{"id":24738,"date":"2019-03-14T08:01:17","date_gmt":"2019-03-14T06:01:17","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=24738"},"modified":"2023-08-10T10:20:37","modified_gmt":"2023-08-10T08:20:37","slug":"how-to-build-your-resume-for-a-career-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/","title":{"rendered":"How to Build your Resume for a Career in Cybersecurity"},"content":{"rendered":"\n<p>The use of digital machines has become an essential part of life today. Everything from personal information to private company intel is stored on digitally-based platforms such as the cloud. In a society run by the internet, it can be a high risk to operate a business without strong cybersecurity personnel protecting their mainframe.<\/p>\n\n\n\n<p>Staffan Truv\u00e9, the Co-founder and Chief Technology Officer of Recorded Future said, &#8220;We spend a lot of money trying to fix things after they happen, but we should stop the attacks before they happen\u201d.<sup>1<\/sup> As more businesses begin to acknowledge the pertinence of effective cyber defence, the demand for experts in this field increases. However, the availability of qualified and experienced professionals to fill these positions is lacking.<sup>2<\/sup> By 2021, it\u2019s estimated there will be 3.5 million unfilled cybersecurity positions.<sup>3<\/sup> With a plethora of jobs available, starting a career in this field becomes a matter of upskilling to understand this technical environment, and then building your resume around the position you want within the field.<\/p>\n\n\n\n<h2>What does the cybersecurity landscape look like?<\/h2>\n\n\n\n<p>According to a report completed in 2018 by McAfee, one of the world&#8217;s largest dedicated security technology companies, the estimated global cost of cybercrime at the time was $600 billion.<sup>4<\/sup><\/p>\n\n\n\n<p>Cybercrime includes tampering with sensitive information, extorting money from users, customer data leaks, denial of service, and state-on-state espionage.<sup>5<\/sup> It\u2019s the cyber defence professional\u2019s responsibility to prevent, account for, and preemptively predict when these attacks will happen.<sup>6<\/sup> Pavi Ramamurthy, Senior Manager of Information Security at LinkedIn, says, understanding \u201chow you can protect your projects and information using cybersecurity is essential to mitigating risks, as well as making informed decisions for stakeholders\u201d regarding appropriate means of protection.<sup>7<\/sup><\/p>\n\n\n\n<h2>Jumpstart your cybersecurity career: Know your field<\/h2>\n\n\n\n<p>This career path offers diverse roles to counter the various forms attacks can take. Which of the following eight positions appeal to you?<\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Ethical Hacker<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_EthicalHacker.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_EthicalHacker.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The word \u201cethical\u201d is not something that often fits in the same sentence as \u201chacker\u201d. Although a contradiction at first glance, an ethical hacker\u2019s job is to better secure the operations of an organisation by receiving permission to hack into a company\u2019s digital infrastructure in a lawful manner, to identify the various vulnerabilities of a given network, and as a response, fix any flaws within the system.<sup>8<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Penetration Tester<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_PenetrationTester.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_PenetrationTester.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>A penetration tester may utilise ethical hacking, however, they are often in-house while ethical hackers are usually outsourced.<sup>9<\/sup> A penetration tester evaluates the purity of computer hardware and software to detect threats. Their job is to stop cyber attacks by preventing unauthorised access. This career choice requires professionals to be abstract thinkers as they assess the point of entry of previous hacking attempts, and hack the software themselves to rectify the problems, ensuring the same type of attack doesn\u2019t happen again.<sup>10<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Threat Investigator<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_ThreatInvestigator.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_ThreatInvestigator.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Once the ethical hacker and penetration tester have done their jobs, threat investigators search for possible undiscovered threats. By preemptively analysing patterns in company software, they are able to monitor and identify data breaches and threats, as they occur.<sup>11<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Security Architect<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_SecurityArchitect.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_SecurityArchitect.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Senior positions in the field of cyber defence, operate as designers, creators and managers of security plans. A security architect is particularly responsible for security maintenance of the computer system within the business.<sup>12<\/sup> They are expected to stay on top of current cyber security and cyber attack trends. Security architects work alongside threat detectors, penetration testers, and ethical hackers to tweak the network for better intrusion detection and prevention.<\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Computer Crime Investigator<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_ComputerCrimeInvestigator.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_ComputerCrimeInvestigator.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>This job is generally less commercial as it works closely with government operations in the criminal justice sector to recover and analyse data from computers used in crimes. Computer crime investigators aid in prosecuting cyber criminals, and will often serve as a witness in court.<sup>13<\/sup> Computer crime investigators cover a large range of crimes including everything from recovering damaged file systems on computers, to investigating crimes committed against children.<sup>14<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Forensic Expert<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_ForensicExpert.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_ForensicExpert.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The computer crime investigator often works with a forensic expert to track data and investigate the primary computer source utilised in crimes. The forensic expert uncovers deleted or corrupt files and data criminals use in an attempt to cover their tracks, or to be used to prove charges against cybercriminals.<sup>15<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Cryptanalyst<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_Cryptanalyst.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_Cryptanalyst.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Cryptanalysts design code and algorithms to secure networks and protect vital data, and decode coding systems and secret messages. They often work in both the public and private sector for government, the police, and armed forces. Cryptanalysts also work in the banking industry to secure credit card payments, online banking, ATM transactions, and inter-bank exchange.<sup>16<\/sup><\/p>\n\n\n\n<h3 style=\"text-align: center;\">The Security Software Developer<\/h3>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Desktop_SecuritySoftwareDeveloper.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Q4Slot84_Infographic_Mobile_SecuritySoftwareDeveloper.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The security software developer develops security pieces of software for the purpose of securing company data and integrating it into applications. Examples of this software include: spyware or malware detection software, antivirus software, and traffic analysis software. Some security software developers will work within a development team who are collectively creating a new piece of software. In this instance, the security software developer is responsible for the security aspect of this new software.<sup>17<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>We spend a lot of money trying to fix things after they happen,<br>but we should stop the attacks before they happen<\/p><cite><strong>Staffan Truv\u00e9<\/strong><br>Co-founder and Chief Technology Officer, Recorded Future<br><\/cite><\/blockquote><\/figure>\n\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/za\/fundamentals-of-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/university-of-cape-town\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/09\/UCT_logo.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/university-of-cape-town\" target=\"_blank\" class=\"related-programme__school-name\">\n                University of Cape Town (UCT)            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/za\/fundamentals-of-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Fundamentals of Cybersecurity online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<h2>Build your CV for a career in cybersecurity<\/h2>\n\n\n\n<p>Structuring your qualifications in a specific order may have an impact on how employers view you.<sup>18<\/sup> Some of the important characteristics to emphasise include:<\/p>\n\n\n\n<h3>1. Hard skills<\/h3>\n\n\n\n<p>A solid understanding of the <a href=\"https:\/\/www.getsmarter.com\/courses\/za\/fundamentals-of-cybersecurity-online-short-course\">fundamentals of data and technical networks<\/a> is essential to working in this environment. Make these stand out by listing the specific certifications, software experience, and vendor product experience you have. Highlight where you can administer multiple operating systems or maybe you are proficient in one or two scripting languages. Tailor your resume to highlight these core competencies, and apply to jobs that suit and build on your skills to make your application impactful.<sup>19<\/sup><\/p>\n\n\n\n<h3>2. Soft Skills<\/h3>\n\n\n\n<p>Don\u2019t underestimate the importance of soft skills such as logic, creativity, innovation, and communication when it comes to applying for a cybersecurity position.<sup>20<\/sup> A passion for growth and learning will also be beneficial in this ever-changing environment. Make sure to stay updated on global trends and skills, and if you don\u2019t have a computer science or related degree, non-technical jobs in this industry are options in this field as well, such as the cyber policy analyst and technical writer.<\/p>\n\n\n\n<h3>3. Structure<\/h3>\n\n\n\n<p>Format your CV so that the employer can easily scan the highlights of your career. For example, underline headlines for each section. Your prospective employer wants to identify the right application by seeing the most important information (pertinent to the position) as soon as he\/she opens the document. Tailor your resume to the company by doing appropriate research, and ensure you emphasise how your particular skill-set will be an asset to their company.<sup>21<\/sup><\/p>\n\n\n\n<p>Start by using a title for yourself in your resume that closely relates to the position you\u2019re applying for.<sup>22<\/sup> Keep the language simple and concise, write in an active voice, and be truthful. Overselling yourself is something that can potentially make employers feel cheated.<sup>23<\/sup> This step goes hand-in-hand with ensuring the right kind of information takes precedence over secondary details. Finally, remember to list references that can validate your skills and qualifications.<\/p>\n\n\n\n<p>Building an excellent cybersecurity resume involves including a combination of skills, and presentation. Regardless of your professional background, don\u2019t sell yourself short. Cybersecurity is a rapidly evolving landscape and there is room for a broad spectrum of skills. No matter where you are in your cybersecurity career, there\u2019s always room for improvement and growth, and with the right skills and knowledge behind you, you can enjoy a fulfilling career in a cutting-edge industry.<\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n\n<li class=\"mb-4\"><sup>1<\/sup> Armstrong, S. (Sep, 2017). \u2018Stay safe online: Experts reveal 10 ways to protect yourself and your business from hackers&#8217;. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/wired-security-event\" target=\"_blank\" rel=\"noopener noreferrer\"> Wired<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>2<\/sup> Phalan, M. (Sep, 2017). \u2018One looming cybersecurity risk \u2013 no cybersecurity staff\u2019. Retrieved from <a href=\"https:\/\/www.ais-now.com\/blog\/one-looming-cybersecurity-risk-no-cybersecurity-staff\" target=\"_blank\" rel=\"noopener noreferrer\"> AIS<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>3<\/sup> Morgan, S. (2018). \u2018Cyber security jobs report 2018-2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>4<\/sup> Lewis, J. (Feb, 2018). \u2018Economic impact of Cybercrime\u2014no slowing down\u2019. Retrieved from <a href=\"https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf?kab1HywrewRzH17N9wuE24soo1IdhuHdutm_source=Pressutm_campaign=bb9303ae70-EMAIL_CAMPAIGN_2018_02_21utm_medium=emailutm_term=0_7623d157be-bb9303ae70-194093869\" target=\"_blank\" rel=\"noopener noreferrer\"> McAfee<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>5<\/sup> (2018). \u2018What is Cybersercurity\u2019. Retrieved from <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-cybersecurity.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cisko<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>6<\/sup> \u2018Cyber security specialist: job description\u2019. Retrieved from <a href=\"https:\/\/targetjobs.co.uk\/careers-advice\/job-descriptions\/454165-cyber-security-specialist-job-description\" target=\"_blank\" rel=\"noopener noreferrer\"> Target jobs<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>7<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Forbes<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>8<\/sup> Manikandan, J. (Oct, 2018). \u2018Who\u2019s an Ethical Hacker?\u2019 Retrieved from <a href=\"https:\/\/www.simplilearn.com\/roles-of-ethical-hacker-article\" target=\"_blank\" rel=\"noopener noreferrer\"> Simplilearn<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>9<\/sup> Nelson, N. (Mar, 2018). \u20187 Jobs you didn\u2019t know about in cyber security\u2019. Retrieved from <a href=\"https:\/\/woz-u.com\/7-jobs-you-didnt-know-about-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Woz-u<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>10<\/sup> Nelson, N. (Mar, 2018). \u20187 Jobs you didn\u2019t know about in cyber security\u2019. Retrieved from <a href=\"https:\/\/woz-u.com\/7-jobs-you-didnt-know-about-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Woz-u<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>11<\/sup> Nelson, N. (Mar, 2018). \u20187 Jobs you didn\u2019t know about in cyber security\u2019. Retrieved from <a href=\"https:\/\/woz-u.com\/7-jobs-you-didnt-know-about-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Woz-u<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>12<\/sup> (Nd). \u2018Security architect\u2019. Retrieved from <a href=\"https:\/\/www.infosecinstitute.com\/career-profiles\/security-architect\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Infosec Institute<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>13<\/sup> Nelson, N. (Mar, 2018). \u20187 Jobs you didn\u2019t know about in cyber security\u2019. Retrieved from <a href=\"https:\/\/woz-u.com\/7-jobs-you-didnt-know-about-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Woz-u<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>14<\/sup> (Nd). \u2018Computer Crime Investigator\u2019. Retrieved from <a href=\"https:\/\/www.infosecinstitute.com\/career-profiles\/computer-crime-investigator\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Infosec Institute<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>15<\/sup> (Nd). \u2018Cyber security forensic jobs.\u2019 Retrieved from <a href=\"https:\/\/www.cybersecurityjobs.net\/forensic-expert-jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cyber Security Jobs<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>16<\/sup> (Nd). \u2018Cryptanalyst.\u2019 Retrieved from <a href=\"https:\/\/www.compucert.com\/cryptanalyst-career.html\" target=\"_blank\" rel=\"noopener noreferrer\"> CompuCert<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>17<\/sup> (Nd). \u2018Why and how become a Security Software Developer?\u2019 Retrieved from <a href=\"https:\/\/infosecaddicts.com\/career-path\/why-and-how-to-become-a-security-software-developer\/\" target=\"_blank\" rel=\"noopener noreferrer\"> InfoSecAddicts<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>18<\/sup> (2017). \u2018How to write a resume for a cyber security position\u2019. Retrieved from <a href=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/career-advice\/how-to-write-a-resume-for-a-cybersecurity-position\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Careers in Government<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>19<\/sup> (Dec, 2013). \u2018Get a Cyber Security Job: Hiring Manager&#8217;s Tip Sheet (Part II)\u2019. Retrieved from <a href=\"http:\/\/www.njvc.com\/blog\/cyber-security\/get-cyber-security-job-resume-dos-and-donts-hiring-managers-tip-sheet-part-ii\" target=\"_blank\" rel=\"noopener noreferrer\"> njvc<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>20<\/sup> Diamond, D. (Sep, 2017). \u2018Your career in cybersecurity and how soft skills can boost your salary\u2019. Retrieved from <a href=\"https:\/\/careersincybersecurity.com\/your-career-in-cybersecurity-and-how-soft-skills-can-boost-your-salary\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Careers in Cybersecurity<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>21<\/sup> Mack, E. (Sep, 2018). \u2018How to Create an Awesome Cyber security Resume\u2019. Retrieved from <a href=\"https:\/\/www.springboard.com\/blog\/how-to-create-an-awesome-cybersecurity-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Springboard<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>22<\/sup> Mack, E. (Sep, 2018). \u2018How to Create an Awesome Cyber security Resume\u2019. Retrieved from <a href=\"https:\/\/www.springboard.com\/blog\/how-to-create-an-awesome-cybersecurity-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Springboard<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>23<\/sup> Sea, N. (May, 2017). \u2018How to avoid overselling yourself in your resume\u2019. Retrieved from <a href=\"https:\/\/www.risesmart.com\/blog\/how-avoid-overselling-yourself-your-resume\" target=\"_blank\" rel=\"noopener noreferrer\"> RiseSmart<\/a>.<\/li>\n\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The use of digital machines has become an essential part of life today. Everything from personal information to private company intel is stored on digitally-based platforms such as the cloud. In a society run by the internet, it can be a high risk to operate a business without strong cybersecurity personnel protecting their mainframe. Staffan [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":40217,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[127,120],"article-format":[],"class_list":["post-24738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-career-advice","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building Your Resume for a Career in Cybersecurity | Getsmarter<\/title>\n<meta name=\"description\" content=\"With digital machines becoming an integrated part of everyday life, cybersecurity has become essential. See what it takes to start your career in Cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Build your Resume for a Career in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"With digital machines becoming an integrated part of everyday life, cybersecurity has become essential. See what it takes to start your career in Cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-14T06:01:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-10T08:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"How to Build your Resume for a Career in Cybersecurity\",\"datePublished\":\"2019-03-14T06:01:17+00:00\",\"dateModified\":\"2023-08-10T08:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/\"},\"wordCount\":1602,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg\",\"keywords\":[\"Career advice\",\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-build-your-resume-for-a-career-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building Your Resume for a Career in Cybersecurity | Getsmarter","description":"With digital machines becoming an integrated part of everyday life, cybersecurity has become essential. See what it takes to start your career in Cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to Build your Resume for a Career in Cybersecurity","og_description":"With digital machines becoming an integrated part of everyday life, cybersecurity has become essential. See what it takes to start your career in Cybersecurity.","og_url":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-03-14T06:01:17+00:00","article_modified_time":"2023-08-10T08:20:37+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"How to Build your Resume for a Career in Cybersecurity","datePublished":"2019-03-14T06:01:17+00:00","dateModified":"2023-08-10T08:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/"},"wordCount":1602,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg","keywords":["Career advice","Systems &amp; technology"],"articleSection":["Career Advice"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Getsmarter_How-to-Build-your-Resume-for-a-Career-in-Cybersecurity_Blog.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-build-your-resume-for-a-career-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/24738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=24738"}],"version-history":[{"count":40,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/24738\/revisions"}],"predecessor-version":[{"id":50437,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/24738\/revisions\/50437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/40217"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=24738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=24738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=24738"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=24738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}