Job Seekers Must Leverage IT Security Concepts to Score a Position

by Modis on February 23, 2016

Job seekers often face near insurmountable tasks when securing an interview for positions that are data intensive and bound by compliance laws and regulations. Nowhere is this more evident than in the financial, healthcare, insurance, and banking markets. All of which hold data governance in high regard and seek to protect both intellectual property and customer data from compromise.

Many of those businesses see new hires as potential threats to IT security and act accordingly when selecting candidates with background checks, bonding and other “trust” related methodologies, the key word there being “trust”.

Simply put, job seekers need to establish that they are trust worthy and a sure way to accomplish that is by knowing the ins and outs of data security and information governance as it relates to the position at hand. In other words, job seekers today should have a working knowledge of the following data control policies and be able to interpret how those impact their potential duties:

Data Leakage

Many businesses today are worried about data leakage, which is a generic term that explains a specific problem. That problem amounts to any type of data that is shared with another party that should not have access to that data. Data Leakage can take on many different forms, ranging from the loss of a thumb drive to an accidental attachment of a document in email to the theft of a corporate resource, such as a smart phone or laptop. Job seekers need to demonstrate that they understand the consequences of data leakage and are willing to take the responsibility to reduce the chances of data leakage occurring.

Email Security

Corporate email can be one of this biggest threats to information security. Job seekers should educate themselves on all the potential security risks of using email. Those risks include phishing attacks, infected attachments, click bait, viruses, forged web links, scams and many other types of attacks. Job seekers that demonstrate that they have a good understanding of the security implications of email use will fare better during the hiring process.

Security Policies

Businesses use policies to dictate how IT equipment should be used. Acknowledging those policies and the willingness to take personal responsibility for following those policies can only help a job seeker secure a position. Typical policies include appropriate usage of business owned assets, as well as limiting personal usage of those assets.

File Security

Today’s knowledge works deal with all sorts of files, ranging from documents to spreadsheets to databases and so on. Those same knowledge workers may also deal with customer recorders, billing systems, account information and so forth. It is crucial that a job seeker understands the rules of protecting that information and adhere to the rules and policies of the organization. Something as simple as copying a file from one location on the network to another could be a security violation, so job seekers need to take file security seriously and demonstrate trustworthiness.

System Security

Job seekers need to make sure they understand the basics of IT security by using a common sense approach. It should be second nature to know not to use simple passwords, or to put passwords on sticky notes on monitors, or share passwords with others. Job seekers should demonstrate that they can be trusted to use the well-known best practices around basic system security.

Appropriate Use

Although corporate IT policies should dictate what appropriate usage is, there are situations that may fall out of the realm of automated controls. Surfing the web is a key example. Job seekers should be aware that using the business’s computers to surf the web, conduct ecommerce, do personal research, participate in social media and access games or entertainment sites may not be allowed. Job seekers should make sure that potential employers feel comfortable that as a new hire, the job seeker will not abuse any privileges.

Job seekers will find that understanding the nuances of protecting data and establishing trust can go a long way towards securing a position in any company, and may even surprise an interviewer with knowledge that is expected, but rarely asked about.

This is Part 1 of a two part series. Read Part 2 about information security.

Ready to dive into the world of data security?

With data demand comes data jobs. At Modis, we are constantly adding data-based jobs to our listings, so your new career is just a few clicks away. Contact one of our 60 offices across the United States to get started in finding your dream job!

Related Posts

Leave a Comment

Previous post:

Next post: