At last, all the interviews and reference checks have been done and they want you. All you have to do is sign on the dotted line, give notice and start a new chapter in your career. But is this the right job for you?
Grant Burley, Director at Absolute IT Recruitment, says,
“When you are in the middle of all the excitement and stress of changing jobs it can be hard to ascertain if a new job offer is right for you. Or you may be in the enviable position of having two or more offers on the table and you need to figure out which one will be the best decision for you.”
Burley advises that jobseekers use four key criteria as a checklist to help them make the best decision for their careers.
Firstly, it is important to look at the role and review the career development opportunities that it offers. “Will this role give you exposure to grow your skillset and make you more marketable? You want to ensure that in two to three years’ time you can progress your career, internally or externally, and that a new position offers you more scope in terms of role, industry or responsibilities.”
Secondly, you have to consider the people that you will be sharing your working days with. “We spend most of our time at work and it is important that we work with like-minded people who share a similar focus. A team environment where everybody has a clear idea of what they want to achieve and share a similar approach to working together is usually a healthy and productive work environment.”
Thirdly it is really important to make sure that you understand and are comfortable with the company culture as it sets the tone of the workplace. “Every company or organisation has its own style of doing things, their own personality. Find out how the company treat and invests in its staff, how they make decisions and communicate to their stakeholders. A company with a formal, structured and serious culture can be a frustrating work place if you thrive in an informal, fast-acting and maverick environment.”
Combined, these three intangible criteria will give you a sound indication if you and the new organisation will be a good fit. So, if the job opportunity offers you great career development opportunities, the people are your kind of people and you feel comfortable with the company culture then you have to look at the fourth criterion which is remuneration.
“While money should not be the only thing to look at when you are considering a job offer, it is important to make sure you are getting a fair deal in terms of salary and benefits. A good salary package should reflect a reasonable reward for your skills, knowledge and experience that you are bringing to the organisation.”
Absolute IT
Subscribe to receive the latest news and blogs
June 15, 2016
Wanted: A New Breed of Superhero
8 min read
Cybercrime is one of the biggest threats to businesses all over the world, New Zealand included. As we are living in an increasing connected world the need for IT security specialists is on the rise. One prominent New Zealand business owner recently stated, ‘If I can get 30 IT security specialists to walk through our doors today, I will employ them all.”
More and more of our private and professional lives are defined by digital technologies. Organisations of all kinds such as Government, business, and NGOs are seizing the opportunity to deliver services, participate in business transactions, and communicate in cyberspace. While we embrace the openness of cyberspace, this online environment provides numerous opportunities for tech-savvy criminals.
A survey in 2014 found that 83% of New Zealanders had experienced some kind of cybersecurity breach. But this is only the tip of the iceberg. As we still do not have a central organisation for reporting cyber crime, breach disclosure isn’t accurate. Often, victims of cybercrime don’t know how to report it. As a result, we don’t have a consolidated picture of cyber crime in New Zealand, however, we do know that IT security jobs are becoming the hotspot for IT professionals.
But what are the skills that you need to be an IT Security Analyst and what does the job entail? We spoke to Shane Hanson, an IT Security Analyst and asked him a few questions about the world of IT Security.
IT Security Skills 101
When it comes to working in the IT security sector, you have to have the right skills. According to Hanson, the top three skills are:
Attention to detail: IT security professionals work methodically and very detail oriented.
The ability to continuously learn: IT security professionals have an eagerness to dig into technical questions and examine solutions and problems from all sides. They are also big believers of continuing education and take the opportunity to upskill as they understand how quickly technology changes and advances.
The ability to see what motivates others. You have to be able to put yourself in someone else’s shoes and understand the ‘why’ to be able to anticipate and front foot the ‘how’.
As with all technical fields, Hanson believes that the devil is in the detail in cyber security. Even a minuscule thing can determine whether a packet is valid or harbouring a vulnerability. Because of this, a dedication to continuing education is vital in order for IT security professionals to keep up to date with the latest vulnerabilities and defences.
In addition to these skills, Hanson rates the following attributes:
Enthusiastic and highly adaptable
Strong analytical and diagnostic skills
Demonstrated skills in innovation and collaboration
Keep a current understanding of vulnerabilities from the Internet
Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods
And despite the many security breaches that we hear about again and again in mainstream media, this is certainly true for New Zealand businesses. IT security professionals continue to preach the benefits of a robust security plan, but many Kiwi businesses remain unprepared and unprotected from a wide variety of cyber security threats.
In fact, a majority of these businesses have no or only a partial system in place for controlling and tracking sensitive data. One step in protecting this sensitive data is by understanding the most likely sources/causes of security breaches. Let’s take a look at them briefly here:
1. Disgruntled Employees
It is sad but true: internal attacks are a business’ number one cyber security threat. Rogue employees, particularly members of the IT team, have access to networks, data centres and admin accounts, leaving a business wide-open to an attack. For instance, the notorious Sony hack was apparently the result of an inside job and not North Korea as it had been reported.
The best way to avoid this kind of privileged account exploitation is to identify all such accounts and credentials, and immediately terminate those that are no longer in use. The monitoring, controlling and managing of privileged credentials is necessary to prevent exploitation. Savvy companies should have the necessary protocols and infrastructure to track, log and record all account activities to ensure a quick response to malicious activity.
2. Uninformed Employees
A forgotten or lost unlocked smartphone in a taxi or cafe is just as precarious as a disgruntled employee who maliciously leaks information. Both careless employees and untrained employees are guilty of putting businesses at risk through their ignorance of best cybersecurity practices, such as the following:
Having weak passwords
Visiting unauthorized websites
Clicking on links in suspicious emails
Opening email attachments from unknown sources
Training employees on cybersecurity best practices are important, but offering ongoing support is essential as criminals are quick to crack onto new ways to scam. Some employees don’t know how to protect themselves online, which can put company data at risk. Many kiwis also don’t understand the importance of strong passwords – which are often the first line of defence regarding cyber security.
3. Unpatched/Unpatchable Devices
Network devices, such as routers, servers, and printers are vulnerable to attacks. Some software companies offer patches to cover these vulnerabilities, but even Microsoft is no longer offering security updates for Windows 2003, despite 10 million physical Windows 2003 servers still in use.
Businesses run on IT and they need help to secure it. Hanson is quick to state that IT security professionals need to remember why these jobs exist in the first place: to serve businesses. “Without business there’s no requirement for security, not vice versa”, he says.
What the Job is Really Like
Hanson is no stranger to justifying the cost and impact of security decisions, which he believes is the hardest part of the job. “I remember once finishing up a quick design project when an email came across my desk which essentially said, ‘we’ll put these changes in place until the security guy leaves, and then we can roll them back to make our lives easier!’”
But he has solid reasons for loving this line of work too. “For me as a contractor the best part of the job as an IT security specialist is the variety of things I get to do in a day, and seeing the myriad of different ways used to achieve the desired outcomes along the way when tackling a problem.”
Steve Hanson says he loves the variety that his job brings.
And the job really is varied. Information security specialists may have expertise in working with different types of computer networks associated with the government and NGOs, defence industries, and the banking and commerce sector, to name just a few.
There are a variety of roles available within the field of information- and cyber security. Some of these roles do not, and cannot, exist in isolation from each other, so is it very common that an IT specialist working in one area will develop a strong understanding of the work in other areas. This is exactly what keeps the career interesting.
As employers use slightly different job titles for the same role, overlaps between roles can occur. Therefore, when exploring careers in information and cyber security, read job descriptions thoroughly to get an understanding of what’s involved with a particular role.
From analysing and assessing potential security risks, developing plans to deal with such incidents by putting measures in place such as firewalls and encryption, to monitoring and auditing systems for abnormal activity, to executing corrective actions, IT security specialists never have a boring day. And it’s exciting too: IT security specialists can essentially do everything a hacker can, only they use these skills for good not evil! Say hello to the modern superhero.
What to expect
Much of IT security work is office-based, but specialists can also work as consultants, either for an employer or as self-employed, travelling out to visit clients, sometimes even across the world for global clients. The industry is male-dominated, but there are schemes in place to entice women to enter this line of work.
Although it is possible to enter the IT security without a degree via entry level positions in IT (such as help desk support), statistics show that it is becoming more challenging to enter the field from a more general IT role. More recent entrants are graduates, which is a good indication of the growth of information security as a sector.
Currently, half of IT security specialists have an undergraduate degree, with the most common degree subject being IT. There are other useful degree subjects that have desirable transferable skills, such as:
cyber security
network engineering
networks and security
computer science
forensic computing
mathematics
physics
While those subjects don’t sound like the most exciting subjects, Hanson notes that as someone who “gets to poke around in a lot of other people’s environments” he often comes across some very interesting things. “I’ve seen people running secret cloud services inside corporate networks along with everything from unsecured wireless APs to printers on public addressing.”
We use cookies on this website to show you relevant information, understand how you use this site and ensure the site functions properly. Our Privacy Policy | Our Terms of Use.