5 Ways to Improve the Cybersecurity Recruiting Process

What’s the no. 1 complaint IT, Cybersecurity and InfoSec candidates have with the recruitment process?

From an outsider’s perspective, a cybersecurity recruiter’s job might seem pretty simple; be given a job that needs to be filled, contact candidates, find the right fit, and then you have a placement. While the process might seem simple, in actuality, it is not. Candidates in the IT, Cybersecurity and Information Security industries are bombarded by phone calls from recruiters every single day. Their biggest complaint? Not the constant phone calls, but constant phone calls about jobs that don’t even fit their background.

Many cybersecurity candidates say they receive calls for jobs that they either are not qualified for or are overqualified for. To have more success in recruiting qualified candidates, cybersecurity recruiters need to truly understand what the job requirement they have entails. Many recruiters are searching for candidates in highly technical jobs that they aren’t always the most familiar with.Cybersecurity Recruiting Process Silverbull

Tips To Help Improve the Cybersecurity Recruiting Process and Experience:

  1. Read the job requirement carefully. One little word can make a big difference sometimes (ex. Java vs. Javascript).
  2. Watch a webinar or read a few articles about that type of job.
  3. Search for people who have been in this job in the past on LinkedIn and see what they listed as their job duties.
  4. Be thorough and ask the hiring manager questions about what the job entails.
  5. Understand the most important skills to have for the job. Sometimes job descriptions list every little skill that may be needed. Know what skills are more important to have and what skills can be learned on the job or are not must have requirements.

Recruiters should also take the time to actually read and analyze each candidate’s resume before they start contacting them. By taking the time to educate yourself about your candidate’s background prior to calling, you will make it known that you took the time to understand them, and it makes them more open to speaking with you. By doing this, this will also make your call lists more successful, because you are calling and speaking to cybersecurity candidates who should be very qualified for the job and it should save you time in the long run. In the end it’s better to call 40 qualified candidates rather than 80 unqualified ones.

Learn how IT staffing firms are trying to mitigate the cybersecurity skills gap.

Find the Best Cybersecurity, IT Professionals for Your Business

Discover the main issues facing organizations who seek to hire skilled IT professionals.

Hiring the right information security and IT professionals can pose significant challenges for enterprises. The first problem is the scarce talent pool. For example, a Rand Corporation study estimates there are approximately 1,000 skilled cybersecurity experts globally, while the market needs 10,000 to 30,000.Cybersecurity Professional

The second issue hampering cybersecurity-hiring systems is a clueless interview process, where talent is herded through arbitrary and disorganized screenings, according to CNBC. Sometimes, InfoSec specialists are forced to endure up to 10 separate interviews, while being evaluated by people who have no security expertise.

Some businesses are turning to cybersecurity-expert-screening-and-recruitment startups. These services test and verify IT professionals’ technical skills and match them with companies seeking relevant IT and security talent. Think of these models as human resources Ubers with an exclusive focus on Cybersecurity solutions. Also, these crowdsourcing-and-sharing services are disrupting the market for cybersecurity consulting firms. The cybersecurity industry standard of annual and semi-annual audits seem inadequate in the face of a threat that is constantly adapting and sleeplessly conspiring to destabilize enterprise networks.

Another more foundational problem afflicting the cybersecurity hiring process is the ambiguity surrounding the certifications and skills needed to get the job done. According to The Institute, an IT-trade publication, there is a void of standardized qualifications that hiring managers can use to inform and guide their candidate onboarding systems. As a result, human resources departments are overwhelmed with a plethora of certifications from nearly two-dozen organizations, convoluting the hiring process.

“Professionalizing Cybersecurity,” a recent report published by Salve Regina University’s Pell Center, found that cybersecurity is composed of 31 different specialties dealing with areas like, information assurance compliance, systems security architecture, and digital forensics, to name a few. Hiring managers would be wise to educate themselves about these newly designated categories of network defense so they can identify the candidates whom best suit their needs.

Another factor to consider is the changing nature of cybersecurity philosophy. In the past, security applications have been focused on perimeter network defense. But, in 2015, cybersecurity specialists like Mach 37 Managing Partner Rick Gordon point to a new consensus among experts that it’s impossible to keep intruders out of enterprise networks.   As a result, the industry is placing more emphasis on remediation and response applications.

As the cybersecurity landscape continues to evolve, business can improve their hiring practices in four crucial ways. First off, enterprises need to streamline their interview processes to eliminate HR inefficiencies. Second, businesses need to develop standardized guidelines for the certifications and skills that are most relevant to their information security needs. Thirdly, hiring managers should consider outsourcing the technical screening aspect of the onboarding process to emerging disruptive platforms that know how to leverage the power of the “sharing economy.”   But, the wisest course of action for enterprises might be to consider the cybersecurity industry’s new interest in remediation and response solutions.

If efficient containment and data recovery applications are being recognized as the optimal curatives to manage cyber-disruptions and information theft, perhaps hiring practices needed to be repurposed to match this paradigm shift.

Learn more about the surge in cybersecurity opportunities for college students and recent grads.