In part 3 of this series, WebWitch discusses the types of benefits you should be looking for in an offer letter and how to understand what they all mean.
Category: Career Blog
Landing a Job and Getting Paid Well For It [Part 2/5]
WebWitch
(Second in a five-part series.)
Did you know that staying in touch with your NCL teammates can have benefits to your future income? In Part 2 of Landing a Job and Getting Paid Well for It, WebWitch talks about getting compensated for your work — what to look for in contract language, bonus structures, paths for promotion, and the ubiquitous "non-compete clause."
Landing a Job and Getting Paid Well For It [Part 1/5]
WebWitch
(First in a five-part series.)
WebWitch has learned many hard job-hunting lessons and has also been fortunate to find mentors along the way. In a position to mentor now, WebWitch demonstrates how to navigate the minefield of spin in cleverly-worded job postings by firing back with cleverly-worded questions in your interviews!
Transferring Your Non-Tech Skills to a Cyber Security Job
FiFi aka "ZeroTrail"
A survey of IT decisionmakers revealed that soft skills are in high demand(*). Every job you've had in the past is therefore precious, because you gained soft skills from it that you can transfer to a position in cybersecurity. ZeroTrail made the switch and shows you how to boost your résumé and get hired by recognizing the value of your non-tech skills.
Volunteer Work and How Not to Take on Too Much
Hush1e
Sometimes, you have to step back and breathe so that you can re-evaluate how much you can personally handle. Taking on too many projects is not healthy, and you should know your limits. Hush1e used to be a corporate trainer, and she shares her mindfulness and decompression tips in time for the NCL Season to ramp up.
What Should I Consider When Selecting a Program for Cybersecurity?
David Zeichick
Ever wonder what path you should take to get a job in Cyber Security? Two-year or four-year degree? Certificate? What to major in? David endeavors to give you enough information to choose the path which is best for you. We're also interested in your experiences—please tell us what your journey has been like in the comments!
What is HTTP Request Smuggling and Why Do I Care?
WebWitch
WebWitch examines the reemergence of HTTP Request Smuggling as an allegory for the dangers of making assumptions about older programs and protocols when the cybersecurity landscape is constantly shifting. Their perspective on research topics in cybersecurity (and the Oxford comma) will help you start thinking like a seasoned professional.
You must be logged in to post a comment.