Can't find a new job? That's probably because you're looking for old jobs. This dynamic field doesn't stand still. Stop searching for "chief security officer" and start looking for classifieds like these. [Editor’s note: Nearly every month somebody takes Debriefing seriously. So we are compelled to mention THESE ARE NOT REAL JOBS.]Certification Manager Urgently NeededCan you explain the difference between CPP and CIPP? Have you framed your ISECOM OSSTMM and your ISC2 CSSLP? Do you know which four BC/DR certs together form an anagram for SPINY ECHIDNA?Join our team and help our experienced security professionals gain and maintain their professional certifications. Hurry, because our HR department can’t make heads or tails out of this stuff. It’s All About The NumbersYou’re all about providing value. You can spin gold from straw using an abacus and an Underwood. You’ve got ten-plus years’ experience building dashboards and proving the worth of security measures from the boardroom level down to particular firewall rules. That makes you the perfect match for our Security Value Guru post. Responsibilities include: Selection and validation of appropriate financial value metrics from among thefollowing: TCO, ROSI, EVA, NPV, OPMInitial capture and analysis of operational data from our security systems, with translation into action itemsProduction of daily, weekly, monthly, quarterly, annual and centurial reports in spreadsheet, PowerPoint and laser/lightshow formatsThis is a ground-floor opportunity—right now we’ve got nothing!Hiring Surveillance Video System Analysts (seven positions open!) We’re an old-school manufacturer with a new-era mind-set, and a smart company deserves a smart surveillance system. So we just replaced four very expensive guards with a state-of-the-art intelligent video system.Now we’re looking to tune the system, eliminate false positives, analyze camera angles, manage MAC (moves, adds, changes) activity, optimize network performance and compression schemes, spec out storage requirements, and create a 10-year continual upgrade technology road map.Apply now—we need to fill these seven reqs to start maximizing our manpower savings.VP of Cloud StuffYou’re our man or woman if you can answer these questions:Where is “the cloud”?What should we put there?How will this affect our SAS70s and our PCI/SOX/GLB/C-TPAT/DCID/HSPD12 compliance?IaaS, SaaS, PaaS, GraaS, private, public, shared, community, cumulonimbus—Jiminy Cricket what’s going on here?Why again is this different from regular old outsourcing? Security Czar Finding Program Sunset ManagerWhew, finally found somebody to take the Cybersecurity Czar position. Now we need an experienced project manager to help us dismantle the Cybersecurity Czar Finding Program Office. Temporary position that must wrap up within two years, in case we need to restart.Infosec Twitter Liaison (full time) You know what we really need? What our security department really needs is for somebody to spend all day using Twitter to provide the entire world with updates on what technologies we’re implementing, what mistakes we’re making, and how stupid our users and nonsecurity IT people are. Interested? Just tweet to @wiggy107.For real job listings, go to our security job board. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO CSO and CISO CSO and CISO feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe