Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

Security executive interview preparation: End of year planning

Demonstrate these 14 soft skills in your interview to prove you're the best candidate for the job.

By Jerry J. Brennan, Joanne R. Pollock
security executive interviews

ljubaphoto / E+ via Getty Images

Brennan - Pollock, Career Intelligence
security executive interviews
Brennan - Pollock, Career Intelligence
December 12, 2023

December often finds security professionals planning for a career change in the following year. Lack of preparation is the primary reason well-qualified candidates fail in an interview. This means security leaders should plan their job search strategies now, not next year.

One way to kick that preparation off is to understand how companies approach security executive interviews.

Organizations continually develop and improve upon carefully constructed candidate assessment processes designed to aid them in selection of well-matched candidates. These models quickly weed out candidates who are not adequately prepared for the experience.

One common interview method is known as the iceberg model. It is designed to identify components that are visible such as observable behaviors, knowledge and skills — the tip of the iceberg. It also explores components below the iceberg’s water line, such as traits, characteristics, attitudes and beliefs. This method is used both for internal and external candidate assessments of various competencies in hiring, promotions and performance management.



The goal is to gain both an accurate picture of the candidate and the candidate’s cultural alignment with the organization.


Organizations invest heavily in training their human resources and talent acquisition teams on this interview strategy. They may also use well-documented assessment instruments designed for use in conjunction with the interview process. The goal is to gain both an accurate picture of the candidate and the candidate’s cultural alignment with the organization.

Candidates often focus solely on their skills and knowledge of the tactical and operational aspects of a role when prepping for an interview. If the organization you are going to interview with uses the iceberg model, this narrow focus is only the first 10% seen above the waterline. It does not consider the more critical elements of the interview — the remaining 90% that is underwater.

Companies using this interview method develop a specific set of selection competencies. Candidates will be asked questions designed to assess if you show those abilities the organization has determined are critical for success.

Following are common examples of soft skills you should prepare to address in a security job interview.

  • Concern for Effectiveness: An underlying concern for doing things better.
  • Initiative: Willingness to go beyond what is required. Act before being asked.
  • Enthusiasm for Work: Passion for the job. Working hard and energetically.
  • Self-Confidence: Ability to succeed, reach challenging goals and overcome obstacles.
  • Concern for Impact: Self-awareness of the impression you make on others.
  • Conceptual Thinking: Ability to draw thought-out conclusions based on assessment of experiences and observations of seemingly unrelated information. Draw analytical conclusions not clearly apparent.
  • Analytical Thinking: Logical thinking in seeing relationships between cause and effect. Plan to anticipate and evaluate systematically.
  • Interpersonal Astuteness: Understanding of others’ desires, strengths and weaknesses. Interpret the concerns of others.
  • Effective Communication: Ability to effectively present and engage both formally and informally. Ability to read your audience, recognize time constraints and be able to present the right amount of information needed.
  • Listening Skills: Actively being interested in what others communicate. Being interested in their message. Directly answering the questions that are asked without interjecting your message or agenda.
  • Flexibility: Willingness to shift strategies and accept other viewpoints.
  • Innate Curiosity: Desire to learn and explore. Creativity, imagination, problem-solving and adaptation.
  • Influence: Building credibility through cross functional relationships to achieve goals and effect positive change without authority or control.
  • Customer and Stakeholder Focus: Initiative-taking engagement and understanding of others’ needs and priorities. Find opportunities to be a trusted partner/advisor.

Take time between now and the new year to think about how you would describe yourself in an interview that seeks insight into these soft skill areas. Then, meet us back here in January for insight into a multi-step interview process and what questions you should expect to be asked.

KEYWORDS: career development corporate security security career security career planning security career training security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Executive Interview Preparation

    Security executive interview preparation: New Year strategy

    See More
  • SEC0721-career-Feat-slide1_900px

    Interview strategies for security professionals: The virtual edition

    See More
  • work meeting

    The definition of senior security executive

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing