- CyberChronicler
- Posts
- Your Path to Success in the Cybersecurity Job Market: Expert Advice from Josh Madakor, Jason Blanchard, and Stephen Semmelroth
Your Path to Success in the Cybersecurity Job Market: Expert Advice from Josh Madakor, Jason Blanchard, and Stephen Semmelroth
From Preparation to Application: A Three-Pronged Approach to Cybersecurity Job Hunting
The demand for cybersecurity professionals continues to rise with the evolving cybersecurity threats. To initiate your cybersecurity career, you need to identify your skill set, understand your interests, perform an in-depth study of the career paths, choose a suitable path that matches your interests, acquire the necessary qualifications, and start applying for entry-level jobs.
In your journey, three expert resources can provide invaluable guidance:
Jason Blanchard's "How to Hunt for Jobs like a Hacker w/ Jason Blanchard" Playlist on the Black Hills Information Security YouTube Channel
Stephen Semmelroth's Cybersecurity Career Progression playlist on the Simplycyber YouTube channel.
Section 1: Josh Madakor's Guidance
Josh Madakor, in his comprehensive guide, "How to get a job in IT in 3 Months - ULTIMATE HAND HOLDING GUIDE (2022)", details the first step in job preparation: enhancing your market value.
Core Ideas:
Consistency: It's about maintaining a steady pace in your job search and studies. He encourages job applicants to aim for a consistent rate of five applications per day, reinforcing the idea that persistence is key in job hunting
Job Application Execution: Adopt a systematic approach, such as utilizing a job application template.
Self-Presentation: How you portray yourself during interviews & at networking events is vital.
Resume Quality: Your resume should be easy to comprehend for both ATS and human readers.
Five Pillars for job security:
Quality of Written Communication: Your ability to clearly articulate ideas and messages in written form, especially important in emails, reports, and your resume.
Experience: The hands-on practical knowledge you've gained from your past roles, projects, or internships. It's proof of your real-world ability to deliver results.
Social Network: The relationships you've built with professionals in your field. This network can provide opportunities, advice, and support.
Interview Skills: How well you present yourself and communicate your abilities during a job interview. It's your chance to make a lasting impression.
Technical Ability: The specific skills and knowledge you possess related to the job, such as programming, cybersecurity frameworks, or network security.
He encourages job seekers to improve these areas and highlights the importance of portfolio building and acquiring relevant certifications. Josh also likens job hunting to a numbers game, stressing that the more applications you submit, the higher your chances of landing a job.
Section 2: Jason Blanchard's Strategies
Jason Blanchard, the Content and Community Director at Black Hills Information Security, in his video series, "How to Hunt for Jobs like a Hacker," urges job seekers to adopt a hacker's mindset.
Core Ideas:
Dream Job Requirements: Begin by drafting a comprehensive list of dream job requirements in order to determine what you want out of these jobs and what you want to prioritize.
Catch-all Resume : Look for Job descriptions for jobs with the same title you are applying for and extract the things that are true about you to create a catch-all resume. You will then compare these with the qualifications in job postings that you are actually going to apply for.
Proactive Documentation: Keep a record of job opportunities and tailor your resume according to the company's needs.
Finding Internal Advocates: Blanchard believes in the power of personal connections. Find internal advocates within desired companies to enhance your chances of success. He provides specific template messages to do this with.
Security Clearance: Building credibility to support cleared work is essential. Consider volunteering for an overseas posting, joining the reserves, or working for a company that does both corporate and government contracting work.
Jason's innovative strategies offer a fresh perspective for job seekers to stand out in the competitive job market.
Section 3: Stephen Semmelroth's Insights
After you've built a strong foundation using Madakor's guide and Blanchard's strategies, Stephen Semmelroth's Cybersecurity Career Progression playlist on the SimplyCyber Youtube channel can help you optimize your resume for both ATS's & human readers.
Core Ideas:
Well-Crafted Resume: Semmelroth emphasizes that a resume is a marketing tool. List accomplishments, not just responsibilities. Make your contributions quantifiable to highlight your value.
Aligning with Business Objectives: Align your cybersecurity skills with the business objectives of the company you are applying to.
Storytelling in Resumes: Your resume should have a clear beginning (your professional summary), middle (your skills and experiences), and end (your accomplishments).
Action Verbs and the VAR Formula: Use action verbs and the "VAR" formula: Verb, Action, Result. This helps showcase your accomplishments and the impact you've made on an organization.
Tailoring Your Resume: Tailor your resume to the specific role you're applying for. Highlight attributes like competency, competitiveness, and championing ability.
With the insights from these three experts, you are now better equipped to confidently navigate the job market and secure your dream job in cybersecurity.
Keep applying, and keep looking forward!
Franklin Buckholdt
Founder, CyberChronicler