Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

1/24/2020
10:00 AM
Aditya Sharma
Aditya Sharma
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

5 Resume Basics for a Budding Cybersecurity Career

You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

Cybersecurity professionals are trained to secure, fix, and prevent security breaches and cyberattacks. To become a cybersecurity professional, you need to have your head in the game. But more than that, you also need to be an excellent resume tactician because it takes impeccable industry-relevant experience and credentials to get short-listed for the job of your dreams.

These five tips can help you elevate your professional resume to the top of the list:

Tip 1: Result-Oriented, Detailed Job Experience
A great way to do this is by crafting the details of your roles and responsibilities into one-line bullet points of your action-oriented accomplishments, which is a strategy espoused by Princeton University. For example:

● Prepared reports to document security breaches and damage caused by them, leading to a 90% reduction in security breaches
● Supervised penetration testing to locate vulnerable issues in the systems to avoid exploit

This illustrates a cause-effect relationship to showcases the reason behind the actions performed and what the results of these actions were. In the first point, the action and results are:

● Action: Report preparation
● Result: Reduction in security breach

Similarly, in the second point, the action and results are:

● Action: Supervising penetration testing
● Result: Location of system issues and avoiding exploit

Tip 2: An Impactful Summary
Most recruiters tend to browse through resumes in a jiffy because they just don't have the time to critically analyze each and every job application. This means that job seekers need to communicate the details of their work trajectory in a short three- to five-line resume summary. The goal of your summary is to effectively communicates career highlights and key achievements. For example:

Cybersecurity professional with six years of experience and a proven track record of establishing effective security software for any system. DoD security clearance. Background in internal/external penetration testing to protect systems against breaches and fix damages caused.

Tip 3: A Distinct Skills Section
You are no one without your skills in the job market. But having skills is one thing; being able to communicate what those professional skills are is another. Consequently, if your cybersecurity resume does not highlight your functional skills under a distinct section, you're doing it all wrong. Why? Because recruiters, in their limited capacity, would simply move on to the next resume if they have to try too hard to identify your skills.

Here's a valuable piece of advice: Create a distinct Key Skills section in your resume and list all your relevant skills under it. Doing this will drastically help increase your short-list chances because recruiters will be able to identify your functional skills in one go, and if they match the criteria that they're looking for, you'll most likely be called for an interview.

Tip 4: Education and Certification Details
Something as obvious as presenting your education and certifications details is critical for demonstrating that you have attained the relevant theoretical knowledge necessary for a cybersecurity career. This should include:

● Name of school/university
● Name of the courses/certifications pursued by you
● Location of the degree/certificate-issuing body
● Enrollment and graduation dates

Tip 5: Up-to-Date Contact Details
While this may seem obvious, don't make the surprisingly common mistake of sending out your resume without mentioning important contact details that would prevent a potential employer from getting in touch with you. So, while you're busy polishing your resume, make sure that you've listed up-to-date contact information, including:

● One functional mobile number
● An email address
● Your current location

Finally, make sure that you compose this section with the precision of a surgeon because you cannot afford to make innocent blunders such as spelling mistakes. One wrong or missing letter and number, and you'll never hear from a recruiter!

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses."

On a quest to help professionals across the world land their dream jobs, Aditya lives and breathes Hiration — an AI-powered online resume builder and platform to help job-seekers find their way in the treacherous job market.  When Aditya is not busy disrupting the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Mark_McClain
50%
50%
Mark_McClain,
User Rank: Apprentice
1/28/2020 | 6:14:17 PM
Great!
Great insight here!
JacksonSanderson
50%
50%
JacksonSanderson,
User Rank: Apprentice
2/13/2020 | 9:34:37 AM
Re: Great!
This is a hot topic. We must protect information at different levels. This may be literature or educational resources that need protection. Such popular sites have triple protection and a variable server stream. Hackers cannot get information or say a free literature essay. I hope that sites of global importance can form a threat search algorithm. This is an important topic of conversation.
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.