Training to Experie...
 
Notifications
Clear all

Training to Experience Ratio ... Too much a bad thing?

6 Posts
3 Users
0 Likes
404 Views
(@pa_cybercop)
Posts: 9
Active Member
Topic starter
 

I've been doing some thinking about this while looking for a masters program and could use some input; preferably from people who have the ability to make hiring decisions here in the US (UK is probably the same, so feel free to post up)

Presently, I've been a police officer for the past fourteen years and have been responsible for all computer related crimes for the past four. However, in my area this has consisted almost entirely of internet related fraud, threats, etc… very little actual data recovery. My goal is to enter the CF field on a full-time basis and I have been working to accomplish just that. The thing that I don’t want is to train myself into a situation where that may be perceived as a negative. I would appreciate it if anyone currently involved in CF (hiring responsibilities preferred) could take a look at my training/experience and give me a critique.

LAW ENFORCEMENT RELATED
-14 years LE experience, full patrol/investigations short of major crimes (ie large narcotics, rapes, murders, etc.)
-4 years computer crimes (mostly internet crimes)
-5 years supervision experience (7 employees)
-Numerous schools and/or other training, including Interview and Interrogation, Written Statement Analysis, Drug Pharmacology, and several instructor level courses (firearms/impact munitions/taser)
-Formally recognized for exceptional service
-Terrorism Training for Law Enfocement - U.S.DoJ
-Emergency Response to Terrorism

COMPUTER FORENCICS RELATED
-Certified Forensic Computer Examiner (CFCE)
-Advanced Forensics - EnCase
-Advanced File Structure Analysis
-Cell Phone Forensics
-Data Retrieval and Analysis - National White Collar Crime Center
-B.S. in Information Systems
*M.Eng. Systems Design and Engineering (top 20 engineering schools in US) <— this is planned to start in the fall.

I'm probably leaving a lot out, but from the above you can probably see my point. I was planning to try to get in with one of the major defense contractors here (ie Lockheed, Boeing, General Dynamics) or to stay in LE and move to the federal level. I think what I really need to round it out is to obtain a security clearance, but I just don't have the justifiable need to be able to apply for one (that, or a lack of knowing someone in the right place). Anyway, any info would be appreciated.

Thanks,

Mike

 
Posted : 11/05/2007 12:35 pm
 ddow
(@ddow)
Posts: 278
Reputable Member
 

I can adress the DoD work a bit and will hope others will have other thoughts. Yes, lack of a clearance is a problem and your right, you can't just apply for one even if you could afford it. Your integrity would be seen as a positive and so you would be seen as "worth taking a chance on" if you can to the final interview stage.

If I were you, I'd start applying for jobs that look good. If possible, interview the hiring manager to see what you could have done to improve your chances, shy of the clearance.

I would also look at getting the Security+, or CISSP. Yes, I know, doesn't directly support forensics but many DoD contractors have requirements to under DoDI 8570 to get information security folks certified. Either of those certs would be seen as a positive.

A lot of hiring in the contractor world is still based on references. If there's an ISSA chapter near you, I'd join. The ISSA attracts the very folks you want to network with. With your LE background you'd be a rare commodity and they would like to get to know you. Plus you can pass it off to your supervisor as community relations so you SHOULD get support from there too.

As to the clearance, a move to the federal level might give you that. It wold depend on the billet but I'm sure you realize you'd be seen as valuable.

 
Posted : 11/05/2007 9:25 pm
(@pa_cybercop)
Posts: 9
Active Member
Topic starter
 

Thanks for your reply… just took your advice and joined the local ISSA chapter. Let the networking begin)

One quick question for you as your already involved with the DoD… How important do you think it is for me to know the general security standards prior to obtaining employment? NISPOM, NISPOM overprint, JAFAN, DCID… I've been reviewing them, but not to the level that I could claim a "working knowledge of".

Thanks again,

Mike

 
Posted : 11/05/2007 10:37 pm
keydet89
(@keydet89)
Posts: 3568
Famed Member
 

Mike,

I sent you a PM…

Harlan

 
Posted : 12/05/2007 12:29 am
 ddow
(@ddow)
Posts: 278
Reputable Member
 

Mike,

The working knowledge comes from working with it. For any contractor work the element that will kill you is the lingo. Government contractors have their own set as well and that'll be the oddest thing to pick up. If you have the lingo, you're half way there. That and some common sense will do wonders.

I often pick up a new acronym or term at an ISSA meeting and have been in It for 25 years. Always something new. The incident response side is even worse for "new stuff", as Harlan can attest.

 
Posted : 12/05/2007 6:31 am
(@pa_cybercop)
Posts: 9
Active Member
Topic starter
 

Thanks,

I was thinking more along the lines of my learning the standards and procedures inside and out and was not implying that I would claim to have worked with it before.

Sent you a PM

Mike

 
Posted : 12/05/2007 7:08 am
Share: