NinjaJobs.
(Image: Slonme - stock.adobe.com)

1. Show Your Whole Story

Regardless of the position you're going for, your resume should reflect what duties you owned in every job. In addition to showing what your team did, explain how you helped the group achieve its goals. What did you take ownership of? How did you help drive success?

"Having a clear, concise resume that effectively summarizes what you as a person were responsible for is critical," says Drew Fearson, chief operating officer at NinjaJobs.

(Image: Slonme stock.adobe.com)

2 of 10
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
enhayden1321
100%
0%
enhayden1321,
User Rank: Strategist
11/3/2018 | 2:25:37 PM
Demonstrate Your Communication Skills
The article is interesting but missing a key element.  It is an imperative that the security professional is a strong communicator.  This includes verbal and written skills that demonstrate you know how to write complete sentences, develop arguments, and can speak to the issue at hand.  Also, you need to have very strong skills with the Microsoft suite of Word, PowerPoint, and Excel.  If you cannot effectively communicate then you will not be a solid security professional.  Thank you.
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11515
PUBLISHED: 2019-04-25
core/classes/db_backup.php in Gila CMS 1.10.1 allows admin/db_backup?download= absolute path traversal to read arbitrary files.
CVE-2019-11511
PUBLISHED: 2019-04-25
Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
CVE-2019-11513
PUBLISHED: 2019-04-25
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
CVE-2019-11514
PUBLISHED: 2019-04-25
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
CVE-2019-11506
PUBLISHED: 2019-04-24
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to Expo...