Profile

Cover photo
Jeff Snyder
Works at SecurityRecruiter.com
Attended University of Kentucky
Lives in Woodland Park, CO
2,503 followers|377,011 views
AboutPostsPhotosYouTube+1's

Stream

 
Striving To Create Value Every Day
From this
morning's Executive Vice President coaching client:   "My coaching session with you gave me a strategy I didn't previously
have" Jeff Snyder 's, Resume Coach , Career
Coach , Security Recruiter Blog, 719.686.8810
From this morning's Executive Vice President coaching client:   "My coaching session with you gave me a strategy I didn't previously have" Jeff Snyder's, Resume Coach, Career Coach, Security Recruiter Blog, 719.68...
1
Add a comment...
 
 
The root cause of the high-profile #Superfish vulnerability suggests that this problem could be more widespread than it initially seemed http://ow.ly/JNv7W
The root cause of the high-profile Superfish vulnerability suggests that this problem could be more widespread than it initially seemed.
View original post
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
 
We’ve already handled iPhone security here, and with this Slideshow we are going to give you the handle you need to secure your Android phone.
View original post
1
Add a comment...

Jeff Snyder

commented on a post on Blogger.
Shared publicly  - 
 
+Philip Wright Yes, this is a role where the consultant needs to live in Boston.  For the consultant's first assignment, they'll be working at one of my client's well-established accounts for several months before they move on to something new.
1
Add a comment...
 
Cyber Security News, Education and Vulnerability Patch Report for the Week of March 1, 2015
CYBER SECURITY NEWS OF THE WEEK   FROM OUR FRIENDS AT   CITADEL
INFORMATION GROUP Cyber Crime Personal data on 50,000 Uber
drivers exposed in breach: The names and license plate numbers
of about 50,000 Uber drivers were compromised in a security...
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
Hackers Steal Trading Algorithms | Bankinfosecurity.com
Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security
1
Add a comment...
Have him in circles
2,503 people
Trond Hov's profile photo
WC Mediis's profile photo
Stephen McGurk's profile photo
Katherine E. Reimer's profile photo
Rich Melancon's profile photo
Ahmad Yousef (IRIS)'s profile photo
Maddy Andrew's profile photo
Malc Crawford's profile photo
Manolis Sfinarolakis's profile photo
 
They Say That Security Recruiters Don’t Get It
Who Said That ? Who is suggesting that Security
Recruiter s don’t understand what they are doing?   Numerous comments I’ve recently read on-line
from security professionals suggest that they have run into highly
inexperienced, check box minded recruiters wh...
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
In the early days of our invasions of Iraq and Afghanistan, one of the more serious issues our military confronted was the Improvised Explosive Device, the roadside or suicide-borne bomb that inflicted heavy casualties on our troops. The Pentagon spent considerable resources trying to figure out how to get "Left of Boom," the expression that combined proactive measures with advanced timelines to getting out in front of and defeating the threat be...
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
In the early days of our invasions of Iraq and Afghanistan, one of the more serious issues our military confronted was the Improvised Explosive Device, the roadside or suicide-borne bomb that inflicted heavy casualties on our troops. The Pentagon spent considerable resources trying to figure out how to get "Left of Boom," the expression that combined proactive measures with advanced timelines to getting out in front of and defeating the threat be...
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
I Dare You To Work With Me On Monday March 2, 2015
1
Add a comment...

Jeff Snyder

Shared publicly  - 
 
Cellphone, Internet, and telephone services across half of Arizona went dark on Wednesday after vandals sliced a sensitive fiber optic cable, according to those familiar with the situation. The incide
1
Add a comment...
Story
Tagline
Executive Security Recruiter, Executive Career Coach, Executive Leadership Coach
Introduction

President of SecurityRecruiter.com.  An executive search firm specialized in information security recruiting, cyber security recruiting, corporate security recruiting, physical security recruiting, converged security recruiting, IT risk management recruiting, enterprise risk management, global compliance recruiting, global privacy recruiting and business intelligence recruiting.

Through SecurityJobCoach.com, we provide security resume writing services, LinkedIn profile optimization services, interview coaching, career transition coaching and more.

Through SecurityCareerCoach.com, we provide career coaching clarity to help our clients determine how to find the work they should be doing versus continuing to settle for work they can do.

719.686.8810
 
I'm a Certified Executive Coach from the Executive Coaching University and I hold a Certificate of Initial Mastery in Stakeholder Centered Coaching from the Marshall Goldsmith Group.
 
SecurityRecruiter.com has Security Jobs, Information Security Jobs, Cyber Security Jobs, Corporate Security Jobs, Physical Security Jobs, Compliance Jobs, Risk Management Jobs, Privacy Jobs and provides Professional Security Resume Writing Services.

My clients include Fortune 500 clients crossing many different different industry boundaries including but not limited to Banking, Financial Services, Hospitality, Gaming, Insurance, eCommerce, Oil & Gas, Retail, Entertainment, Media, Software, Consumer Products, Hospitality, Mining, Security Consulting, Telecommunications and more.

My Security Recruiter Blog is home to information that security, risk, compliance, governance and privacy professionals need to grow their security careers and is updated weekly.

My recent public speaking activities include:

  • CISO Forum and ISSA of Los Angeles
  • North Texas ISACA in Dallas, TX
  • Information Security Leadership Forum, Dallas, TX
  • ISSA in Denver, CO
  • National CISO Forum of ISSA in Las Vegas
  • ISSA in Colorado Springs
  • EVANTA in Phoenix
  • A private training session to train computer sales people in Denver to leverage LinkedIn to drive their sales business opportunities.
  • I speak on leadership, career and overcoming adversity topics.

Testimonials of my work are found on the Security Recruiting Testimonials page of SecurityRecruiter.com.

I have a rather large and growing LinkedIn network with over 29,000 direct connections.  

Bragging rights
Started playing ice hockey at age 43. Popped up on a wake board on my first try! Nobody in the boat could believe it. Avid skier, mountain biker, hiker, fly fisherman, enjoy snow shoeing, play tennis, play volleyball, play softball and more. Dove into public speaking with no prior training at the age of 44.
Work
Occupation
Executive Security Recruiter, Security Career Coach, Security Leadership Coach
Skills
Executive Search, Career Coaching, Executive Coaching, Job Coaching, Resume Writing, Leadership Coaching, Security Recruiting, Security Recruiter
Employment
  • SecurityRecruiter.com
    Executive Security Recruiter, 1994 - present
    Executive search for information security, cyber security, corporate security, IT risk management, enterprise risk management, global compliance, global privacy, business intelligence and more. Certified Executive Career Coach helping to bring clarity to my client's career direction and career choices.
  • Bradford & Galt, Inc.
    1990 - 1994
    Information Technology recruiter in the St. Louis market.
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Woodland Park, CO
Contact Information
Work
Phone
719 686 8810
Email
Jeff Snyder's +1's are the things they like, agree with, or want to recommend.
How the NSA's Firmware Hacking Works and Why It's So Unsettling | WIRED
www.wired.com

One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or re

Secretly swiped: Your account numbers taken out of thin air |
abc7chicago.com

Diane Umansky of Consumer Reports explains how people can avoid spending so much money on their trip to the dentist.

New iOS spyware steals pictures, data, and more even from non-jailbroken...
www.pcworld.com

Spyware from a pro-Russian group is targeting iPhones, whether they're jailbroken or not, says Trend Micro

The Industrial Internet could add $14 trillion to global economy by 2030...
siliconangle.com

The world's economy could miss out on a massive $14 trillion potential windfall from the Industrial Internet, due to a lack of understanding

Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cybe...
blog.executivebiz.com

A new level of public-private collaboration is needed to implement data sharing, incident response and detection strategies to prevent futur

Small business security: size is not an issue for cybercriminals - McAfee
blogs.mcafee.com

For many small business owners and employees, security is an aspect of the company’s organisation that they are in the dark about. However,

First Retailers, Now Garages: How Point of Sale Malware is Evolving and ...
blogs.mcafee.com

Earlier this year I wrote about our summer of discontent with retailers, point-of-sale systems and hackers. Well, that summer has quickly be

Ready, set, shop: 10 top tips for a safe shopping season
www.welivesecurity.com

Tips for safe holiday shopping are something we've talked about in years past, but they are worth repeating as the 2014 holiday shopping sea

Servicing the Internet of Things and the New Digital Economy
government.blogs.xerox.com

By Chuck Brooks, Vice President and Client Executive, Department of Homeland Security We are emerging into a digital era comprised of more t