Share

cover art for Resume Padding and Clearance Investigations

Security Clearance Careers Podcast

Resume Padding and Clearance Investigations

Let's say you've 'padded' your resume with some vanity job titles and additional duties. Will those resume details come up in the course of your clearance investigation. Some security clearance applicants think twice when they realize the clearance verification process may dig up some employment details those don't exactly match.

More episodes

View all episodes

  • 10 Tips for Better Cyber Hygiene

    11:53
    In an era where our digital footprint is as significant as our physical presence, maintaining robust cyber hygiene is crucial for protecting personal information and ensuring online safety. Katie Helbling tests Phoebe Wells' knowledge on some cyber practices on the third episode of the ClearanceJobs Gameshow.Test your own knowledge with the questions / answers:What is a common method hackers use to gain access to passwords? PhishingWhat is NOT a type of malware? Freeware What does the term "VPN" stand for, and what is its primary purpose? Virtual Private Network; to secure and privatize your internet connectionWhat is considered the weakest for securing accounts? Using the same password for multiple accountsWhat is the main function of a Firewall in computer security? To monitor and control incoming and outgoing network traffic based on predetermined security rules Here are ten tips to bolster your cyber defenses:Use Strong, Unique Passwords: The foundation of good cyber hygiene starts with strong, unique passwords for each of your accounts. Consider using a passphrase or a password manager to generate and store complex passwords that are difficult to crack.Enable Two-Factor Authentication (2FA): Adding an extra layer of security beyond just a password can significantly reduce the risk of unauthorized access to your accounts. Two-factor authentication requires a second form of verification, such as a text message code or an authentication app, to log in.Regularly Update Software and Systems: Cyber attackers exploit vulnerabilities in outdated software and operating systems. Regular updates help patch these security holes and protect your devices from malware and other cyber threats.Be Wary of Phishing Attempts: Phishing emails or messages attempt to trick you into giving away sensitive information. Be skeptical of unsolicited communications, especially those that request personal data or direct you to a webpage where you need to input your details.Use Secure Networks: Public Wi-Fi networks can be hotspots for cybercriminals to intercept your data. Use a virtual private network (VPN) to encrypt your internet connection and shield your online activities from prying eyes.Backup Your Data: Regularly back up important data to an external drive or cloud storage. In the event of a cyber attack, such as ransomware, you can restore your data from the backup without succumbing to the demands of cyber extortionists.Educate Yourself About Cyber Threats: Awareness is your first line of defense. Stay informed about the latest cyber threats and the best practices for avoiding them.Secure Your Home Network: Change the default username and password on your home router and enable WPA3 encryption to protect your Wi-Fi network from unauthorized access.Limit Personal Information Shared Online: The more information you share online, the easier it is for a cybercriminal to target you. Be mindful about what personal details you post on social media and other websites.Use Antivirus Software: Install reputable antivirus software on your devices to provide real-time protection against malware and other cyber threats. Ensure it's set to update automatically for the best defense.
  • National Security News Reflects Emerging Threats and Job Prospects

    17:57
    National security news encompasses a wide array of topics, all of which are pivotal to the safety and stability of nations around the world. These topics range from cyber threats and espionage to military developments and geopolitical shifts. Given the complexity and interconnectedness of global affairs, national security news often reflects the current state of international relations, highlighting both emerging threats and ongoing efforts to foster peace and security.Here are the top read news headlines last month.
  • From a Small Town to Living Out a Dream at NASA

    19:55
    Kate Gunderson's childhood was filled with dreams of contributing to humanity's exploration of space, with her eyes always fixed on the sky. Immediately after college, she landed her dream job at NASA's Johnson Space Center. In the Aircraft Operations Division, she offered engineering assistance for Johnson Space Center's extensive fleet of more than 20 aircraft. These aircraft are crucial for astronaut training, scientific missions, and ensuring astronaut safety. As NASA's youngest Flight Science Officer, she flew on two Gulfstream aircraft, participating in airborne science expeditions and supporting astronauts on missions worldwide.She joins the podcast to discuss the steps she took toward living out her dream career, empowering women in STEM, and what’s next for her in the world of security clearances.
  • CMMC and Other FBI Guidance on Cyber Attacks

    20:15
    Part 2 of our podcast with Dr. Gerald Auger who is an Adjunct Professor in the Department of Cyber and Computer Sciences at The Citadel in Charleston and a content creator and founder simplycyber.io. He really he brings Information security related content to help IT or Information Security professionals take their career further, faster. So, being a cybersecurity guru of sorts – he also spent sometime supporting DIB as a contractor.Today we chat about CMMC 2.0, the FBI issuing a alert on Russian threats targeting Ubiquiti routers, the FBI warning that China’s computer attacks are at a greater scale than ever seen before, and how the US healthcare sector is a big target for ransomware attacks.
  • Top National Security News Headlines

    20:00
    National security headlines help us to remember recent events and shape what the DoD / IC landscape look like moving forward in the months to come.For this episode of the Security Clearance Careers Podcast, the content team runs through some of the top breaking news over the last month.Tech Layoffs Could Be the New Normal and the Hot, New Job in 2024The tech industry job cuts this year have puzzled many, given the substantial cash reserves of numerous firms. Despite a slowdown in the pandemic, layoffs continue, with 209 tech companies eliminating 50,312 jobs since January, as reported by Layoffs.fyi. Key players like Alphabet, Amazon, and Microsoft have also followed suit, driving tech sector job reductions to levels reminiscent of the dot-com bust. Though some anticipated relief this year, the high number of cuts persists, leaving employees struggling in what was once a thriving job market. The primary reason behind this trend? Stock prices. Layoffs can elevate share values, leading companies to sustain this pattern. This situation might become the new norm in tech employment, with workers growing accustomed to it and investors content. Only time will reveal if this trend endures.National Security Compensation Sets Record HighDuring a year characterized by inflation and budget uncertainties, companies made decisive moves by introducing substantial salary increases. In 2023, successful candidates saw a significant 6% rise in their compensation, raising the average cleared salary to a record high of $114,946. For the second consecutive year, 67% of respondents noted an increase in their base pay. “The state of the national security job market remains strong,” said Evan Lesser, Founder and President of ClearanceJobs.DoD AI Vision Offers New Opportunities for Job Seekers with Key SkillsetsDuring the recent DoD 2024: Defense Data and AI Symposium, led by the Chief Digital and Artificial Intelligence Office in Washington, D.C., the Pentagon presented the objectives required to sustain its "DoD AI Hierarchy of Needs." The strategy emphasizes quality data, governance, insightful analytics and metrics, assurance, and responsible AI.White House Pushes Pay Equity for Federal Employees and ContractorsOn January 29, 2009, the Lilly Ledbetter Fair Pay Act was signed into law by then-President Barack Obama. The act aimed to enhance the enforcement of equal pay laws. The Biden administration recently commemorated the 15th anniversary of a significant federal pay equity law. Additionally, they emphasized the need for new measures to address pay gaps among federal employees and employees of federal contractors. According to a statement released by the White House on January 29, women workers still earn an average of 84 cents for every dollar earned by men. The disparities are even more pronounced for many women of color, resulting in significant financial losses over their lifetimes. In a move to promote pay equity, the White House issued two Executive Orders targeting the federal workforce and employees of federal contractors. 
  • How to Get Your Start in a Supply Chain Career

    22:06
    Supply chain security is a term that is often discussed but rarely understood. Many definitions of supply chain are still centered on a logistics and physical infrastructure focused definition. Theresa Campobasso, Senior Vice President of Strategic Accounts, Exiger Government Solutions, joins Security Clearance Insecurity to talk about the 21st century supply chain. She shares more about how successful supply chain security integrates the physical and cyber, the supply chain security career track, and emerging threats and opportunities in supply chain security.
  • Solving the Cybersecurity Hiring Problem within the Federal Government

    22:24
    Part 1 of our podcast with Dr. Gerald Auger who is an Adjunct Professor in the Department of Cyber and Computer Sciences at The Citadel in Charleston and a content creator and founder simplycyber.io. He really he brings Information security related content to help IT or Information Security professionals take their career further, faster. So, being a cybersecurity guru of sorts – he also spent sometime supporting DIB as a contractor.Today we give tactical tips on how to get a job in the cybersecurity field and how businesses can better align with the current market to fill their cybersecurity roles.
  • Online Safety Tips for Women

    23:04
    Disinformation continues to threaten the spread of accurate information about issues at home and abroad. For women in national security, in particular, there are risks for being a public facing voice. Nina Jankowicz, disinformation expert and author of the book ‘How to Be a Woman Online’ joins the show to discuss why online harassment continues to be such a pervasive issue and what women can do about it.