dcsimg

Prepare to Go After Hot Security Jobs

Susan Hall

In a piece on our Network Security Edge site, Perimeter Chief Technology Officer Kevin Prince delves into the top 10 security threats of 2010. Security threats are only expected to escalate in 2011, so it's no wonder that skills in thwarting them remain in such high demand.

Slide Show

13 of Today's Hottest Tech Skills

Highlights of the most in-demand skills and their growth over the past year.

Scott Melland, chairman, president and CEO of Dice Holdings, citing Dice.com's latest survey, referred to those skills as "anything having to do with network or database security."

 

Our Knowledge Network has a wealth of example policies and templates to help you boost security in your organization. But it also contains about 100 job descriptions to help you match your skills to those of companies seeking them. Among those I found:

 

You also can find salary information for security positions on sites such as PayScale and Glassdoor.

 


A helpful article on the Dice website lists nine questions that security managers might be asked in interviews, including:

  • What kind of network do you have at home?
  • How do you respond to a situation in which your boss indicates a direction should be taken, but you disagree with from a security perspective?
  • Explain a time when you didn't see a vulnerability or virus. What did you do to make sure it didn't happen again?

 

Some of these questions will call upon your storytelling ability, as I've written before, so you need to have honed that skill.

 

In an interesting side note, the State University of New York Institute of Technology expects to be awarded $3.6 million in federal funds to research mobile network security issues and develop a training program to address them. The Utica, N.Y., school plans to use the money for a Secure Computer Networking research laboratory.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.