Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Care and Feeding of Headhunters

By Bill Mason
May 1, 2008
“It just makes sense for you to know how to reach top headhunters,” said Bill Mason.


Educate yourself before looking for that next top security executive job.

Thanks to the Internet, especially the new breed of “Web 2.0” interactive business sites, there are ample opportunities to showcase one’s professional credentials. Nonetheless, most senior-level hires result not from an impersonal scan of online job postings, but from one-on-one interactions. To access key career opportunities, the most effective path remains the long-standing, tried and true approach of being on the radar of a top, industry-specific, retained executive search firm.

These search firms are both your doorway to these employers, and gatekeepers guarding the entry. So it just makes sense for you to know how to reach them, attract their interest and demonstrate your suitability for a next-step-up position.

Attention Indicates Respect

You may, in fact, have been called by a headhunter, asking if you are interested in a new opportunity or seeking an introduction to your successful co-workers and peers. Getting such calls is an indication that you have achieved respect and credibility in the security field. Cultivating a relationship with a retained executive recruiter specializing in your industry and discipline is essential if you are interested in maintaining an up-to-date “pulse” of the opportunities in your career sector.

Here are ways you can maximize this kind of a career-enhancing connection.

If you are early in your climb up the management ladder, it is certainly acceptable to send an unsolicited résumé to a large number of contingency headhunters. These recruiters market active job seekers, in something of a commodity fashion, and generally have no exclusive, retained relationships with employers.

However, once you have established a career track record, and have attained a commensurate level of compensation, you should never – repeat, NEVER – send out an unsolicited résumé. Your résumé should go out only after you’ve received a specific request or a quality referral, and with the recipient’s pledge of confidentiality if appropriate.

A contingency headhunter who receives your unsolicited résumé will, if it looks good, announce your active search to the world – possibly including your current employer, your employer’s competitors and others whose knowledge may be embarrassing or counterproductive to you. A retained executive search consultant will rarely read or acknowledge receipt of an unsolicited résumé.

Cold Calls May Have Dangers

Equally ineffective and potentially hazardous is a cold call to a retained headhunter. He or she will be reluctant to consider a candidate who has blindly approached them.

However, there are many ways to make certain you appear on the right retained headhunter’s Rolodex – or, more accurately, their database.

Well-connected friends within your professional or social network can be the best source of an introduction to the right headhunter.

Don’t overlook the online tools for virtual networking – FaceBook, LinkedIn, MySpace, Plaxo, Xing, Ryze, Spoke, Ecademy and many others. Use them, carefully, as a way to maintain and enhance your business relationships. Your goal is not to have a long list of “contacts” you barely know, but a true network of professionals, some of whom will almost certainly be able to introduce you to a recruiter. Recruiters tend to believe, with justification, that birds of a feather do flock together – and that is especially true of eagles and other high-soarers.

There’s another, quite practical, reason for the recruiter to want to meet with you after being introduced by a respected executive or professional. The recruiter wants to enhance his or her relationship with your “messenger,” for future referrals to additional quality professionals such as yourself. Don’t make the mistake of working hard to orchestrate an introduction but ignoring what your “messenger” will say about you. Your contact should speak succinctly to your experience, skills, know-how, track record, persona, management style and drive. Give your colleague some key talking points.

Before you send that e-mail to your contact person, or pick up the phone, think about what you want to communicate. You want your friend to know about your experience, and how it, along with your talent and ability, would translate into a new management role.

Your message should be concise and consistent – just as you would want it to be conveyed to the appropriate headhunter. Chances are that you will find it equally useful when you are communicating with others in your network.

When you have that first meeting with a retained search professional, remember that they are gatekeepers to the next step in your career path. They are very knowledgeable of new career opportunities, and adept at determining if you bring the right combination of credentials to a challenging and rewarding security executive’s role within their client’s organization. You may not be the perfect candidate for their current engagement. But there’s always the next one, and the one after that.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill Mason is managing partner at Mason Israel & Partners, Costa Mesa, Calif.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Mission 500

    Mission 500 Announces Collaboration with Feeding America

    See More
  • Airport at Sunset

    Duty of Care is Made Difficult by Lack of Visibility into Travel Plans

    See More
  • work from home employee

    Mitigating duty of care risks of digital nomad employees

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing