Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Career IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

Online security job leads

Tips for security professionals searching through job boards.

By Jerry J. Brennan, Joanne R. Pollock
Job search

Aree Sarak / iStock / Getty Images Plus via Getty Images

Brennan - Pollock, Career Intelligence
Job search
Brennan - Pollock, Career Intelligence
May 9, 2024

Security job seekers have many ways to find job leads. Peer networks and social media are potential resources, especially for those who still think the best jobs are not in the public domain. For the sheer volume of apparently potential opportunities, though, it is hard to ignore job boards.

Job boards are predominantly generalist. This means you must weed through millions of listings unrelated to your security skill sets. Niche market boards exist, though. For instance, our friends at Security Jobs Network have been aggregating professional-level security jobs for more than 20 years.

SJN reports that, in addition to mid-level security roles, there is a marked increase in public listings of senior- and executive-level security and risk management positions. Salaries and comp packages for these jobs are routinely in the hundreds of thousands of dollars. What is diving this proliferation of security job listings?

One factor is organizations no longer need to pay high advertising fees to gain exposure to their target candidates. There are thousands of online listing sites open to global audiences, including the career sections of most company websites. Hiring and recruitment firms can generate responses for their openings this way, often at little to no cost.

Candidates can easily attach their profile or resume to a job on a board or company site instantly. This generates the large volume of applicants companies initially think they want. The number of responses might also be the statistic some talent acquisition (TA) practitioners are measured against.

It sounds great for both the hiring company and the job seeker. However, the resulting experience for both is often anything but great.

The top complaint we hear from security jobs seekers is not getting a response after applying to a job they believe they are the perfect match for. The top complaint we hear from companies looking to hire security professionals is they cannot find — or respond to — top talent given the deluge of applications they have received.

The chaotic nature of internet job posting has set up hiring challenges not readily clear to job seekers:

  • HR and/or TA staff have been reduced, but the volume of openings across organizations has increased. Recruiters often have multiple roles they manage and simply do not have the bandwidth to review every candidate. Additionally, they may not understand each of the organization’s functional areas and those roles they are recruiting for.
  • A company’s internal recruiting management system may be integrated into one of the major job boards as outsourced public posting. These are often complex set-ups and not necessarily configured with the candidate’s experience in mind. Knowledge about how these systems work is an ongoing challenge for companies, made more difficult if the organization has a high TA turnover rate.
  • A corporation’s internal policies may dictate positions are always listed publicly, even if the intent is to only consider internal candidates first.
  • Sometimes jobs are posted only for a day or two to enable a small number of previously sourced candidates to input their details into the company’s internal system. A variation of this is some intake systems either close a job or stop accepting new applicants after a certain number of applications. In either of these scenarios, not everyone who applies will be reviewed.
  • Corporate policy may be for recruiters to simply collect resumes and notify the hiring manager they are available for review on the company’s internal collection system. Many of these systems are not intuitive. As a practitioner, can you imagine how you would carve time from your day to review hundreds of applicant names? Some systems allow you to open only one record at a time to display limited information. From that snapshot, you will then have to decide if you want to open the related resume.
  • Social media sites and job boards often derive income from advertising. Many also troll and scape job listings from company career websites, recruiter sites and each other. Jobs get redated, reposted and reused. The goal is to drive user traffic, but the practice creates misinformation on a massive scale.

Well-prepared security job seekers invest time in self-assessment, resume development, branding and interview preparation. All while performing their day jobs. Their hope is to be fairly evaluated for the jobs they apply for. Unfortunately, that is often not the case, to the detriment of both the hiring company and the job seeker.

KEYWORDS: career development corporate security security career security career planning security career training security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Job Search Strategy

    Do security job titles affect your job search strategy?

    See More
  • Security Job Search

    Mistakes to avoid in your security job search

    See More
  • Women being interviewed by panel

    Be ready to quickly find a security job

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing