Job Reconnaissance

Job Reconnaissance : Using Hacking Skills to Win the Job Hunt Game

4 (9 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years.

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in Job Reconnaissance is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search books commonly miss.
show more

Product details

  • Paperback | 196 pages
  • 147.32 x 226.06 x 15.24mm | 272.15g
  • Rockland, MA, United States
  • English
  • New
  • black & white illustrations
  • 0124166016
  • 9780124166011
  • 1,097,069

Table of contents

Acknowledgments
Introduction


The Ethics of Reconnaissance and Job Searching
The Cold, Hard Truth
Geek Culture
Protection and Avoidance
How to Read This Book

Chapter 1. Foundations: What You Ought to Have Done before Buying This Book


Task Management
Time Management
Your Personal Brand
Content Creation
Personal Brand Management

Chapter 2. Time to Leave: How to Know When You Should Move On


The End of the Road
Economic Cycles
Identifying What You Want

Chapter 3. Resumes and Cover Letters: Why the Common Approach Only Works against You


Resumes Close Doors
Networking Opens Doors
Cover Letters Open Doors
Using Resumes to Tell Stories
Creating and Tuning a Master Resume
Example Resume and Story Cards

Chapter 4. Talking about Yourself: The Fine Lines around Boasting, Bragging, Belittling, and Begrudging


Telling Timely Stories
Socially Engineering Your Audience
What to Avoid
Presentations

Chapter 5. Targeting: Cyclical Filtering to Choose Targets with High Likelihoods of Success


Job Tasks
Job Potential
Location and Size
Rating
Technology
The Short List
Example Short List

Chapter 6. Initial Reconnaissance: Uncovering Seeds


Ethics
Continual Reassessment
Time Management
Google
Bing
Alternate Search Engines
Quick Reference
Filling in the Lists
Harvester
Filling in by Title
Threat Agent
Recon-ng

Chapter 7. Deeper Reconnaissance: Uncovering Hidden Data


Company Analysis
Professional Analysis
Personal Analysis
Hail Mary Sites

Chapter 8. Metaphor Mapping: Adjusting to Your Target


Discovering Existing Metaphors
Guessing at Metaphors

Chapter 9. Repositioning: How to Make You Stand Out


Rebottling the Genie
Loading Social Media
Custom Resume
Custom Cover Letter
Targeted Networking

Chapter 10. The Phone Interview: Dial M for Meeting


Prerequisites for a Good Discussion
Goals for the Phone Interview
The Actual Phone Interview
Planning the In-Person Interview

Chapter 11. The Portfolio: Items to Leave Behind


The Portfolio Process
Custom Documents
Business Cards
Notes on Design

Chapter 12. Thinking about Money: Making the Most of Change


Total Compensation

Chapter 13. Before the Interview: Plan to Succeed


Physical Investigation
Question Planning
Time Planning
Appearance
Planning the Conversations

Chapter 14. Interview: Take Control


The True Purpose of the Interview
Social Niceties
Using Your Tools
Manipulating the Conversation

Chapter 15. Post-Interview: The End of the Interview Is Not the End of the Interview


Clarification Emails
Thank-You Notes
Checking In
Revising Your Portfolio
Subsequent Interviews

Chapter 16. Salary Negotiation: Everything Can Be Flexible


Working with Total Compensation
Negotiating Basics
Accepting or Rejecting the Offer

Chapter 17. Giving Notice: Parting Is Such Sweet Sorrow


Preparing for the Worst
Benefits
Gotchas
Formal Process
Negotiating Notice
Counteroffers
Exit Interview

Chapter 18. Conclusion
Appendix A. Resources


Search Resources
Hiding Your Identity
Managing the Process
Managing Money
Social Skills
General Business
Ethics

Appendix B. Interview Questions


Common Interview Questions

Appendix C. Emotional Concerns


Constant Progress
Knowing When You're Stuck
Getting Unstuck
Asking for Help
show more

Review quote

"The book uses hacking as a metaphor for a more aggressive approach to finding a job, rather than simply relying on the stale and hackneyed approach that most people use. More cautions several times that hacking does not mean lying...For those looking to find their next job, the right job; Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game is a great resource to help you get there."--RSAConference.com, January 6, 2014
show more

About Josh More

Josh has over fifteen years of experience in IT, and ten years working in Security. Though today, he primarily works as a security consultant, he has also worked in roles ranging from user to developer to system administrator. He holds several security and technical certifications and serves in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssoftware.com. As security works best from a holistic approach, he works all angles: risk assessments, posture analysis, incident response, malware analysis, infrastructure defense, system forensics, employee training and business strategy. Josh More works at RJS Software Systems, a national data management and security company.
show more

Rating details

9 ratings
4 out of 5 stars
5 33% (3)
4 33% (3)
3 33% (3)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X