How to hack your hiring

How to hack your hiring

This article was originally written for the?CTT Magazine: Episode 001 // Launch.

Recruitment is easy, right?

Well, it's easy to get wrong if you don't plan it out, and it's easy to end up right back at the start of the process if you don't plan your onboarding (the bit after an offer) too.

Believe it or not, recruitment is also a helluva lot more than sticking an attractive job advert out and waiting for your dream hire to apply. So let's strip it back so I can share some insights into how to make your recruitment easy.

No alt text provided for this image

Your hiring strategy for a Junior Security role should be very different from your hiring strategy for a Principle Security Consultant or a Security Leader to join the business.

If you advertise a junior role in the right places you will get hundreds of applicants. Dependent on the base skills you need, chances are you need to find a way to assess that talent that is a little more scientific than a cv review, particularly for entry-level talent. You can assess technical knowledge with a platform like Capture the Talent, or you could set the applicant a task such as a report to write on the technical aspects of the latest breach report or their understanding of a risk framework.

This is a better and fairer way to assess knowledge and potential and how the applicant thinks, as typically you will be looking for potential ability in entry-level talent. You can see a great example of this in Steven Trippier's post here

If you look at the top 20 places from the CTT Advent challenges, 7 of those places were candidates not yet working in security. How confident are you that you would have spotted that talent from a CV review?

No alt text provided for this image

If you are hiring for experienced security talent, typically these candidates aren't sat waiting to apply for roles. You need a different strategy for hiring, which includes already being a part of the security communities where great talent hangs out to ensure potential hires know who you are, and you can therefore attract passive candidates. Spend time at conferences, invest time in discord and slack channels, and spend time building those networks, even when you're not hiring.

If you or your talent teams don't have time to do that, then do your recruitment partners do that for you? These are good questions to ask.

Experienced security professionals typically aren't on the market for long, so you need to have a slick hiring process that can fast track through interviews within 7-10 days.

When handling offers, are you confident you know what other offers the applicant has on the table?

Have their expectations changed during the recruitment process, especially with other competitors trying to attract them?

We regularly see that bad offer management is where the recruitment process can go south, so a pre-close approach and an open negotiation is always a good way to manage this well.

No alt text provided for this image

Once your new hire has accepted, communication shouldn't stop then. Weekly check-ins, updates with the company and team news, and invites to social events and team socials are a great way to ensure your new hire feels part of the team before the start date, meaning fewer dropouts prior to the start date.

These are just a handful of tips to hack your recruitment, but if you have questions, always feel free to reach out to me. You can see the types of candidates we work with, and the roles we fill for our clients here

Christopher Skinner

Identity and Access Management Analyst | Innovation Office at BlackRock | Infosec & Aladdin Permissions

2 年

Awesome!

Asaduzzaman .

Professional Data Entry, Typing, Mining, Collection, Insert, and Conversion service provider.

2 年
回复
?? Amy Stokes-Waters

The Cyber Escape Room Co. ? | Security Education, Awareness & Engagement | Experiential Learning | Corporate Events | Non Exec Director | Full Time Feminist | Oh FFS...

2 年

Thank you so much for sharing your wisdom with us, Rosie. Great article as ever.

要查看或添加评论,请登录

???♀? Rosie Anderson的更多文章

  • Long March!

    Long March!

    Welcome to March, and almost the end of Q1. We've found lots of our customers are budget planning currently, and also…

    2 条评论
  • February Stars

    February Stars

    Welcome to February, also known as the 16th week of January. I don't know about you but I am glad to see the back of…

    3 条评论
  • Blue Monday

    Blue Monday

    Happy New Year! Can we still say that? I hope your festive period was quiet and incident-free, and I hope 2025 is going…

    1 条评论
  • Smells like festive spirit!

    Smells like festive spirit!

    Welcome to December! How fast has this year gone?! It feels like summer ended only yesterday, but here we are in the…

    1 条评论
  • November Rain

    November Rain

    Welcome to November - I hope you are all cyber-aware after last month and have come down from the sugar high that…

  • October Song

    October Song

    Welcome to October - also known as Cybersecurity Awareness Month! It will hopefully be a quieter month after the…

    3 条评论
  • Wake me up when September ends!

    Wake me up when September ends!

    Welcome to September - My favourite month of the year! The weather has turned more autumnal, pumpkin spice is back in…

    2 条评论
  • My First Def Con experience

    My First Def Con experience

    I have been asked a few times about my first Defcon experience, so thought I would create a blog post to help others…

    38 条评论
  • Viva Las Vegas!

    Viva Las Vegas!

    Welcome to August! Hacker Summer Camp is now in full swing in Vegas, with BSides Las Vegas, BlackHat and Defcon all…

  • There goes the sun!

    There goes the sun!

    Welcome to July! As we get ever closer to the summer holidays, there goes the chance of any summer sun it seems…

社区洞察

其他会员也浏览了