A View into the Hiring Process

A View into the Hiring Process

This article supports a series of posts about the hiring process of one specific company for one specific role in #cybersecurity. The point of this article is simply to allow those interested in this series to be able to easily and quickly find them in order. I've also added placeholders for the posts about this process that I intend to share as the information becomes available.

Note, it isn't the content of the posts but rather the comments that are likely of the most value to someone applying for their first role in cyber security. That's the main reason I didn't convert the content to an article. The comments on each post are the good stuff -- so don't skip them!

Disclaimer: This is one company and one hiring panel for one specific role. I share this information for general knowledge of an application process. Use this information as you see fit. It may or may not apply to your job hunt or hiring panel process.

Post 1: Statement of Work

Post 2: Round 1 Stats

Post 3: Round 1 Certification Equivalencies

Post 4: Round 2 The Targeted Resume

Post 5: Round 2 Stats

Post 6: Round 3 Assessment Basics

Post 7: Round 3 Assessment Specifics

Post 8: Assessment Tips

Post 9: Round 3 Assessment Results

Post 10: Round 4 Interview Questions

Post 11: Round 4 Interview Preparation (Tell Me About Yourself)

Post 12: Round 4 Interview Preparation (STAR Method)

? Michael P.

MBA | Audit | Risk | GRC | CISA (exam passed, certifcation pending)

2 年

Truly an amazing post. Extremely informative. Clearly beyond a daunting task to get a Jr or Entry level role

Maxime Beauchamp

Analyste en Cybersécurité

3 年

Hi Mic, thanks for the share, this is interesting!

Fernando Alencar ???

Detection Engineer @ Clavis | Cybersecurity & Cloud Security (CloudSec) | Blueteam | Podcast Host - CloudTalks BR | Shadowsecurity.com.br | Escola da Nuvem | Teacher

3 年

Amazing, just really sensational! Thanks Mic!

Suraj Subedi

Looking for Entry Level Helpdesk Position

3 年

Indeed great articles?? thanks mic,

要查看或添加评论,请登录

Mic Merritt的更多文章

  • Fueling Engagement and Motivation

    Fueling Engagement and Motivation

    In a world that's becoming more digital by the minute, cybersecurity has become a crucial concern for everyone, from…

    5 条评论
  • Level 3 -- The Amateur

    Level 3 -- The Amateur

    Finally! Here we are at the next step in our learning journey with Level 3 -- The Amateur. At this point, you must have…

    5 条评论
  • Digital Forensics & the Court of Law

    Digital Forensics & the Court of Law

    Let's chat about digital forensics - you know, that super cool field that's been making huge strides in recent years…

    19 条评论
  • Understanding APTs

    Understanding APTs

    Cyber attacks are getting more difficult to detect and more sophisticated in our world today. Advanced Persistent…

    14 条评论
  • The Potential of Penetration Testing

    The Potential of Penetration Testing

    In the dynamic world of cybersecurity, it is imperative for your organization to remain vigilant against potential…

    2 条评论
  • How to Start a Threat Assessment

    How to Start a Threat Assessment

    Starting a threat assessment can be a complex process, as it involves numerous steps and precautions. If a threat…

    22 条评论
  • Threats - Detecting and Hunting

    Threats - Detecting and Hunting

    We live in a truly digital world! All of these technological advancements have given both enterprises and individuals…

    5 条评论
  • How to be a Better Penetration Tester

    How to be a Better Penetration Tester

    Penetration testing is a crucial security practice for organizations of all sizes. It primarily involves finding…

    29 条评论
  • We Are Hackers...not Criminals

    We Are Hackers...not Criminals

    In the age of emerging technology, the term "hacker" has become increasingly prominent in our lives. From accessing…

    19 条评论
  • Understanding the Insider Threat

    Understanding the Insider Threat

    The age of cybercrime has seen a surge in malicious actors invading corporate networks. Companies must remain vigilant…

    9 条评论

社区洞察

其他会员也浏览了