Career Advice Tuesday – “Flooded By LinkedIN”

June 12, 2012

Dear Infosecleaders:

A few weeks back,  I was informed by my manager that my company was looking for an information security engineer to help us round out our team.   In a team meeting, my peers and I were asked if we would be willing to recommend someone for the role.   During the meeting, we were asked if we could publicize this opening to our professional networks, specifically LinkedIN.

As a good employee and team player I have done this, and posted the position to both my networks and the LinkedIN groups where this type of role would be suitable.   My initial thought was that this would be quite easy, as my positing would net a couple of qualified folks, and the hiring process would be smooth.

This has not been the case.  In fact it has been a nightmare.

Since positing the role, I have received over 70 inquiries about the position.  This has included many people who are either not qualified for the role, do not live anywhere near the position’s location, have greatly surpassed this type of position, and some whom I know well enough to know that I would not want to work with  them.    The responses have included resumes being sent to my personal address, phone calls off hours, and other intrusions that really lay outside the context of my role.  I simply do not have time to respond to all of these people, am unsure of the proper etiquette and I feel that in doing so, I may damage some of my relationships

I wanted to raise this point out to the Infosecleaders community and wanted to see if you had any advice for me – to help relieve me from the burden of my current situation.

Regards,

Noah

 

Dear Noah:

You are witnessing first hand that it is not that there are a lot of personal obligations that go along with engaging your network, especially in the context of recruiting.

Let me give you two pieces of advice that may help you alleviate your current pain:

1)   The first is to change the LinkedIN posting or take it down.   If you decide to take it down, make sure you speak with your manager, and let them know why you are doing so, and the problem this has caused you.   If you do decide to keep it up, what I want you to do is to attach a line to the bottom of the positing that states:

“PLEASE DO NOT CONTACT ME DIRECTLY.  AS PER CORPORATE POLICY I AM NOT AT LIBERTY TO PROVIDE ANY ADDITIONAL INFORMATION ABOUT THIS OPPORTUNITY BEYOND THE POSTING.  PLEASE ADDRESS ALL INQUIRIES TO-  (ENTER YOUR HR BUSINESS PARTNER’S EMAIL ADDRESS)” 

Something like this should help you draw some clear guidelines and remove you from the communication loop.

2)   What I would do would be to collect the e-mail addresses of all 70 folks that have responded to this posting and write an e-mail with a confidential distribution list that states the following – (please make sure that the distribution list is confidential)

Thank you all for your response to my posting.  I have sent all of your responses to our human resources representative who is responsible for the recruitment process for this position.   Your credentials will be reviewed by the hiring manager (which is not me!) and if there is interest, you will be contacted to engage in our interview process.   I wish you all well in your pursuit of this opportunity.  As you progress deeper in the interview process, I would be happy to share with you my personal experiences as an employee of _______________________ and as a member of the Information Security team.

Hopefully this advice will alleviate this burden and help you return your focus to your role as an information security professional and your recruitment career will be a brief one!

Hope this helps,

Lee Kushner

Posted by lee | Filed Under Advice, Behavior, Career Advice Tuesday, Interviewing, Recruiting, Security Industry, Social Media 

Comments

One Response to “Career Advice Tuesday – “Flooded By LinkedIN””

  1. Career Advice Tuesday – “Flooded By LinkedIN” : Information …SMLRT on June 12th, 2012 12:23 pm

    [...] to Original Content From By lee: read moreInformation Security Leaders read more [...]