How to Hire and Get Hired in Information Security: Expert Advice from (ISC)2 Congress
Imagine walking into a conference session, only to realize within minutes that you’ve chosen the wrong track. That happened to me at the (ISC)2 Congress in Orlando, Florida, when I attended a session titled ‘Hackers Hacking Hackers.’ Initially disappointed, I quickly discovered that the presentation—led by Tim O’Brien from Xerox Equipment and Megan Wu from Rapid7—offered invaluable insights on how to hire in information security and how to get hired in cybersecurity. Despite a lack of chemistry between the speakers, the content was rich with practical advice for both hiring managers and job seekers.
Reevaluating Expectations in Cybersecurity Hiring
The first opportunity for improvement, according to O’Brien and Wu, revolves around expectations. The industry often creates a category of talent it will never hire, overlooking many qualified candidates simply because their resumes lack specific keywords. As O’Brien noted, “We need to readjust our expectations as hiring managers. Start considering what we need versus what we want. Don’t demand skills or qualifications just because—look at the particular role and what it actually needs. Is having a degree or a certification truly important, or is it just what HR is demanding?”
On the flip side, Wu emphasized that candidates must also set realistic expectations. “Even though there’s a skills gap, even though hackers are in short supply, they need to have realistic expectations. Have a list of things you want, and think about what you’d be willing to trade for if it’s not possible. Just because there is an apparent skills gap, we’re not owed anything, so don’t feel entitled.” This balanced approach is crucial for successful information security hiring.
Mastering the Application Process
During the application process, preparation is key for both sides. O’Brien stressed that hiring managers are responsible for nurturing talent for the industry, not just their organization. He advised looking internally and at past applicants, working with marketing to find people interested in your technology, and attending industry events to network. Ensuring your HR department sets the right tone and expectations is also critical.
For candidates, Wu recommended hacking your resume to make it relevant without stretching the truth. “Be careful of buzzword bingo,” she warned. “Use a unique filename for your resume to distinguish yourself. If you use a template, sanitize the metadata.” She also urged applicants to always supply a cover letter explaining why they want the role and why they’d be a good fit. “People that write cover letters will always be the first to get an interview,” she added.
Additionally, candidates can make themselves desirable by getting involved with the community and attending events. “Get your name out there and make yourself more interesting to a hiring manager,” Wu said. She also advised doing due diligence when job hunting: “Research the different types of recruiters and avoid the agencies that just want to fill body quotas. Research the good ones and build relationships.” For more tips on networking, check out our guide on cybersecurity networking strategies.
Acing the Interview: Strategies for Both Sides
Pre-interview, it’s essential for managers to work out relevant questions. O’Brien cautioned against “stump the monkey” questions, which put good candidates off. Instead, he advised focusing on how a candidate tries to mitigate threats, risks, and vulnerabilities. “Avoid closed-ended questions, and use exploratory conversations instead. Quit passing judgment, and stop with the concerns about job-hopping or contract roles—it shouldn’t necessarily be a bad reflection on the individual. Being unemployed doesn’t make a candidate unemployable: don’t discriminate, put aside bias, and listen to the reason.”
O’Brien highlighted key qualities to look for: passion, willingness to learn, and ability to fail well. “Everything else can be learned,” he said. “Use a scoring system to eliminate bias, and remember that diversity in a team is a good thing.” For candidates, Wu recommended observing the company’s dress code and taking it up a notch. “Make sure the stories you tell in the interview are relevant, and have questions ready for the hiring manager. Think of something interesting to ask that will leave a lasting impression.” She also advised going away and researching answers to any questions you didn’t know, then emailing them to the hiring manager post-interview.
Post-Interview Etiquette and Decision-Making
The fourth opportunity is post-interview. For hiring managers, O’Brien recommended being fair with decision-making and using a scoring system. “Don’t leave people hanging either. Have good etiquette, provide feedback and insights for candidates—they may come back for future roles.” This approach fosters a positive reputation and encourages repeat applicants.
For candidates, Wu suggested sending a thank-you card or email to leave a lasting impression. However, she cautioned against sending social media requests. “Respect boundaries, be realistic, and don’t panic—it may take a while to hear back.” This patience and professionalism can set you apart in the competitive field of cybersecurity. For more on building a standout application, see our article on cybersecurity resume best practices.
In conclusion, whether you’re a hiring manager or a job seeker, these insights from the (ISC)2 Congress offer a roadmap to navigate the complex world of information security hiring. By adjusting expectations, preparing thoroughly, and maintaining professionalism throughout the process, both sides can find success. Ultimately, the key to hiring in infosec lies in focusing on potential, passion, and practical skills rather than rigid checklists. For additional resources, explore our comprehensive career guide for infosec professionals.