2. Combining boutique firm attention with a national reach and niche expertise, while consistently
delivering first class service, nexus IT group’s strategic intent is to cater to the IT market from an
application development, IT infrastructure and support, and IT communications standpoint.
Did You Know (Source: 2001 paper by the Association for Job Search Trainers)
That prospective employers generally spend a mere 15 to 20 seconds reviewing a resume for the first time
A professional looking resume will increase the success rate of getting an interview in today's competitive job market
Today’s job seeker should have 2 to 3 resumes written that targets specific skills instead of a "blanket" approach?
84% of employers say that a resume should only be 1 page if you have less than 5 years experience
80% of screening happens with the resume
Most employers feel that an employee should keep a job two years before changing
Employers expect a thank you note
nexus IT group Can Help
nexus IT group is pleased to provide the steps to writing a professional resume . Whether you are an active or passive job
seeker, it is always recommended to update your resume annually. We can help! Follow our simple steps and structure and
you will be writing a professional resume that other people pay $1,000’s for. Don’t be another statistic, let nexus IT group
help you put your best foot forward.
3. First & Most Important
Before beginning your resume it is highly recommend that you make a bullet point list of your accomplishments in each
position that you held. This will be very important for highlighting your key contributions, and are great talking points during
an interview.
Second
Many job seekers overlook the importance of a strong “Summary” in their resume. Your summary should highlight your
career in 3-5 sentences. Use powerful adjectives in this section. It’s important that you point out your strengths, but don’t get
to specific. The goal of the summary is to entice the reader to want to read more. Your summary should grab the reader and
want them asking for more.
Third
The next item to get you on your way to writing a great IT resume is to have a “Skills” section in your resume. Okay, this is
where you can throw in all of those key buzz words that will allow your resume to be identified by recruiters.
For Example
• IT-Goverance Risk
• Policy Procedure Development
• OS Security
• IDS / IPS
• VPN / Firewall
• Business Continuity
• Network Layer 2/3 Security
• Sarbanes Oxley Act
4. Fourth
This brings us to the “Experience” section of the resume. This is the section where a resume can take a turn for the worse. It
is nexus IT group’s professional opinion that all IT resumes should be written in chronological format vs. functional format.
Chronological resumes are user friendly and allow the reader to easily identify your skills and key accomplishments. The ideal
format would be to begin with 3 to 5 sentences that gives a brief overview of your company, and a short description of your
duties and responsibilities. ***Under your brief overview, you should have a bulleted list of your “Key Accomplishments”.
For Example:
Director of Information Security University of Kansas 09/1981 – present
Kansas Bank with 109 branches brought me on board to revamp its struggling information secu-rity program.
Officer of the corporation. Report to the Chief Technology Officer. Manage an operational budget and a team of
25. Key responsibilities include: Management of all aspects of the company’s information security and privacy
programs, quarterly reporting of program status to the company’s board of directors, and development and
implementation of policies, standards, processes, and procedures.
Key accomplishments:
Eliminated 67 outstanding medium and high impact I.T. control deficiencies in my first year.
Improved audit ratings in 40% of FDA categories. Maintained ratings in all other categories.
Restructured the team and overhauled the entire information security and privacy service catalog.
5. Fifth
The last step in writing a great resume that will exponentially increase your opportunity of landing your next great career is
adding an “Education” section. If you have professional training and/or certifications that you feel is applicable then make
sure to add this section below “Education”.
For example:
EDUCATION
• MBA –University of Kansas – 1986– Information Management
• BA – University of Kansas – 1981 – Computer Science
CERTIFICATIONS
• Certified Information Systems Security Professional (CISSP) – ISC2
• Project Management Professional (PMP) – PMI
6. Sixth
If you want to add social media links then nexus IT group only recommends using your LinkedIn URL and/or an online
portfolio URL. If you decide to add your LinkedIn URL make sure your profile is fully complete and screams “any employer
would be lucky to have me part of their organization”. Meaning, you should have a minimum of 3 sincere and genuine
recommendations from coworkers and managers. You should have a solid summary and skills section. It is also helpful if you
participate in groups and the Q&A section. A great way to show your expertise is to get voted as the “Best Answer” for a
specific discussion and become a LinkedIn “Top Expert”. For more details about becoming a “Top Expert” go to
http://www.linkedin.com/static?key=pop%2Fpop_more_experts.
***Please note – In our professional opinion we DO NOT recommend putting your Facebook, Twitter, MySpace, or any other
social media link on your resume other than LinkedIn and a personal portfolio.
Seventh & Lastly
Spelling errors and typos leave the highest negative impression with employers. The last thing you need to do before
submitting your resume to a referral, agency, or company is PROOFREAD! If grammatical errors are not your strong point
then find someone who can help. Buy them a cup of coffee, lunch, book, etc... Ask them to take 10 minutes to review your
resume and highlight errors and typos.
Please see the following two slides for examples of chronological resumes.
7. Big Jayhawk
785-864-2787
BigJayhawk@gmail.com
linkedin.com/pub/%22big-jayjayhawk/8/8ba/175
Director of Security / Security Architect Professional
Seasoned information security, risk management, governance, and assurance leader with extensive experience in
highly regulated industries.
Dynamic, productive Security professional that has successfully demonstrated the ability to strategically align IT security
to enable business objectives through policies creation, awareness training, and best of breed technology solutions.
Strengths include natural management ability, everything security, needs analysis, profit justification, and, strong work
ethic.
IT-Goverance Risk VPN / Firewall
Policy Procedure Development Business Continuity
OS Security Network Layer 2/3 Security
IDS / IPS Sarbanes Oxley Act
PROFESSIONAL EXPERIENCE
University of Kansas 1901 - present
Director of Security
Recruited to manage the overall security of the Bank and quickly awarded added responsibilities for IT
infrastructure, datacenter operations, business intelligence and development. Oversee security and integrity
of all data systems and verifies the effectiveness of polices, processes, and procedures implemented to
support the Information Security Program, while working with audit firms, Compliance, and Risk
Management to ensure the bank meets all regulatory requirements.
2006-Present
Management of all aspects of the company’s information security and privacy programs.
Quarterly reporting of program status to the company’s board of directors.
Development and implementation of policies, standards, processes, and procedures.
2004-2006
Ensuring the company’s compliance with all applicable legal and regulatory requirements.
Oversight of the company’s Business Continuity, Disaster Recovery, and Pandemic Planning
programs.
2000-2004
Vendor management, third party oversight, due diligence, and contract review.
Performing information security and privacy risk assessments.
Interfacing with internal and external auditors and federal and state examiners.
EDUCATION
University of Kansas, Lawrence, KS
Bachelor of Science in Security May 2000
Masters of Business in Information Systems
8. Big Jayhawk
IT LEADERSHIP FOR THE ENTERPRISE
Enterprise Network / Security Architect
Highly experienced technology professional with a record of developing, delivering, managing, and supporting successful
solutions that incorporate a wide range of applications and technologies. A proven technology strategist with a clear
understanding of its capabilities and the practical application to business processes. Committed to improving business
performance by securely leveraging the power of IT and software.
CORE COMPETENCIES
Consulting • Project Management • Strategic Planning • Team Leadership & Motivation • Needs Assessment
IT Infrastructure • IT Design • IT Strategy • IT Security • Project Management • Deployment • Migrations
Product Marketing • Presentations • Account & Territory Management
PROFESSIONAL EXPERIENCE
Microsoft, New York, NY 2001 – Present
A company helping clients optimize cost and manage risk of their IT, while improving performance. Microsoft offers technology and
business consulting services, products, and technology leasing from all leading IT infrastructure manufacturers.
Security Architect
Orchestrated all aspects of security technology architecture for the company’s top 10 customers in Georgia, South Carolina,
and Texas. Developed and enhanced strong customer relationships with CTOs, CISOs, VPs, and Directors at more than 15
companies. Developed statements of work, proposals, level of effort and work breakdown schedules.
Delivered more than $16M in margin in only 1 year while driving 25% year-over-year growth.
o Improved company visibility within the industry. Served as a high level representative or speaker at industry events
and conferences including RSA and InfoSec.
o Dramatically advanced customer relationships allowing Forsythe to become involved much earlier in the customer
planning process and in many cases being the catalyst for new initiatives.
Apple, San Francisco, CA 1990 – 2001
A $4B IT solutions and services provider with clients across 48 countries worldwide.
Chief Technical Architect - Security
Developed and managed the continuing evolution of a complete offering of security products and services. Orchestrated
product offering deployment across a consulting organization with more than 50 Professionals addressing the security needs
of more than 500 new, existing, and potential customers. Served as ombudsman for pre-sales architecture and top tier of
escalation for deployment issues.
Shaped the product selections for Dimension Data’s go-to-market strategy for security. Provided research and proof of
concepts for more than 20 internal product evaluations.
Cemented a long-term partner relationship with Cisco that ultimately led to full time service as a Consulting Systems
Engineer with Cisco. Secured Dimension Data the honor of “Security Partner of the Year” from Cisco.
Tripled the size of the Dimension Data security practice. Aggressively promoted a heavy concentration on architecture,
exceptional customer satisfaction, and the implementation of best practices.
Rescued more than 25 troubled accounts plagued by poor implementations or poor management of expectations.
EDUCATION
BS in Computer Science at University of Kansas, Lawrence, KS
CERTIFICATIONS
CCIE # 1111
CISSP # 0000
9. nexus IT group’s passion in life are jobs. We love everything about
them. It combines the soft stuff — people's dreams and hopes and
ambitions — with the hard stuff — promotions, salary
advancement, skill set advancement. We’ve been doing this for
awhile and find that we’re learning something new about making
job hunts successful every day. Helping people through what is
one of the most stressful experiences in their lives is
tremendously rewarding and fulfilling, and nexus IT group loves
doing it every day!
At nexus IT group, we believe that values are the cornerstone of
any strong business. Without the proper alignment a company
can never experience true success. Recognizing that we are on
both sides of the hiring process, first class service is what you will
receive from every nexus IT employee. Larger firms may see you
as just another number, we see you as much more.
Follow us on Facebook: http://www.facebook.com/pages/nexus-IT-group/376413049560
Follow us on LinkedIn: http://www.linkedin.com/companies/872738
Follow us on Twitter: http://twitter.com/nexusITgroup
www.nexusITgroup.com