Over the past several weeks, I have received an INORDINATE amount of emails, blog contacts, FaceBook and LinkedIn messages from eager IT beavers seeking out new opportunities for employment.

I’ve been receiving these pleas from people I do not know. Perhaps it’s due to my involvement in ISSA or other professional organization. So… did you think I was a recruiter? Does CISO now stand for Career Information and Search Organizer? Who knows.

Get IT Security Career Advice
Now, most of you that know me know I’ll gladly help whenever I can and pass along any contacts, tips and resources – some of my favorites being those from L.J. Kushner and Associates. You can find Kusher and Associates at their site there and read great advice on the Information Security Leaders site, run by Lee Kushner and Mike Murray- both extremely well connected and effective professionals. If you’re a Twit, find blog tweets at @LJKush or follow Mike at @mmurray.

On a much less serious note, I thought I’d post a fun little show and tell here.

Looking to Hire a Security Pro?
Your Friendly Job Placement Person (that’s me evidently) has qualified candidates seeking opportunities in a variety of IT security fields, including:

  • Log Management, Data Analysis and Data Visualization
  • Audit and Compliance Security Assessors
  • Audit and Compliance Policy Review Professionals
  • Firewall, IDS/IPS Systems Administrators
  • PHP and Application Programmer
  • Communications and PR Managers
  • Network Security SE Managers <- no, not me
  • We have two candidates seeking positions as astronauts
  • One candidate seeking a part-time position as a princess

I’m sure I’m missing a few people. Please feel free to add your candidate information below as ‘LOOKING’. Or, for organizations seeking candidates, please post a ‘SEEKING’ comment. You may post anonymously, but make sure there is valid contact information or direct people to a link containing the job listing if you’re using a recruiter. If you post something completely ridiculous and not serious, hopefully it is funny enough that readers know it’s a joke.

Some of the above positions are real; names have been changed to protect the innocent.

Become a Security Rockstar
If the resources on Kush’s and Murray’s sites are not enough, you can learn how to be a Security Rockstar from CyberWar CloudSec Master Luminary (and Virtual Social Media Expert) Chris Hoff by reading this recent post. If you’re an audial learner, you can listen to the Security Rockstar song here.

# # #

jj

Author, speaker, and recognized authority on network and wireless security architectures, Jennifer (JJ) Minella helps organizations solve technical problems and align teams.

View all posts

6 comments