Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

Mistakes to avoid in your security job search

Finding a new job can be a turbulent time — set yourself up for success by avoiding these common mistakes.

By Jerry J. Brennan, Joanne R. Pollock
Security Job Search
Brennan - Pollock, Career Intelligence
Security Job Search
Brennan - Pollock, Career Intelligence
November 9, 2023

Planning to search for new security career opportunities in 2024? The strong labor market is forecasted to last into 2025. A job search can be frustrating and chaotic if you are unprepared. Devise your strategy now to give yourself a head start on your job search.

One factor that has the potential to affect the process is one you have no control over. It is the quality and experience of the hiring organization’s recruitment team and whether they have prior experience dealing with security-related executive and management roles. Very often talent acquisition (TA) professionals lack a deep understanding of the security positions they are recruiting for.

In this circumstance, it is beneficial for you as the candidate to clearly present your qualifications to someone who may recruit for one or two security roles across their TA career.

There is no training or professional certification to prepare you to become a professional job seeker. However, there are key points to consider if you hope to avoid classic job search mistakes.


1. Not knowing what you really want in your career.

This requires self-reflection to name those skills and activities that you enjoy and derive satisfaction from doing. Do not discount or minimize how much your personality and interpersonal style should factor into this. Knowing who you are will aid in identifying and selecting those roles that you want to invest your time in pursuing.


2. Exclusively focusing on replying to ads and posted positions.

While use of online job boards by both organizations and search firms has become commonplace at all levels today, you will find a disconnect in the reliability and timeliness of the information. Commercial job boards often scrape information from each other which leads to minimal verification of whether a job exists. They simply redate and repost the role.

Board algorithms routinely push out job matches to you with little accuracy as to whether you are a viable candidate for what the job is. This messaging is designed to add quantity for their client’s statistical reports rather than accurately find and match candidates.

Many also sell access to candidate resumes and profiles as a secondary profit center. The posting itself may be a good starting point. However, you should gather more information on the role and find another method of conveying your interest to the hiring authority.


3. Expecting one resume will be effective for all applications.

You need to develop a good, effective primary resume. If you want to maximize the potential of being considered for a particular role, select those areas in your experience and accomplishments that best reflect what the organization is looking for. This also helps you prepare for potential interviews as these are likely areas important to the hiring manager. A short cover letter and/or a well-constructed email is also particularly useful.


4. Applying for every role with a title.

The amount of information that is being pushed out directly to you electronically has become overwhelming. Once you have uploaded your profile or resume, it can be very tempting to just push the apply button to a listing. Read the description! Applying for a role where your background, qualifications, skills or desired location is not a match may well hurt your personal brand if seen by the hiring manager. For future consideration, there is a significant difference between registering on a company or recruiter’s system and applying because it is easy.


5. Not researching the role, company or industry.

Do not chase titles. The terms Chief Security Officer or Director of Security are two of the most misunderstood and overused titles in the security profession. Accountabilities, reporting relationships and the purpose of the role are key components to the level of position, and therefore should be a key factor in your evaluation. From the organization’s perspective, a candidate who does not have a good understanding of them, the industry and clients they support, will not likely be selected.

Finally, choose very carefully. Do not accept a position if you, or your trusted colleagues, have serious concerns about the hiring manager, organization or industry. If your new boss, or others in the leadership chain, are not transparent in answering your questions or seem disingenuous, pay attention to these red flags.

Winning the offer and beating out the competition may not necessarily prove to be a measure of success.

KEYWORDS: career development corporate security security career security career planning security career training security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Job Search Strategy

    Do security job titles affect your job search strategy?

    See More
  • SEC0821-career-Feat-slide1_900px

    Calculating your worth during a security job search

    See More
  • Data mining

    Choose your job search references carefully

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing