SlideShare uma empresa Scribd logo
1 de 9
Combining boutique firm attention with a national reach and niche expertise, while consistently
      delivering first class service, nexus IT group’s strategic intent is to cater to the IT market from an
        application development, IT infrastructure and support, and IT communications standpoint.

Did You Know (Source: 2001 paper by the Association for Job Search Trainers)
      That prospective employers generally spend a mere 15 to 20 seconds reviewing a resume for the first time
      A professional looking resume will increase the success rate of getting an interview in today's competitive job market
      Today’s job seeker should have 2 to 3 resumes written that targets specific skills instead of a "blanket" approach?
      84% of employers say that a resume should only be 1 page if you have less than 5 years experience
      80% of screening happens with the resume
      Most employers feel that an employee should keep a job two years before changing
      Employers expect a thank you note

nexus IT group Can Help
      nexus IT group is pleased to provide the steps to writing a professional resume . Whether you are an active or passive job
       seeker, it is always recommended to update your resume annually. We can help! Follow our simple steps and structure and
       you will be writing a professional resume that other people pay $1,000’s for. Don’t be another statistic, let nexus IT group
       help you put your best foot forward.
First & Most Important
    Before beginning your resume it is highly recommend that you make a bullet point list of your accomplishments in each
    position that you held. This will be very important for highlighting your key contributions, and are great talking points during
    an interview.

Second
    Many job seekers overlook the importance of a strong “Summary” in their resume. Your summary should highlight your
    career in 3-5 sentences. Use powerful adjectives in this section. It’s important that you point out your strengths, but don’t get
    to specific. The goal of the summary is to entice the reader to want to read more. Your summary should grab the reader and
    want them asking for more.

Third
    The next item to get you on your way to writing a great IT resume is to have a “Skills” section in your resume. Okay, this is
    where you can throw in all of those key buzz words that will allow your resume to be identified by recruiters.

    For Example

             •   IT-Goverance Risk
             •   Policy Procedure Development
             •   OS Security
             •   IDS / IPS
             •   VPN / Firewall
             •   Business Continuity
             •   Network Layer 2/3 Security
             •   Sarbanes Oxley Act
Fourth
    This brings us to the “Experience” section of the resume. This is the section where a resume can take a turn for the worse. It
    is nexus IT group’s professional opinion that all IT resumes should be written in chronological format vs. functional format.
    Chronological resumes are user friendly and allow the reader to easily identify your skills and key accomplishments. The ideal
    format would be to begin with 3 to 5 sentences that gives a brief overview of your company, and a short description of your
    duties and responsibilities. ***Under your brief overview, you should have a bulleted list of your “Key Accomplishments”.

For Example:

               Director of Information Security  University of Kansas  09/1981 – present
               Kansas Bank with 109 branches brought me on board to revamp its struggling information secu-rity program.
               Officer of the corporation. Report to the Chief Technology Officer. Manage an operational budget and a team of
               25. Key responsibilities include: Management of all aspects of the company’s information security and privacy
               programs, quarterly reporting of program status to the company’s board of directors, and development and
               implementation of policies, standards, processes, and procedures.

               Key accomplishments:
                Eliminated 67 outstanding medium and high impact I.T. control deficiencies in my first year.
                Improved audit ratings in 40% of FDA categories. Maintained ratings in all other categories.
                Restructured the team and overhauled the entire information security and privacy service catalog.
Fifth
        The last step in writing a great resume that will exponentially increase your opportunity of landing your next great career is
        adding an “Education” section. If you have professional training and/or certifications that you feel is applicable then make
        sure to add this section below “Education”.

For example:

                 EDUCATION
                 • MBA –University of Kansas – 1986– Information Management
                 • BA – University of Kansas – 1981 – Computer Science

                 CERTIFICATIONS
                 • Certified Information Systems Security Professional (CISSP) – ISC2
                 • Project Management Professional (PMP) – PMI
Sixth
        If you want to add social media links then nexus IT group only recommends using your LinkedIn URL and/or an online
        portfolio URL. If you decide to add your LinkedIn URL make sure your profile is fully complete and screams “any employer
        would be lucky to have me part of their organization”. Meaning, you should have a minimum of 3 sincere and genuine
        recommendations from coworkers and managers. You should have a solid summary and skills section. It is also helpful if you
        participate in groups and the Q&A section. A great way to show your expertise is to get voted as the “Best Answer” for a
        specific discussion and become a LinkedIn “Top Expert”. For more details about becoming a “Top Expert” go to
        http://www.linkedin.com/static?key=pop%2Fpop_more_experts.

        ***Please note – In our professional opinion we DO NOT recommend putting your Facebook, Twitter, MySpace, or any other
        social media link on your resume other than LinkedIn and a personal portfolio.

Seventh & Lastly
     Spelling errors and typos leave the highest negative impression with employers. The last thing you need to do before
     submitting your resume to a referral, agency, or company is PROOFREAD! If grammatical errors are not your strong point
     then find someone who can help. Buy them a cup of coffee, lunch, book, etc... Ask them to take 10 minutes to review your
     resume and highlight errors and typos.



    Please see the following two slides for examples of chronological resumes.
Big Jayhawk
                                                                                                           785-864-2787
                                                                                                 BigJayhawk@gmail.com
                                                                          linkedin.com/pub/%22big-jayjayhawk/8/8ba/175


                       Director of Security / Security Architect Professional
 Seasoned information security, risk management, governance, and assurance leader with extensive experience in
                                          highly regulated industries.

Dynamic, productive Security professional that has successfully demonstrated the ability to strategically align IT security
   to enable business objectives through policies creation, awareness training, and best of breed technology solutions.
Strengths include natural management ability, everything security, needs analysis, profit justification, and, strong work
                                                           ethic.

           IT-Goverance Risk                                         VPN / Firewall
           Policy Procedure Development                              Business Continuity
           OS Security                                               Network Layer 2/3 Security
           IDS / IPS                                                 Sarbanes Oxley Act


      PROFESSIONAL EXPERIENCE
       University of Kansas                                                                           1901 - present
       Director of Security

       Recruited to manage the overall security of the Bank and quickly awarded added responsibilities for IT
       infrastructure, datacenter operations, business intelligence and development. Oversee security and integrity
       of all data systems and verifies the effectiveness of polices, processes, and procedures implemented to
       support the Information Security Program, while working with audit firms, Compliance, and Risk
       Management to ensure the bank meets all regulatory requirements.

       2006-Present
              Management of all aspects of the company’s information security and privacy programs.
              Quarterly reporting of program status to the company’s board of directors.
              Development and implementation of policies, standards, processes, and procedures.

       2004-2006
              Ensuring the company’s compliance with all applicable legal and regulatory requirements.
              Oversight of the company’s Business Continuity, Disaster Recovery, and Pandemic Planning
               programs.

       2000-2004
              Vendor management, third party oversight, due diligence, and contract review.
              Performing information security and privacy risk assessments.
              Interfacing with internal and external auditors and federal and state examiners.


       EDUCATION
       University of Kansas, Lawrence, KS
       Bachelor of Science in Security                                                                    May 2000
       Masters of Business in Information Systems
Big Jayhawk

                                          IT LEADERSHIP FOR THE ENTERPRISE
                                            Enterprise Network / Security Architect
Highly experienced technology professional with a record of developing, delivering, managing, and supporting successful
solutions that incorporate a wide range of applications and technologies. A proven technology strategist with a clear
understanding of its capabilities and the practical application to business processes. Committed to improving business
performance by securely leveraging the power of IT and software.

                                                     CORE COMPETENCIES
        Consulting • Project Management • Strategic Planning • Team Leadership & Motivation • Needs Assessment
         IT Infrastructure • IT Design • IT Strategy • IT Security • Project Management • Deployment • Migrations
                           Product Marketing • Presentations • Account & Territory Management

                                                 PROFESSIONAL EXPERIENCE

Microsoft, New York, NY                                                                                          2001 – Present
A company helping clients optimize cost and manage risk of their IT, while improving performance. Microsoft offers technology and
business consulting services, products, and technology leasing from all leading IT infrastructure manufacturers.
Security Architect
Orchestrated all aspects of security technology architecture for the company’s top 10 customers in Georgia, South Carolina,
and Texas. Developed and enhanced strong customer relationships with CTOs, CISOs, VPs, and Directors at more than 15
companies. Developed statements of work, proposals, level of effort and work breakdown schedules.
   Delivered more than $16M in margin in only 1 year while driving 25% year-over-year growth.
    o    Improved company visibility within the industry. Served as a high level representative or speaker at industry events
         and conferences including RSA and InfoSec.
    o    Dramatically advanced customer relationships allowing Forsythe to become involved much earlier in the customer
         planning process and in many cases being the catalyst for new initiatives.

Apple, San Francisco, CA                                                                                             1990 – 2001
A $4B IT solutions and services provider with clients across 48 countries worldwide.
Chief Technical Architect - Security
Developed and managed the continuing evolution of a complete offering of security products and services. Orchestrated
product offering deployment across a consulting organization with more than 50 Professionals addressing the security needs
of more than 500 new, existing, and potential customers. Served as ombudsman for pre-sales architecture and top tier of
escalation for deployment issues.
   Shaped the product selections for Dimension Data’s go-to-market strategy for security. Provided research and proof of
    concepts for more than 20 internal product evaluations.
   Cemented a long-term partner relationship with Cisco that ultimately led to full time service as a Consulting Systems
    Engineer with Cisco. Secured Dimension Data the honor of “Security Partner of the Year” from Cisco.
   Tripled the size of the Dimension Data security practice. Aggressively promoted a heavy concentration on architecture,
    exceptional customer satisfaction, and the implementation of best practices.
   Rescued more than 25 troubled accounts plagued by poor implementations or poor management of expectations.


                                                          EDUCATION
                                 BS in Computer Science at University of Kansas, Lawrence, KS

                                                        CERTIFICATIONS
                                                          CCIE # 1111
                                                          CISSP # 0000
nexus IT group’s passion in life are jobs. We love everything about
them. It combines the soft stuff — people's dreams and hopes and
ambitions — with the hard stuff — promotions, salary
advancement, skill set advancement. We’ve been doing this for
awhile and find that we’re learning something new about making
job hunts successful every day. Helping people through what is
one of the most stressful experiences in their lives is
tremendously rewarding and fulfilling, and nexus IT group loves
doing it every day!

At nexus IT group, we believe that values are the cornerstone of
any strong business. Without the proper alignment a company
can never experience true success. Recognizing that we are on
both sides of the hiring process, first class service is what you will
receive from every nexus IT employee. Larger firms may see you
as just another number, we see you as much more.




Follow us on Facebook: http://www.facebook.com/pages/nexus-IT-group/376413049560
Follow us on LinkedIn: http://www.linkedin.com/companies/872738
Follow us on Twitter: http://twitter.com/nexusITgroup




                                        www.nexusITgroup.com

Mais conteúdo relacionado

Mais procurados

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
Yigal Behar
 
Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity Model
Security Innovation
 

Mais procurados (19)

IT security
IT securityIT security
IT security
 
Cybersecurity Actions for CEOs
Cybersecurity Actions for CEOsCybersecurity Actions for CEOs
Cybersecurity Actions for CEOs
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
LeChon Douglas2
LeChon Douglas2LeChon Douglas2
LeChon Douglas2
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
PINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human Dimension
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
 
Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity Model
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
JP Morgan Paper
JP Morgan PaperJP Morgan Paper
JP Morgan Paper
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 

Semelhante a Nexus It Group Resume Writing

IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
360 BSI
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
360 BSI
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
360 BSI
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 

Semelhante a Nexus It Group Resume Writing (20)

IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 

Nexus It Group Resume Writing

  • 1.
  • 2. Combining boutique firm attention with a national reach and niche expertise, while consistently delivering first class service, nexus IT group’s strategic intent is to cater to the IT market from an application development, IT infrastructure and support, and IT communications standpoint. Did You Know (Source: 2001 paper by the Association for Job Search Trainers)  That prospective employers generally spend a mere 15 to 20 seconds reviewing a resume for the first time  A professional looking resume will increase the success rate of getting an interview in today's competitive job market  Today’s job seeker should have 2 to 3 resumes written that targets specific skills instead of a "blanket" approach?  84% of employers say that a resume should only be 1 page if you have less than 5 years experience  80% of screening happens with the resume  Most employers feel that an employee should keep a job two years before changing  Employers expect a thank you note nexus IT group Can Help  nexus IT group is pleased to provide the steps to writing a professional resume . Whether you are an active or passive job seeker, it is always recommended to update your resume annually. We can help! Follow our simple steps and structure and you will be writing a professional resume that other people pay $1,000’s for. Don’t be another statistic, let nexus IT group help you put your best foot forward.
  • 3. First & Most Important Before beginning your resume it is highly recommend that you make a bullet point list of your accomplishments in each position that you held. This will be very important for highlighting your key contributions, and are great talking points during an interview. Second Many job seekers overlook the importance of a strong “Summary” in their resume. Your summary should highlight your career in 3-5 sentences. Use powerful adjectives in this section. It’s important that you point out your strengths, but don’t get to specific. The goal of the summary is to entice the reader to want to read more. Your summary should grab the reader and want them asking for more. Third The next item to get you on your way to writing a great IT resume is to have a “Skills” section in your resume. Okay, this is where you can throw in all of those key buzz words that will allow your resume to be identified by recruiters. For Example • IT-Goverance Risk • Policy Procedure Development • OS Security • IDS / IPS • VPN / Firewall • Business Continuity • Network Layer 2/3 Security • Sarbanes Oxley Act
  • 4. Fourth This brings us to the “Experience” section of the resume. This is the section where a resume can take a turn for the worse. It is nexus IT group’s professional opinion that all IT resumes should be written in chronological format vs. functional format. Chronological resumes are user friendly and allow the reader to easily identify your skills and key accomplishments. The ideal format would be to begin with 3 to 5 sentences that gives a brief overview of your company, and a short description of your duties and responsibilities. ***Under your brief overview, you should have a bulleted list of your “Key Accomplishments”. For Example: Director of Information Security  University of Kansas  09/1981 – present Kansas Bank with 109 branches brought me on board to revamp its struggling information secu-rity program. Officer of the corporation. Report to the Chief Technology Officer. Manage an operational budget and a team of 25. Key responsibilities include: Management of all aspects of the company’s information security and privacy programs, quarterly reporting of program status to the company’s board of directors, and development and implementation of policies, standards, processes, and procedures. Key accomplishments:  Eliminated 67 outstanding medium and high impact I.T. control deficiencies in my first year.  Improved audit ratings in 40% of FDA categories. Maintained ratings in all other categories.  Restructured the team and overhauled the entire information security and privacy service catalog.
  • 5. Fifth The last step in writing a great resume that will exponentially increase your opportunity of landing your next great career is adding an “Education” section. If you have professional training and/or certifications that you feel is applicable then make sure to add this section below “Education”. For example: EDUCATION • MBA –University of Kansas – 1986– Information Management • BA – University of Kansas – 1981 – Computer Science CERTIFICATIONS • Certified Information Systems Security Professional (CISSP) – ISC2 • Project Management Professional (PMP) – PMI
  • 6. Sixth If you want to add social media links then nexus IT group only recommends using your LinkedIn URL and/or an online portfolio URL. If you decide to add your LinkedIn URL make sure your profile is fully complete and screams “any employer would be lucky to have me part of their organization”. Meaning, you should have a minimum of 3 sincere and genuine recommendations from coworkers and managers. You should have a solid summary and skills section. It is also helpful if you participate in groups and the Q&A section. A great way to show your expertise is to get voted as the “Best Answer” for a specific discussion and become a LinkedIn “Top Expert”. For more details about becoming a “Top Expert” go to http://www.linkedin.com/static?key=pop%2Fpop_more_experts. ***Please note – In our professional opinion we DO NOT recommend putting your Facebook, Twitter, MySpace, or any other social media link on your resume other than LinkedIn and a personal portfolio. Seventh & Lastly Spelling errors and typos leave the highest negative impression with employers. The last thing you need to do before submitting your resume to a referral, agency, or company is PROOFREAD! If grammatical errors are not your strong point then find someone who can help. Buy them a cup of coffee, lunch, book, etc... Ask them to take 10 minutes to review your resume and highlight errors and typos. Please see the following two slides for examples of chronological resumes.
  • 7. Big Jayhawk 785-864-2787 BigJayhawk@gmail.com linkedin.com/pub/%22big-jayjayhawk/8/8ba/175 Director of Security / Security Architect Professional Seasoned information security, risk management, governance, and assurance leader with extensive experience in highly regulated industries. Dynamic, productive Security professional that has successfully demonstrated the ability to strategically align IT security to enable business objectives through policies creation, awareness training, and best of breed technology solutions. Strengths include natural management ability, everything security, needs analysis, profit justification, and, strong work ethic.  IT-Goverance Risk  VPN / Firewall  Policy Procedure Development  Business Continuity  OS Security  Network Layer 2/3 Security  IDS / IPS  Sarbanes Oxley Act PROFESSIONAL EXPERIENCE University of Kansas 1901 - present Director of Security Recruited to manage the overall security of the Bank and quickly awarded added responsibilities for IT infrastructure, datacenter operations, business intelligence and development. Oversee security and integrity of all data systems and verifies the effectiveness of polices, processes, and procedures implemented to support the Information Security Program, while working with audit firms, Compliance, and Risk Management to ensure the bank meets all regulatory requirements. 2006-Present  Management of all aspects of the company’s information security and privacy programs.  Quarterly reporting of program status to the company’s board of directors.  Development and implementation of policies, standards, processes, and procedures. 2004-2006  Ensuring the company’s compliance with all applicable legal and regulatory requirements.  Oversight of the company’s Business Continuity, Disaster Recovery, and Pandemic Planning programs. 2000-2004  Vendor management, third party oversight, due diligence, and contract review.  Performing information security and privacy risk assessments.  Interfacing with internal and external auditors and federal and state examiners. EDUCATION University of Kansas, Lawrence, KS Bachelor of Science in Security May 2000 Masters of Business in Information Systems
  • 8. Big Jayhawk IT LEADERSHIP FOR THE ENTERPRISE Enterprise Network / Security Architect Highly experienced technology professional with a record of developing, delivering, managing, and supporting successful solutions that incorporate a wide range of applications and technologies. A proven technology strategist with a clear understanding of its capabilities and the practical application to business processes. Committed to improving business performance by securely leveraging the power of IT and software. CORE COMPETENCIES Consulting • Project Management • Strategic Planning • Team Leadership & Motivation • Needs Assessment IT Infrastructure • IT Design • IT Strategy • IT Security • Project Management • Deployment • Migrations Product Marketing • Presentations • Account & Territory Management PROFESSIONAL EXPERIENCE Microsoft, New York, NY 2001 – Present A company helping clients optimize cost and manage risk of their IT, while improving performance. Microsoft offers technology and business consulting services, products, and technology leasing from all leading IT infrastructure manufacturers. Security Architect Orchestrated all aspects of security technology architecture for the company’s top 10 customers in Georgia, South Carolina, and Texas. Developed and enhanced strong customer relationships with CTOs, CISOs, VPs, and Directors at more than 15 companies. Developed statements of work, proposals, level of effort and work breakdown schedules.  Delivered more than $16M in margin in only 1 year while driving 25% year-over-year growth. o Improved company visibility within the industry. Served as a high level representative or speaker at industry events and conferences including RSA and InfoSec. o Dramatically advanced customer relationships allowing Forsythe to become involved much earlier in the customer planning process and in many cases being the catalyst for new initiatives. Apple, San Francisco, CA 1990 – 2001 A $4B IT solutions and services provider with clients across 48 countries worldwide. Chief Technical Architect - Security Developed and managed the continuing evolution of a complete offering of security products and services. Orchestrated product offering deployment across a consulting organization with more than 50 Professionals addressing the security needs of more than 500 new, existing, and potential customers. Served as ombudsman for pre-sales architecture and top tier of escalation for deployment issues.  Shaped the product selections for Dimension Data’s go-to-market strategy for security. Provided research and proof of concepts for more than 20 internal product evaluations.  Cemented a long-term partner relationship with Cisco that ultimately led to full time service as a Consulting Systems Engineer with Cisco. Secured Dimension Data the honor of “Security Partner of the Year” from Cisco.  Tripled the size of the Dimension Data security practice. Aggressively promoted a heavy concentration on architecture, exceptional customer satisfaction, and the implementation of best practices.  Rescued more than 25 troubled accounts plagued by poor implementations or poor management of expectations. EDUCATION BS in Computer Science at University of Kansas, Lawrence, KS CERTIFICATIONS CCIE # 1111 CISSP # 0000
  • 9. nexus IT group’s passion in life are jobs. We love everything about them. It combines the soft stuff — people's dreams and hopes and ambitions — with the hard stuff — promotions, salary advancement, skill set advancement. We’ve been doing this for awhile and find that we’re learning something new about making job hunts successful every day. Helping people through what is one of the most stressful experiences in their lives is tremendously rewarding and fulfilling, and nexus IT group loves doing it every day! At nexus IT group, we believe that values are the cornerstone of any strong business. Without the proper alignment a company can never experience true success. Recognizing that we are on both sides of the hiring process, first class service is what you will receive from every nexus IT employee. Larger firms may see you as just another number, we see you as much more. Follow us on Facebook: http://www.facebook.com/pages/nexus-IT-group/376413049560 Follow us on LinkedIn: http://www.linkedin.com/companies/872738 Follow us on Twitter: http://twitter.com/nexusITgroup www.nexusITgroup.com