Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

Security executive interview preparation: End of year planning

Demonstrate these 14 soft skills in your interview to prove you're the best candidate for the job.

By Jerry J. Brennan, Joanne R. Pollock
security executive interviews

ljubaphoto / E+ via Getty Images

Brennan - Pollock, Career Intelligence
security executive interviews
Brennan - Pollock, Career Intelligence
December 12, 2023

December often finds security professionals planning for a career change in the following year. Lack of preparation is the primary reason well-qualified candidates fail in an interview. This means security leaders should plan their job search strategies now, not next year.

One way to kick that preparation off is to understand how companies approach security executive interviews.

Organizations continually develop and improve upon carefully constructed candidate assessment processes designed to aid them in selection of well-matched candidates. These models quickly weed out candidates who are not adequately prepared for the experience.

One common interview method is known as the iceberg model. It is designed to identify components that are visible such as observable behaviors, knowledge and skills — the tip of the iceberg. It also explores components below the iceberg’s water line, such as traits, characteristics, attitudes and beliefs. This method is used both for internal and external candidate assessments of various competencies in hiring, promotions and performance management.



The goal is to gain both an accurate picture of the candidate and the candidate’s cultural alignment with the organization.


Organizations invest heavily in training their human resources and talent acquisition teams on this interview strategy. They may also use well-documented assessment instruments designed for use in conjunction with the interview process. The goal is to gain both an accurate picture of the candidate and the candidate’s cultural alignment with the organization.

Candidates often focus solely on their skills and knowledge of the tactical and operational aspects of a role when prepping for an interview. If the organization you are going to interview with uses the iceberg model, this narrow focus is only the first 10% seen above the waterline. It does not consider the more critical elements of the interview — the remaining 90% that is underwater.

Companies using this interview method develop a specific set of selection competencies. Candidates will be asked questions designed to assess if you show those abilities the organization has determined are critical for success.

Following are common examples of soft skills you should prepare to address in a security job interview.

  • Concern for Effectiveness: An underlying concern for doing things better.
  • Initiative: Willingness to go beyond what is required. Act before being asked.
  • Enthusiasm for Work: Passion for the job. Working hard and energetically.
  • Self-Confidence: Ability to succeed, reach challenging goals and overcome obstacles.
  • Concern for Impact: Self-awareness of the impression you make on others.
  • Conceptual Thinking: Ability to draw thought-out conclusions based on assessment of experiences and observations of seemingly unrelated information. Draw analytical conclusions not clearly apparent.
  • Analytical Thinking: Logical thinking in seeing relationships between cause and effect. Plan to anticipate and evaluate systematically.
  • Interpersonal Astuteness: Understanding of others’ desires, strengths and weaknesses. Interpret the concerns of others.
  • Effective Communication: Ability to effectively present and engage both formally and informally. Ability to read your audience, recognize time constraints and be able to present the right amount of information needed.
  • Listening Skills: Actively being interested in what others communicate. Being interested in their message. Directly answering the questions that are asked without interjecting your message or agenda.
  • Flexibility: Willingness to shift strategies and accept other viewpoints.
  • Innate Curiosity: Desire to learn and explore. Creativity, imagination, problem-solving and adaptation.
  • Influence: Building credibility through cross functional relationships to achieve goals and effect positive change without authority or control.
  • Customer and Stakeholder Focus: Initiative-taking engagement and understanding of others’ needs and priorities. Find opportunities to be a trusted partner/advisor.

Take time between now and the new year to think about how you would describe yourself in an interview that seeks insight into these soft skill areas. Then, meet us back here in January for insight into a multi-step interview process and what questions you should expect to be asked.

KEYWORDS: career development corporate security security career security career planning security career training security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Executive Interview Preparation

    Security executive interview preparation: New Year strategy

    See More
  • SEC0721-career-Feat-slide1_900px

    Interview strategies for security professionals: The virtual edition

    See More
  • work meeting

    The definition of senior security executive

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing