Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Recruiter: What It Takes

By Jeff Snyder
November 21, 2006
Jeff Snyder has been placing security professionals in executive level positions for over ten years.


Security professionals frequently ask if their resume could be improved upon or what they must do to reach the manager, director, vice president, or CISO/CSO level. Although there is no magic formula, this advice comes from reflecting on the successful search assignments securityrecruiter.com has completed as well as from reviewing the combination of skills and attributes that pulled the assignment together. There is no perfect combination of educational credentials, work experience, certifications and personal attributes, but here is what we have determined our clients respond to when senior level security openings surface.

CERTIFICATION IS A MUST

A Bachelor degree is usually sufficient, but a Masters degree can put you one step closer to landing the position. Industry certifications are a must. For leadership roles, companies like to see Certified Protection Professional (CPP), Certified Information Systems Security Professionals (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) and Global Information Assurance Certification (GIAC). The more technical the role, the more GIAC and vendor specific certifications are desired.

Our company has seen different career paths lead to security management roles. Early on, companies asked for individuals who came up through physical security or technical ranks to include mainframe/midrange security, network security and Internet security. Common career progression frequently includes moving from security administrator to security engineer/analyst to security architecture titles to management. While this type of career progress is still important, there is more to it than just getting promotions.

Understanding mainframe, network and Internet security technology alone is no longer enough. Specific industry experience is often a prerequisite to obtaining a senior security leadership role in a particular industry. Additionally, as a result of regulatory compliance pressures, companies frequently want to see candidates who clearly demonstrate an understanding of compliance regulations that relate directly to their industry.

EXPERIENCE MATTERS

On top of education, professional experience is the element that separates those who progress to security leadership roles from those who do not. Experience is extremely important, as it demonstrates that you have been introduced into the security world and have had to deal with security issues. Prospective employers want to know what issues you’ve had to face and how you solved them. Keeping track of your tasks and praise letters will show a perspective employer that you excelled at your previous position(s).

To lead others, to communicate effectively with non-technical users and to communicate in the boardroom with “C” level executives, security professionals must possess exceptionally strong verbal and written communication skills. The element of communication is so important that any lack of polished skills in this area will keep advancement doors closed.

There is no single magic set of skills that will qualify one for a position in information security leadership. As regulatory pressures continue to mount on corporate America, information security professionals must keep their technical skills sharp while keeping up with constantly changing regulations and they must be exceptionally strong communicators.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Snyder is the founder and president of SecurityRecruiter.com, an executive retained search firm specializing in information security recruiting. Jeff and his team have helped fill numerous executive level information security positions and have also assisted in building security teams from the ground up in a variety of industries including banking, financial services, healthcare, manufacturing & distribution, software and security professional services. Please visit www.securityrecruiter.com for more information.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • escape room

    Escape Room Challenge: Does Your Team Have What it Takes?

    See More
  • Insights on Emergency Management

    What it takes to create an impactful incident response program

    See More
  • corporate-freepik1170x658v503646.jpg

    The new face of corporate espionage and what can be done about it

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing