Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

1/24/2020
10:00 AM
Aditya Sharma
Aditya Sharma
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

5 Resume Basics for a Budding Cybersecurity Career

You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

Cybersecurity professionals are trained to secure, fix, and prevent security breaches and cyberattacks. To become a cybersecurity professional, you need to have your head in the game. But more than that, you also need to be an excellent resume tactician because it takes impeccable industry-relevant experience and credentials to get short-listed for the job of your dreams.

These five tips can help you elevate your professional resume to the top of the list:

Tip 1: Result-Oriented, Detailed Job Experience
A great way to do this is by crafting the details of your roles and responsibilities into one-line bullet points of your action-oriented accomplishments, which is a strategy espoused by Princeton University. For example:

● Prepared reports to document security breaches and damage caused by them, leading to a 90% reduction in security breaches
● Supervised penetration testing to locate vulnerable issues in the systems to avoid exploit

This illustrates a cause-effect relationship to showcases the reason behind the actions performed and what the results of these actions were. In the first point, the action and results are:

● Action: Report preparation
● Result: Reduction in security breach

Similarly, in the second point, the action and results are:

● Action: Supervising penetration testing
● Result: Location of system issues and avoiding exploit

Tip 2: An Impactful Summary
Most recruiters tend to browse through resumes in a jiffy because they just don't have the time to critically analyze each and every job application. This means that job seekers need to communicate the details of their work trajectory in a short three- to five-line resume summary. The goal of your summary is to effectively communicates career highlights and key achievements. For example:

Cybersecurity professional with six years of experience and a proven track record of establishing effective security software for any system. DoD security clearance. Background in internal/external penetration testing to protect systems against breaches and fix damages caused.

Tip 3: A Distinct Skills Section
You are no one without your skills in the job market. But having skills is one thing; being able to communicate what those professional skills are is another. Consequently, if your cybersecurity resume does not highlight your functional skills under a distinct section, you're doing it all wrong. Why? Because recruiters, in their limited capacity, would simply move on to the next resume if they have to try too hard to identify your skills.

Here's a valuable piece of advice: Create a distinct Key Skills section in your resume and list all your relevant skills under it. Doing this will drastically help increase your short-list chances because recruiters will be able to identify your functional skills in one go, and if they match the criteria that they're looking for, you'll most likely be called for an interview.

Tip 4: Education and Certification Details
Something as obvious as presenting your education and certifications details is critical for demonstrating that you have attained the relevant theoretical knowledge necessary for a cybersecurity career. This should include:

● Name of school/university
● Name of the courses/certifications pursued by you
● Location of the degree/certificate-issuing body
● Enrollment and graduation dates

Tip 5: Up-to-Date Contact Details
While this may seem obvious, don't make the surprisingly common mistake of sending out your resume without mentioning important contact details that would prevent a potential employer from getting in touch with you. So, while you're busy polishing your resume, make sure that you've listed up-to-date contact information, including:

● One functional mobile number
● An email address
● Your current location

Finally, make sure that you compose this section with the precision of a surgeon because you cannot afford to make innocent blunders such as spelling mistakes. One wrong or missing letter and number, and you'll never hear from a recruiter!

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses."

On a quest to help professionals across the world land their dream jobs, Aditya lives and breathes Hiration — an AI-powered online resume builder and platform to help job-seekers find their way in the treacherous job market.  When Aditya is not busy disrupting the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JacksonSanderson
50%
50%
JacksonSanderson,
User Rank: Apprentice
2/13/2020 | 9:34:37 AM
Re: Great!
This is a hot topic. We must protect information at different levels. This may be literature or educational resources that need protection. Such popular sites have triple protection and a variable server stream. Hackers cannot get information or say a free literature essay. I hope that sites of global importance can form a threat search algorithm. This is an important topic of conversation.
Mark_McClain
50%
50%
Mark_McClain,
User Rank: Apprentice
1/28/2020 | 6:14:17 PM
Great!
Great insight here!
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8142
PUBLISHED: 2020-04-03
A security restriction bypass vulnerability has been discovered in Revive Adserver version < 5.0.5 by HackerOne user hoangn144. Revive Adserver, like many other applications, requires the logged in user to type the current password in order to change the e-mail address or the password. It was how...
CVE-2020-8143
PUBLISHED: 2020-04-03
An Open Redirect vulnerability was discovered in Revive Adserver version < 5.0.5 and reported by HackerOne user hoangn144. A remote attacker could trick logged-in users to open a specifically crafted link and have them redirected to any destination.The CSRF protection of the “/...
CVE-2020-8147
PUBLISHED: 2020-04-03
Flaw in input validation in npm package utils-extend version 1.0.8 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using utils-extend.
CVE-2020-6994
PUBLISHED: 2020-04-03
A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The followi...
CVE-2020-8637
PUBLISHED: 2020-04-03
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.