Description |
1 online resource (xvii, 176 pages) : illustrations |
Contents |
1. Foundations : what you ought to have done before buying this book -- 2. Time to leave : how to know when you should move on -- 3. Resumes and cover letters : why the common approach only works against you -- 4. Talking about yourself : the fine lines around boasting, bragging, belittling, and begrudging -- 5. Targeting : cyclical filtering to choose targets with high likelihoods of success -- 6. Initial reconnaissance : uncovering seeds -- 7. Deeper reconnaissance : uncovering hidden data -- 8. Metaphor mapping : adjusting to your target -- 9. Repositioning : how to make you stand out -- 10. The phone interview : dial M for meeting -- 11. The portfolio : items to leave behind -- 12. Thinking about money : making the most of change -- 13. Before the interview : plan to succeed -- 14. Interview : take control -- 15. Post-interview : the end of the interview is not the end of the interview -- 16. Salary negotiation : everything can be flexible -- 17. Giving notice : parting is such sweet sorrow -- 18. Conclusion |
Summary |
This book explains the job hunting process, why the most commonly followed models fail, how to better approach the search, and encourages infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Job hunting.
|
|
Job hunting -- Computer network resources
|
|
Information technology -- Vocational guidance
|
|
Information technology -- Vocational guidance
|
|
Job hunting
|
|
Job hunting -- Computer network resources
|
Form |
Electronic book
|
Author |
Friedman, Beth, editor.
|
LC no. |
2012276139 |
ISBN |
9780124166608 |
|
0124166601 |
|
0124166016 |
|
9780124166011 |
|