Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

1/24/2020
10:00 AM
Aditya Sharma
Aditya Sharma
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

5 Resume Basics for a Budding Cybersecurity Career

You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

Cybersecurity professionals are trained to secure, fix, and prevent security breaches and cyberattacks. To become a cybersecurity professional, you need to have your head in the game. But more than that, you also need to be an excellent resume tactician because it takes impeccable industry-relevant experience and credentials to get short-listed for the job of your dreams.

These five tips can help you elevate your professional resume to the top of the list:

Tip 1: Result-Oriented, Detailed Job Experience
A great way to do this is by crafting the details of your roles and responsibilities into one-line bullet points of your action-oriented accomplishments, which is a strategy espoused by Princeton University. For example:

● Prepared reports to document security breaches and damage caused by them, leading to a 90% reduction in security breaches
● Supervised penetration testing to locate vulnerable issues in the systems to avoid exploit

This illustrates a cause-effect relationship to showcases the reason behind the actions performed and what the results of these actions were. In the first point, the action and results are:

● Action: Report preparation
● Result: Reduction in security breach

Similarly, in the second point, the action and results are:

● Action: Supervising penetration testing
● Result: Location of system issues and avoiding exploit

Tip 2: An Impactful Summary
Most recruiters tend to browse through resumes in a jiffy because they just don't have the time to critically analyze each and every job application. This means that job seekers need to communicate the details of their work trajectory in a short three- to five-line resume summary. The goal of your summary is to effectively communicates career highlights and key achievements. For example:

Cybersecurity professional with six years of experience and a proven track record of establishing effective security software for any system. DoD security clearance. Background in internal/external penetration testing to protect systems against breaches and fix damages caused.

Tip 3: A Distinct Skills Section
You are no one without your skills in the job market. But having skills is one thing; being able to communicate what those professional skills are is another. Consequently, if your cybersecurity resume does not highlight your functional skills under a distinct section, you're doing it all wrong. Why? Because recruiters, in their limited capacity, would simply move on to the next resume if they have to try too hard to identify your skills.

Here's a valuable piece of advice: Create a distinct Key Skills section in your resume and list all your relevant skills under it. Doing this will drastically help increase your short-list chances because recruiters will be able to identify your functional skills in one go, and if they match the criteria that they're looking for, you'll most likely be called for an interview.

Tip 4: Education and Certification Details
Something as obvious as presenting your education and certifications details is critical for demonstrating that you have attained the relevant theoretical knowledge necessary for a cybersecurity career. This should include:

● Name of school/university
● Name of the courses/certifications pursued by you
● Location of the degree/certificate-issuing body
● Enrollment and graduation dates

Tip 5: Up-to-Date Contact Details
While this may seem obvious, don't make the surprisingly common mistake of sending out your resume without mentioning important contact details that would prevent a potential employer from getting in touch with you. So, while you're busy polishing your resume, make sure that you've listed up-to-date contact information, including:

● One functional mobile number
● An email address
● Your current location

Finally, make sure that you compose this section with the precision of a surgeon because you cannot afford to make innocent blunders such as spelling mistakes. One wrong or missing letter and number, and you'll never hear from a recruiter!

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses."

On a quest to help professionals across the world land their dream jobs, Aditya lives and breathes Hiration — an AI-powered online resume builder and platform to help job-seekers find their way in the treacherous job market.  When Aditya is not busy disrupting the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Mark_McClain
50%
50%
Mark_McClain,
User Rank: Apprentice
1/28/2020 | 6:14:17 PM
Great!
Great insight here!
JacksonSanderson
50%
50%
JacksonSanderson,
User Rank: Apprentice
2/13/2020 | 9:34:37 AM
Re: Great!
This is a hot topic. We must protect information at different levels. This may be literature or educational resources that need protection. Such popular sites have triple protection and a variable server stream. Hackers cannot get information or say a free literature essay. I hope that sites of global importance can form a threat search algorithm. This is an important topic of conversation.
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.