What cybersecurity hiring managers are really looking out for (or should be) - Security Boulevard

SBN What cybersecurity hiring managers are really looking out for (or should be)


For many job seekers, applying for a job often feels like taking a shot in the dark. Sure, the job description features a nice bullet-pointed list of your new day-to-day tasks, but it often gives little insight into what the hiring manager actually expects from applicants. When you have a clear understanding of the hiring manager’s expectations, it’s much easier to tailor the way you present yourself as the right person for the job. 

The good news is that if you want a job in cybersecurity, there are a ton of positions out there: 

FinConDX 2021
  • By 2021, there will be 3.5 million open cybersecurity positions globally (Cybersecurity Jobs Report 2018-2021)
  • Cybersecurity jobs sit unfilled for an average of six months (Dark Reading)
  • As of this year (2019), there is a global shortage of 2 million cybersecurity professionals (Cybersecurity Jobs Report 2018-2021)

With the right training and experience, you’ll be well on your way to a rewarding career in information security. To help you put your best foot forward, we’ve put together a list of five things that cybersecurity hiring managers are looking out for. 

1. Sharp communication skills 

An infosec expert’s toolbox is filled with advanced tech skills, but “soft skills” like communication are just as essential. In fact, communication skills were rated the most in-demand skill among employers, according to LinkedIn’s 2018 U.S. Emerging Jobs Report. 

So what are some situations when strong communication skills are important? That depends on your specific role, but it happens more often than you might think in the cybersecurity field. After all, the core mission of your job is to protect sensitive information from falling into the wrong hands, and hiring managers need to be confident in your ability to do exactly that. During your interview, they may (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/oTaqoau_yLI/