Wednesday, November 25, 2015

I would be honored to Be Your Personal Coach

I Am Unique and Special
I am something and I have value.  Therefore my time, energy, expertise, training and entrepreneurial risk taking is worth something.  I have references and references and more references from people who have achieved results with my help as their coach.

You Are Unique and Special…capable of producing Greatness
You are somebody.  You are unique and special.  You were created to become Great at something.  I can show you what that means and how to achieve Greatness.  

You should invest in yourself from time-to-time and not expect employers to take you to the next level.  Assign yourself value and live up to the assignment you gave yourself with proper care and feeding.

Famous People Have Spoken
Tony Robbins suggests that it takes “Massive Action” to create change.
One of my mentors, Dr. Marshall Goldsmith suggests that achieving change in human behavior is one of the most difficult things for a human being to do.

What do You Need to Accomplish or Change?Change is difficult.  It is tough to face and even harder to create.  You didn’t get to where you are overnight and you won’t get out of that situation overnight. If you're stuck, you didn't get stuck yesterday.  

I have coaching clients who have sucked up their egos, eaten a slice of humble pie and taken the dive.  They put their trust in me.  They wanted to change, they wanted to achieve and they wanted to make their future better than their past.  

I Charge Fees
I charge fees for my services because they’re backed by experience, education, training, certification and lots of entrepreneurial risk that you probably haven’t acquired or taken.  I’m not here to out-do you. I’ll meet you in the middle and I'll give you the best of everything I have to give.

Invest In Yourself
You should invest in yourself when you need help because you are unique, one of a kind, worth a lot more than you probably think you are and you won’t get to where you want to go without some work and investment.

Thank you for reading.

Jeff Snyder
Jeff Snyder Coaching719.686.8810

The History of Jeff Snyder's Resume Writing Services…Coaching Security towards a Profession

The Opinion

I’ll make this quick but I seriously want to make a point.  I just ran into a conflict with a CISO who suggested that my prices were too high.  While he’s entitled to his opinion, so am I.  

I think the CISO’s thought process is small and he isn’t thinking like a business executive. 
CISOs should walk, talk and act like business executives.

I won’t do anything to identify this person but I have to guess that he is making 6 figures.

It Started In 2008

In 2008, I created resume writing services at $599.00.  If you do homework, you’ll find that there are many services out there above $599.00 and they’re not worth a fraction of my services.  I have results to prove my statement and loads of references to back up my statement.

The $259.00 Solution

Two years ago, I figured out a way to adjust my resume writing service so it could be delivered at a lower price point of $259.00.  This service is priced to serve more people and it has been extremely successful all around the globe.

Maybe you don’t need this service right now.  Maybe you’ll never need this service. I respect that.

If you ever do look for a resume writing coach, do yourself a favor and don’t be penny wise and pound foolish when you make your decision.  I’ve helped many people who have hired “professional resume writers” to write their resumes but they didn’t get results.  After they’ve worked with me, they’ve gotten results.  

if you ever hire me, you're making an in yourself.  I take that seriously.  I deliver results.

What to Look For in a Resume Coach

  • A coach who has experience in your field of work and doesn’t try to make you adapt to only what they understand
  • A coach who has done homework with your customer to determine what your customer wants to see on a resume
  • A coach who has a proprietary methodology built from the ground up based on what the customer asked for
  • A coach who delivers results and has references
  • A coach who will give your money back if you are not satisfied
  • A coach who isn’t stuck in their 1900s way of thinking
  • A coach who is always looking for ways to improve their service for the good of their clients
  • A coach who is gifted to coach and has a track record of results

This kind of coach by the way should be charging far more than $259.00 or eve $599.00.  The coach who matches the description above is trying to serve as many people possible to push the security skill set to a point where it is considered a security profession.

Monday, November 23, 2015

Can You Explain What I’ll Get from Your 1 Hour Resume Coaching Service?

This question recently came to me from someone who was consider hiring a coach to help them with their resume.
Can You Explain What I’ll Get from Your 1 Hour Resume Coaching Service?

Yes I can.  I have been assisting all kinds of people with resumes since 1990 when I started in the recruiting business.  In 2008, after seeing tens of thousands of resumes for 18 years, I decided to turn what I had been doing on a pro-bono basis into part of my business.

When Writing Isn't Your Gift

I started out with a service that I still occasionally deliver.  That service is what I call my Full Resume Writing Service found on  This service is for a client who comes to me and tells me that writing just isn’t their gift.  In this case, I teach my client how to do what they need to do and I also stick with this client until their resume is complete.  I become their editor.

The Wall Street "C" Level Executive

A few years ago, a “C” level executive on Wall Street came to me and told me that he was totally comfortable with his writing skills. He had an English undergraduate degree.  He told me that he had been following my articles and blogs for quite a while and that he was convinced that I was sitting on some kind of “secret sauce” as he called it. 

The "Secret Sauce"

He asked me if he could pay me for an hour of my time in exchange for me exposing him to my “secret sauce”.  I agreed to do this and at the end of the 1 hour phone call, my client was completely satisfied and I was energized.  This experience prompted me to turn this 1 hour phone call into what I now refer to as my 1 Hour Resume Coaching service.

1 Hour Resume Coaching

This one hour call is built around a sample resume from my portfolio or 20 or so sample resumes.  I use the sample resume in order to teach my client how to build their resume following the same game-changing methodology that was used to build the sample resume.

When I say game changing, I’m suggesting that my resume clients all around the globe have opened interview doors with their new resumes where in many cases, their old resume wasn’t leading them to desired result.

When I’m working with a client who is teachable and coachable, in one hour, I have figured out how to transfer over 25 years of my experience combined with the research I did in 2008 to build my proprietary resume writing methodology to my client’s mind.  This means that after 1 hour, my client can build their new resume based on the methodology that has been producing results around the globe since 2008.

The Methodology

While this methodology of mine was originally built for technology professionals, I have recently coached people across a half dozen skill domains and they’ve all had success when applying my methodology to their resume. My methodology came together from information I obtained from an audience of people who commonly make decisions based on resumes. Then I mixed in my own experience and the result was a resume building approach that is based entirely on the audience of people who will receive one of my client’s resumes.

My proprietary resume writing methodology is built on the following foundational ideas:

  • A resume should be built to play nicely with Applicant Tracking Systems (ATS)
  • It should be possible to visually scan a resume in 10-15 seconds in order to process a decision
  • A resume should strategically communicate what the resume owner is great at during the 10-15 second visual scan
  • A resume should be built in bite sized pieces to accommodate the way human beings have been conditioned to receive information in the 21st century
  • A resume must be clean, clear and logically written based on the way resume reviewers logically look for information in order to process a decision.
  • A resume should communicate Accomplishments, Contributions and the Value that matters to the business
  • A resume should be mobile friendly
  • A resume should never require someone in the resume’s audience to have to interpret what they see in the resume


Finally, most resumes require a mix of business writing, technical writing and a little bit of strategically leveraged creative writing.  Writing in this manner is a gift that not everybody possesses. It is for these reasons that I created my 1 Hour Resume Coaching service. 

There is nothing I enjoy more than when I get to help my clients win! This service represents one of the many ways in which I get to help my clients to win.

Why You Should Hire Jeff Snyder As Your Personal Coach

“While you might hire a personal trainer for strengths coaching in the gym, you need to look no further than Jeff Snyder if you need a coach that can enlighten and stretch your mind.  I would go so far as to say that Jeff’s approach to Strengths Coaching and Emotional Intelligence Coaching makes him a trainer for the mind. 

He finds the right balance between listening to my needs and ideas and sharing what’s on his mind.  He has helped me with my “Personal Branding” as he calls it.  He taught me how to build a resume that has not only resulted in me getting interviews but the process that Jeff walked me through also built my personal confidence.  He then showed me how to build my LinkedIn profile so recruiters just like him can now more easily find me among the 400,000 people who are now part of the LinkedIn network.

In addition to Jeff’s formal training and certification to coach, his unique personal strengths, his life experience, his business experience, sports experience, entrepreneurial risk-taking experience and overcoming big-time adversity experience produces what seems like a never-ending well of ideas and perspectives that has helped me more than I can put into words.  If you need help to move your career forward or if you need help to determine whether or not to start your own business, call Jeff and let him coach you.”   

Operations Executive

Sunday, November 22, 2015

Cybersecurity Vulnerability and Patch Report for the Week of November 22, 2015




Important Security Updates

Avira Free Antivirus: Avira has released version of its free Antivirus. Updates are available from Avira’s website.
Evernote: Evernote has released version Updates are available on Evernote’s website.
Opera: Opera has released version 33.0.1990.115 of its browser. Updates are available from Opera’s website.
Skype: Skype has released Skype Updates are available from the program or Skype’s website.

Current Software Versions

Adobe Flash [Windows 7: IE, Firefox, Mozilla]
Adobe Flash [Windows 8: IE]
Adobe Flash [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader DC 2015.009.20069
Dropbox 3.10.11 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]
Firefox 42.0
Google Chrome 46.0.2490.86
Internet Explorer 11.0.9600.18059
Java SE 8 Update 66 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Safari 9.1 [Mac OS X Mavericks, Yosemite, El Capitan]

Newly Announced Unpatched Vulnerabilities


For Your IT Department

Cisco Multiple Products: Cisco reports patched vulnerabilities in its Prime Collaboration Assurance. Apply updates. Cisco also reports unpatched vulnerabilities in its Firepower 9000 Series Switches, Cisco Networking Services (CNS), FireSIGHT Management Center, and Cisco TelePresence Video Communication Server (VCS). Workarounds may be available. Additional details are available on Cisco’s website.
VMware Multiple Products: VMware reports patched vulnerabilities in VMware vCenter Server, vCloud Director, and Horizon View. Apply updates. Additional details are available on VMware’s website.
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2015 Citadel Information Group. All rights reserved.

Cybersecurity News and Education for the Week of November 22, 2015





Cyber Crime

Starwood Hotels Warns of Credit Card Breach: Starwood Hotels & Resorts Worldwide today warned that malware designed to help cyber thieves steal credit and debit card data was found on point-of-sale cash registers at some of the company’s hotels in North America. The disclosure makes Starwood just the latest in a recent string of hotel chains to acknowledge credit card breach investigations, and comes days after the company announced its acquisition by Marriott International. KrebsOnSecurity, November 20, 2015

Cyber Privacy

Chipotle Serves Up Chips, Guac & HR Email: The restaurant chain Chipotle Mexican Grill seems pretty good at churning out huge numbers of huge burritos, but the company may need to revisit some basic corporate cybersecurity concepts. For starters, Chipotle’s human resources department has been replying to new job applicants using the domain “” — a Web site name that the company has never owned or controlled. KrebsOnSecurity, November 16, 2015

Identity Theft

Report: Everyone Should Get a Security Freeze: This author has frequently urged readers to place a security freeze on their credit files as a means of proactively preventing identity theft. Now, a major consumer advocacy group is recommending the same: The U.S. Public Interest Research Group (US-PIRG) recently issued a call for all consumers to request credit file freezes before becoming victims of ID theft. KrebsOnSecurity, November 18, 2015
GAO: Taxpayer Data at Increased Risk: A government audit of Internal Revenue Service financial statements reveals deficiencies in internal information security controls, including missing security updates, insufficient audit trails and monitoring for certain key systems, and the use of weak passwords. GovInfoSecurity, November 16, 2015

Cyber Warning

​Dyre banking malware: Windows 10 and Edge browser now targets: Microsoft confirms the nasty, credential-stealing malware Dyre has been updated to target Windows 10 and its Edge browser. ZDNet, November 19, 2015
BitLocker encryption can be defeated with trivial Windows authentication bypass: Companies relying on Microsoft BitLocker to encrypt the drives of their employees’ computers should install the latest Windows patches immediately. A researcher disclosed a trivial Windows authentication bypass, fixed earlier this week, that puts data on BitLocker-encrypted drives at risk. PCWorld, November 13, 2015

Cyber Security Management

Poor org structure led to weak info security at State: An audit of the State Department’s information security posture found critical deficiencies in the agency’s risk management framework and monitoring programs, stemming largely from a problematic organizational structure. FederalTimes, November 20, 2015
Cybersecurity Sector’s Biggest Challenge (It’s Not The Hackers): The security certification and industry body (ISC)2 predicts that 6 million security professionals will be needed by both the public and private sectors by 2019. Unfortunately, only 4.5 million of those experts will have the necessary qualifications, The Financial Times reported Wednesday (Nov. 18)., November 20, 2015
The State of Cyber Insurance: All this year I’ve been researching the burgeoning cyber insurance market. Admittedly, this is a bit of a detour from covering endpoint security, network security, and security analytics, but cyber insurance is becoming an increasingly important puzzle piece in any organization’s risk mitigation strategy, so it’s worth paying attention to. NetworkWorld, November 16, 2015

Cyber Security Management – Cyber Defense

LinkedIn patches serious persistent XSS vulnerability: A persistent cross-site scripting (XSS) vulnerability impacting recruitment network LinkedIn has been fixed within hours of being reported. ZDNet, November 20, 2015
Recent Email Phishing Campaigns – Mitigation and Response Recommendations: Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing campaigns targeting U.S. Government agencies and private sector organizations. This alert provides general and phishing-specific mitigation strategies and countermeasures. US-Cert, August 1, 2015

Cyber Security Management – Cyber Update

VMware warns of info leaks flowing from Apache-Adobe mess: VMware has warned users of its vCenter, vCloud Director and Horizon products that they need to patch a flaw in Flex BlazeDS. TheRegister, November 19, 2015

National Cyber Security

Homeland Security Running Hundreds of Sensitive, Top Secret Databases Vulnerable to Attacks: The Department of Homeland Security is running hundreds of sensitive and top secret databases without the proper authorization, leaving the agency unsure if it can “protect sensitive information” from cyber attacks. FreeBeacon, November 19, 2015
ISIS’ OPSEC Manual Reveals How It Handles Cybersecurity: IN THE WAKE of the Paris attacks, US government officials have been vocal in their condemnation of encryption, suggesting that US companies like Apple and Google have blood on their hands for refusing to give intelligence and law enforcement agencies backdoors to unlock customer phones and decrypt protected communications. But news reports of the Paris attacks have revealed that at least some of the time, the terrorists behind the attacks didn’t bother to use encryption while communicating, allowing authorities to intercept and read their messages. Wired, November 19, 2015
Anonymous’s Cyber War with ISIS Could Compromise Terrorism Intelligence: As French police scoured Paris and surrounding areas in search of those responsible for Friday’s terrorist attacks on the French capital, a group of cyber activists took aim at the Islamic State’s online presence. The computer-hacker federation known as Anonymous claims to have disabled at least 5,500 pro-ISIS Twitter accounts and exposed thousands of the terror group’s supporters who use the social media site. ScientificAmericam, Novemeber 19, 2015
Telegram encrypted messaging service cracks down on ISIS broadcasts: In the wake of revelations that groups affiliated with the Islamic State were using the Telegram messaging service to communicate and spread propaganda materials, the nonprofit organization running the service announced that it had moved to block terror-related content from being spread through its servers. ars technica, November 18, 2015
Paris Terror Attacks Stoke Encryption Debate: U.S. state and federal law enforcement officials appear poised to tap into public concern over the terror attacks in France last week to garner support for proposals that would fundamentally weaken the security of encryption technology used by U.S. corporations and citizens. Here’s a closer look at what’s going on, and why readers should be tuned in and asking questions. KrebsOnSecurity, November 17, 2015
Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks: WASHINGTON — American and French officials say there is still no definitive evidence to back up their presumption that the terrorists who massacred 129 people in Paris used new, difficult-to-crack encryption technologies to organize the plot. The New York Times, November 16, 2015

Cyber Underworld

Exploit Kit Explosion Will Keep Victims Off Kilter: Exploit kit activity is on a massive upswing as figures from a new report out today from Infoblox and IID show that the command and control infrastructure behind these kits mushroomed last quarter. DarkReading, November 18, 2015

Cyber Law

Steptoe Cyberlaw Podcast, Episode #89: An Interview with Mark Shuttleworth: The NSA metadata program that is set to expire in two weeks was designed to provide early warning of a terror attack planned in a foreign safe haven and carried out inside the United States. Those are some of the most deadly terror attacks we’ve seen, from 9/11 to Mumbai. And now Paris. Lawfare, November 18, 2015
Steptoe Cyberlaw Podcast, Episode #88: An Interview with Adam Kozy and Johannes Gilger. Where the hell are the FTC, Silicon Valley, and CDT when human rights and privacy are on the line? If the United States announced that it had been installing malware on 2% of all the laptops that crossed US borders, the lawsuits would be flying thick and fast, and every company in Silicon Valley would be rolling out technical measures to defeat the intrusion. But when China injects malware into 2% of all the computers whose queries cross into Chinese territory, no one says boo. Lawfare, November 12, 2015

Cyber Insurance

CNA Denies Cyber Insurance Claim: Cyber security, and cyber insurance, have dominated the industry headlines for several years now, but even as companies, brokers and insurers work to develop these products, there has been a dearth of case law interpreting key provisions. This is beginning to change as disputes arise and make through way through the judicial system. Privacy & Security Matters, May 19, 2015

Cyber Sunshine

Cyber thief who stole nude images for revenge porn king gets 2 years: $250 for nude images stolen from “6 guys and 6 girls”: that’s the kind of fee that Charles “Gary” Evens charged revenge porn king Hunter Moore. NakedSecurity, November 18, 2015's Security Recruiter Blog