Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

Mistakes to avoid in your security job search

Finding a new job can be a turbulent time — set yourself up for success by avoiding these common mistakes.

By Jerry J. Brennan, Joanne R. Pollock
Security Job Search
Brennan - Pollock, Career Intelligence
Security Job Search
Brennan - Pollock, Career Intelligence
November 9, 2023

Planning to search for new security career opportunities in 2024? The strong labor market is forecasted to last into 2025. A job search can be frustrating and chaotic if you are unprepared. Devise your strategy now to give yourself a head start on your job search.

One factor that has the potential to affect the process is one you have no control over. It is the quality and experience of the hiring organization’s recruitment team and whether they have prior experience dealing with security-related executive and management roles. Very often talent acquisition (TA) professionals lack a deep understanding of the security positions they are recruiting for.

In this circumstance, it is beneficial for you as the candidate to clearly present your qualifications to someone who may recruit for one or two security roles across their TA career.

There is no training or professional certification to prepare you to become a professional job seeker. However, there are key points to consider if you hope to avoid classic job search mistakes.


1. Not knowing what you really want in your career.

This requires self-reflection to name those skills and activities that you enjoy and derive satisfaction from doing. Do not discount or minimize how much your personality and interpersonal style should factor into this. Knowing who you are will aid in identifying and selecting those roles that you want to invest your time in pursuing.


2. Exclusively focusing on replying to ads and posted positions.

While use of online job boards by both organizations and search firms has become commonplace at all levels today, you will find a disconnect in the reliability and timeliness of the information. Commercial job boards often scrape information from each other which leads to minimal verification of whether a job exists. They simply redate and repost the role.

Board algorithms routinely push out job matches to you with little accuracy as to whether you are a viable candidate for what the job is. This messaging is designed to add quantity for their client’s statistical reports rather than accurately find and match candidates.

Many also sell access to candidate resumes and profiles as a secondary profit center. The posting itself may be a good starting point. However, you should gather more information on the role and find another method of conveying your interest to the hiring authority.


3. Expecting one resume will be effective for all applications.

You need to develop a good, effective primary resume. If you want to maximize the potential of being considered for a particular role, select those areas in your experience and accomplishments that best reflect what the organization is looking for. This also helps you prepare for potential interviews as these are likely areas important to the hiring manager. A short cover letter and/or a well-constructed email is also particularly useful.


4. Applying for every role with a title.

The amount of information that is being pushed out directly to you electronically has become overwhelming. Once you have uploaded your profile or resume, it can be very tempting to just push the apply button to a listing. Read the description! Applying for a role where your background, qualifications, skills or desired location is not a match may well hurt your personal brand if seen by the hiring manager. For future consideration, there is a significant difference between registering on a company or recruiter’s system and applying because it is easy.


5. Not researching the role, company or industry.

Do not chase titles. The terms Chief Security Officer or Director of Security are two of the most misunderstood and overused titles in the security profession. Accountabilities, reporting relationships and the purpose of the role are key components to the level of position, and therefore should be a key factor in your evaluation. From the organization’s perspective, a candidate who does not have a good understanding of them, the industry and clients they support, will not likely be selected.

Finally, choose very carefully. Do not accept a position if you, or your trusted colleagues, have serious concerns about the hiring manager, organization or industry. If your new boss, or others in the leadership chain, are not transparent in answering your questions or seem disingenuous, pay attention to these red flags.

Winning the offer and beating out the competition may not necessarily prove to be a measure of success.

KEYWORDS: career development corporate security security career security career planning security career training security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Job Search Strategy

    Do security job titles affect your job search strategy?

    See More
  • SEC0821-career-Feat-slide1_900px

    Calculating your worth during a security job search

    See More
  • Data mining

    Choose your job search references carefully

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing