Share

cover art for Solving the Cybersecurity Hiring Problem within the Federal Government

Security Clearance Careers Podcast

Solving the Cybersecurity Hiring Problem within the Federal Government

Part 1 of our podcast with Dr. Gerald Auger who is an Adjunct Professor in the Department of Cyber and Computer Sciences at The Citadel in Charleston and a content creator and founder simplycyber.io. He really he brings Information security related content to help IT or Information Security professionals take their career further, faster. So, being a cybersecurity guru of sorts – he also spent sometime supporting DIB as a contractor.


Today we give tactical tips on how to get a job in the cybersecurity field and how businesses can better align with the current market to fill their cybersecurity roles.

More episodes

View all episodes

  • Doxxing, AI, and Deepfakes, Oh My!

    11:20
    Doxxing issues are on the rise, along with deep fakes and AI. What can you do if someone posts your personal information online? If you're a security clearance holder, should you be concerned about the security risks of doxxing? On the other side, what if you take things too far in an online dispute and find yourself having doxxed someone - could you face clearance issues?
  • How to Implement AI in Business Operations to Help Your Workforce

    17:00
    Incorporating artificial intelligence (AI) into business operations can significantly enhance efficiency, reduce costs, and foster innovation. To successfully integrate AI, companies should consider a strategic and structured approach.Brianna Van Zanten, military brat and Customer Success Manager at InCheq, and a task management expert joins the podcast to talk about how modern task management tools are revolutionizing productivity and collaboration in the workforce.On this episode, we chat about integrating AI and machine learning for smarter task prioritization, enhancing team collaboration through these cloud-based platforms, streamlining workflows in remote and hybrid work environments, and leveraging data analytics for continuous process improvement.
  • More than a Bombshell: Unpacking the Story of Hedy Lamarr

    18:28
    Your favorite national security pop culture talk is back with Eric Pecinovsky, vice president of marketing at ClearanceJobs and resident documentary expert. He discusses the 2017 documentary Bombshell: The Hedy Lamarr Story, now streaming on Netflix. While best known as a Hollywood starlet, she should be most remembered for her significant technical and scientific achievements. Lamarr coinvented a radio guidance system called frequency hopping, considered the forerunner to Bluetooth technology.
  • This Organization Has a 100% Success Rate in Avoiding Veteran Loss to Suicide

    23:12
    Post-Traumatic Stress Disorder (PTSD) is a significant and concerning issue among U.S. veterans, stemming from the unique and often harrowing experiences faced during military service. PTSD is a mental health condition that's triggered by a terrifying event, either experiencing it or witnessing it. Symptoms may include flashbacks, nightmares, severe anxiety, as well as uncontrollable thoughts about the event. For veterans, these events can include combat exposure, training accidents, sexual assault during service, and other traumatic experiences.Northwest Battle Buddies is a noble and inspiring organization dedicated to providing service dogs to veterans suffering from PTSD and other psychological challenges resulting from their military service. Founded on the belief that no veteran should face the battle for normalcy alone after serving their country, this nonprofit aims to empower veterans by partnering them with specifically trained service dogs. These dogs are not just pets, but lifelines to a better quality of life, offering companionship, security, and a sense of independence.The founder joins the podcast to discuss their work.
  • 10 Tips for Better Cyber Hygiene

    11:53
    In an era where our digital footprint is as significant as our physical presence, maintaining robust cyber hygiene is crucial for protecting personal information and ensuring online safety. Katie Helbling tests Phoebe Wells' knowledge on some cyber practices on the third episode of the ClearanceJobs Gameshow.Test your own knowledge with the questions / answers:What is a common method hackers use to gain access to passwords? PhishingWhat is NOT a type of malware? Freeware What does the term "VPN" stand for, and what is its primary purpose? Virtual Private Network; to secure and privatize your internet connectionWhat is considered the weakest for securing accounts? Using the same password for multiple accountsWhat is the main function of a Firewall in computer security? To monitor and control incoming and outgoing network traffic based on predetermined security rules Here are ten tips to bolster your cyber defenses:Use Strong, Unique Passwords: The foundation of good cyber hygiene starts with strong, unique passwords for each of your accounts. Consider using a passphrase or a password manager to generate and store complex passwords that are difficult to crack.Enable Two-Factor Authentication (2FA): Adding an extra layer of security beyond just a password can significantly reduce the risk of unauthorized access to your accounts. Two-factor authentication requires a second form of verification, such as a text message code or an authentication app, to log in.Regularly Update Software and Systems: Cyber attackers exploit vulnerabilities in outdated software and operating systems. Regular updates help patch these security holes and protect your devices from malware and other cyber threats.Be Wary of Phishing Attempts: Phishing emails or messages attempt to trick you into giving away sensitive information. Be skeptical of unsolicited communications, especially those that request personal data or direct you to a webpage where you need to input your details.Use Secure Networks: Public Wi-Fi networks can be hotspots for cybercriminals to intercept your data. Use a virtual private network (VPN) to encrypt your internet connection and shield your online activities from prying eyes.Backup Your Data: Regularly back up important data to an external drive or cloud storage. In the event of a cyber attack, such as ransomware, you can restore your data from the backup without succumbing to the demands of cyber extortionists.Educate Yourself About Cyber Threats: Awareness is your first line of defense. Stay informed about the latest cyber threats and the best practices for avoiding them.Secure Your Home Network: Change the default username and password on your home router and enable WPA3 encryption to protect your Wi-Fi network from unauthorized access.Limit Personal Information Shared Online: The more information you share online, the easier it is for a cybercriminal to target you. Be mindful about what personal details you post on social media and other websites.Use Antivirus Software: Install reputable antivirus software on your devices to provide real-time protection against malware and other cyber threats. Ensure it's set to update automatically for the best defense.
  • National Security News Reflects Emerging Threats and Job Prospects

    17:57
    National security news encompasses a wide array of topics, all of which are pivotal to the safety and stability of nations around the world. These topics range from cyber threats and espionage to military developments and geopolitical shifts. Given the complexity and interconnectedness of global affairs, national security news often reflects the current state of international relations, highlighting both emerging threats and ongoing efforts to foster peace and security.Here are the top read news headlines last month.
  • Resume Padding and Clearance Investigations

    11:43
    Let's say you've 'padded' your resume with some vanity job titles and additional duties. Will those resume details come up in the course of your clearance investigation. Some security clearance applicants think twice when they realize the clearance verification process may dig up some employment details those don't exactly match.
  • From a Small Town to Living Out a Dream at NASA

    19:55
    Kate Gunderson's childhood was filled with dreams of contributing to humanity's exploration of space, with her eyes always fixed on the sky. Immediately after college, she landed her dream job at NASA's Johnson Space Center. In the Aircraft Operations Division, she offered engineering assistance for Johnson Space Center's extensive fleet of more than 20 aircraft. These aircraft are crucial for astronaut training, scientific missions, and ensuring astronaut safety. As NASA's youngest Flight Science Officer, she flew on two Gulfstream aircraft, participating in airborne science expeditions and supporting astronauts on missions worldwide.She joins the podcast to discuss the steps she took toward living out her dream career, empowering women in STEM, and what’s next for her in the world of security clearances.
  • CMMC and Other FBI Guidance on Cyber Attacks

    20:15
    Part 2 of our podcast with Dr. Gerald Auger who is an Adjunct Professor in the Department of Cyber and Computer Sciences at The Citadel in Charleston and a content creator and founder simplycyber.io. He really he brings Information security related content to help IT or Information Security professionals take their career further, faster. So, being a cybersecurity guru of sorts – he also spent sometime supporting DIB as a contractor.Today we chat about CMMC 2.0, the FBI issuing a alert on Russian threats targeting Ubiquiti routers, the FBI warning that China’s computer attacks are at a greater scale than ever seen before, and how the US healthcare sector is a big target for ransomware attacks.