Avatar

Resume Tips image

Have you ever wondered how much time does a recruiter spend reviewing your resume? Place your bets… three minutes? Two maybe?

The actual time you have to make an impact is around 6 seconds (according to an eye-tracking quantitative study of recruiters by TheLadders, in 2012).

Bang! 6 seconds for a quick first scan and initial YES/NO decision. Tough, isn’t it? (For the recruiter as well!)

I’ve been a recruiter for over 13 years now, recruiting for all kinds of industries and roles, and the last eight of those have been at Cisco, hiring talent for our sales, services, engineering and corporate functions teams across Europe, the Middle East, Africa and Russia.

That’s enough time to realize there are cultural differences around the world that mean you may write a resume differently in Spain (where I’m based) than say in the US.

We could talk about the length. For example, while in Europe a two- to three-page resume is commonly accepted, in the US a single-page document would be more appropriate. We could also discuss including personal information, which is acceptable in Europe but including it in the US would be considered a no-no.

But there are some things a resume should always have, no matter if you’re in the North Pole or an island in the Pacific:

1. An organized and easy-to-read layout.

This may seem obvious, but it definitely helps recruiters scan and locate the information they are looking for right where they expect it. According to the study I mentioned above, data points like name, current title/company, current position start and end dates, previous title/company, previous start and end dates, and education are the things capturing the recruiters’ attention during that very short span of time.

2. Use your skills, work experience and achievements to tell your story!

Prioritizing the information you want to share is essential; you have a great chance to make your professional history an interesting read! So make sure your resume includes (ideally in this order):

  • Clear contact information. Don’t hide it!
  • Core competencies or transferrable skills you have developed. This is getting more and more important as many of the jobs we will need to fill in the near future haven’t been invented yet!
  • Responsibilities and key achievements of each role. Also, be sure to quantify wherever possible to back them up and to clearly show progression. Example, if you say you increased sales, how much in what time? Be specific!
  • Education and technical skills, keep it short and simple, no need to include that 2-hour Excel course you took back in 2001!

3. Search Engine Optimization (SEO) Keywords.

Chances are the employer is using a resume scanning system to help them go through all the resumes they get. So taking the necessary time to customize your resume to the job and using the same keywords as the employer does in the job description is key if you want your resume to stand out from the crowd and be among the ones the recruiter actually reviews (at least for 6 seconds!).

This applies as well for passive candidates, who aren’t formally looking or applying, but want to come up in recruiter searches. (See this article on how to use keywords in your LinkedIn profile.)

Your resume is your first introduction to a recruiter, so make sure it has these items included and you should be set!

Want to work for Cisco? Use that shiny new resume and apply!

Authors

Eduardo Vanoutrive

Lead Recruiter Corporate Functions EMEAR

Strategic Talent Acquisition

Avatar

Shutdown. Cleanup. Restart.

This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats.

When threats penetrate perimeter-based protections, human operators typically shut down the compromised system, clean up or replace the compromised files and devices, and then restart the system.

Next is forensic analysis. This, too, requires intensive human involvement to harden existing protection mechanisms and develop future remediation measures.

However, as we move into the next phase of the Internet—the Internet of Things (IoT)—this security paradigm won’t be adequate because of changing form factors and use cases.

To succeed, we need fog computing. This will extend cloud computing (including security) to the edge of an enterprise’s or consumer’s network. Much in the way cloud technology enabled the Internet, fog will enable an array of secure IoT possibilities.

Continue reading “A New Security Paradigm Needed to Support the Internet of Things”

Authors

Tao Zhang

Distinguished Engineer

Corporate Strategic Innovation Group

Avatar

Digital business transformation is a sometimes-vexing journey, with no shortage of pain points along the way. The rewards, however, more than offset the difficulties. How do I know? Because the transformation that so many organizations are undertaking reflects Cisco’s own, sometimes challenging journey — along with those of our top customers.

This month, our team released a major research study that illuminates the critical need for digital business transformation to address key challenges in the manufacturing industry. In particular, we focused on how industrial machine builders and end-user manufacturers are trying to transition from a product-oriented strategy to a service-oriented revenue model.

The goal is to move from a CapEx to OpEx model, charging, in effect, for business outcomes such as uptime, efficiency, and sustainability rather than one-time product fees. However, complexity — along with manufacturers’ limited digital capabilities — is slowing progress. Continue reading “Digital Transformation Unlocks the Door to Services Revenue in Manufacturing”

Authors

Michael Riegel

Vice President

Industries, Platforms, and Services Marketing

Avatar

Co-authored with Kacey Carpenter

Technology Changing the Game

The industry continues to change, reflecting both emerging approaches to delivering innovative IT solutions, and also the faster paced, more complex environment faced by government officials. These topics share a common theme – citizen expectations continue to rise. Government leaders must be agile enough to adapt to changing circumstances and to rapidly deliver safer and smarter outcomes for their cities and countries. Considering what will be valuable and critical for success for effectively managing in the digital era, the public sector is increasingly turning to the Internet of Things (IoT) and the immense opportunities it will provide to turn data into insights and drive highly relevant and compelling outcomes.

The IoT has been increasingly influencing the public safety realm. Thanks to the plethora of connected devices that can collect real-time data – such as body-worn cameras – it’s possible to begin leveraging the real-time, actionable data this ecosystem delivers, enabling public-safety professionals to help keep citizens safer and communities more secure. By harnessing IoT technologies for public safety, first responders and law enforcement can more easily respond to emergencies and even prevent situations from turning into emergencies in the first place.

https://www.youtube.com/watch?v=jO5uK47FKd0

Real-time police operations at IoT World Forum in Dubai

In this week’s post, our digital citizen is back from the future. Our citizen was fortunate enough to jump a week ahead to this year’s IoT World Forum, set to take stage on Dec 6-8 in Dubai. The visit was to witness the demonstration of a solution built from the ground up and customized for the Dubai municipality.  Continue reading “#WednesdayWalkabout Series: IoT Changing the Public Safety Landscape”

Authors

Brian McGlynn

Chief Strategy Officer

Davra Networks

Avatar

This is part of a series on the evolution of the Cisco Collaboration Cloud platform, exploring the technical and design principles behind its unique architecture.

So far in this series, we’ve learned about two ways the Cisco Collaboration Cloud is revolutionizing enterprise communications technology:  through its exceptional user experience and its hybrid capability. A third is security. Security ensures our customers are always in control of their own data and is fundamental to everything we do.

For IT, the question you really need to ask is a simple one: Does the collaboration platform protect my content from the prying eyes of others, including the vendor, or doesn’t it?

There is no gray area for collaboration security.

Our on-premises products, such as Cisco Unified Communications Manager, have traditionally put the decision about whether to use “Secure Mode” into the hands of the administrator. Secure Mode controls device profile security and media encryption. With entirely on-premises technology, administrators could decide whether the effort required to enable Secure Mode was justified for their enterprise.

More often than not, administrators decided to leave Secure Mode turned off. Let’s be clear: the administrator’s decision not to enable security was a failure on our part. We presented the administrator with an option to choose security that was only as secure as their network perimeter, which required zero effort or expense. Continue reading “Secure Without Compromise”

Authors

Shaun Cooley

Distinguished Engineer

Avatar

Enterprise customers considering IT services often face some difficult tradeoffs: They can go with a public cloud offering, and accept the potential limitations on customization and localized control that implies. Or, they can build new IT services on premises, a process that’s often more complex, expensive, and resource-intensive.  Today, service providers like TELUS are offering a better option: on-demand hybrid cloud capabilities that can keep data and security onsite, while offering the speed and flexibility of the cloud. TELUS just announced a major hybrid cloud service offering in Canada, giving its customers the ability to integrate public and private cloud services, as well as on-premises infrastructure, through a single portal. And the secret sauce behind TELUS’ versatile new cloud offer? It’s Cisco Cloud Architecture for the Microsoft Cloud Platform.

A Growing Market—With Growing Expectations

As a leading Canadian provider of advanced telecommunications services, TELUS was seeing huge demand from its customers for cloud services. These customers are Continue reading “TELUS Unveils Hybrid Cloud Solution”

Authors

John Malzahn

Senior Marketing Manager

Service Provider Cloud Solutions

Avatar

I had the distinct pleasure to meet Stephen Sorkin, Chief Strategy Officer for Splunk and talk to him about his views on the challenges enterprises face as they adapt to the mobile, social, cloud, and big data changes happening with their customers, competitors, and industry.  The recording below is the result of our discussion.  Stephen talks about the new connected environment where the end user experience is defined by the full stack running in the data center or the cloud.  There are components like the underlying bare metal, the hypervisor, the network, the storage that all have to be tied together in order to understand what the user’s experience is really going to be like.

Splunk and ACI

Continue reading “Accelerate Data Center Operations with Analytics”

Authors

Harry Petty

Director

Data Center and Cloud Marketing

Avatar

Cisco Corporate Social Responsibility strategy prioritizes the issues that are most important to our business and to our stakeholders, identified through a formal CSR materiality assessment. We use the Cisco CSR Report to communicate our approach, objectives, progress, and challenges around five high-level priorities. Today, we’ll take a look at Governance and Ethics:

Cisco is committed to creating technology solutions that solve our customers’ challenges and make the world a better place by connecting the unconnected. To bring that value to the world, it is essential that we have the trust of all our stakeholders — our employees, customers, and suppliers, and the communities in which we operate. A commitment to ethical conduct — and to the governance structures that ensure we walk the talk — provides the foundation for us to earn that trust.

Governance_withArrow

Mark Chandler, Cisco’s Senior Vice President, General Counsel and Secretary, and Chief Compliance Officer, expressed the importance of earning the trust of Cisco’s stakeholders in this year’s Corporate Social Responsibility report:

“A commitment to ethical conduct—and to the governance structures that ensure we walk
the talk—provides the foundation for us to earn our stakeholders’ trust. We are focused on addressing concerns around high-priority issues such as digital rights, ethical conduct, and data security and privacy.”

Continue reading “2015 Cisco Corporate Social Responsibility Report: Governance and Ethics”

Authors

Austin Belisle

No Longer with Cisco

Avatar

Holidays are here. It is time to take a pause from work for travels and family celebrations. But hackers are not taking a rest. Just recently, a major hotel chain reported that it suffered a security breach related to customer credit and debit card payments.

The hospitality industry is certainly not the only victim of data breaches.  A recent report on Protected Health Information (PHI) data breach suggests that many industries (not just the healthcare industry alone) have experienced a PHI data breach – in fact 90% of them.

The industrialization of hacking has generated increasingly sophisticated and discrete cyberattacks for financial or political gain. No organizations today are immune from these nonstop attacks. So what can you do to help protect your organization?

Defense in depth is a proven information security strategy. Your layered defense includes all the security components you have already deployed such as firewalls, IPS, and advanced malware protection. But, have you utilized one of the strongest tools that you already have? It is the network itself.

Your Cisco network includes Catalyst and Nexus switches, integrated services routers (ISRs), aggregation services routers (ASRs), wireless products, and UCS systems. These network solutions can add another layer of security protection for you throughout the attack continuum, before, during and after an attack.

https://www.youtube.com/watch?v=oIA6OeQ3Vn8

Continue reading “Celebrate the Holiday Season with Better Security Defense”

Authors

Steven Song

Business Manager