A place for our blogs and content

Hire without biasAdviser Jack - 1/21/2022
Unconscious bias isn’t something a business can address overnight by passing a mandate. Even after rectifying the issues that need to be taken to improve the hiring process and income more diverse talent, recruiter bias may detail efforts and prevent the company from finding the best and brightest talent.
How to make a resumeAdviser Jack - 1/18/2022
If you are pursuing a role, or attempting to advance in your career, in information security or software development then being able to demonstrate capability is essential for landing a dream role.

Hacker News Round-up (20/12/21)Adviser Jack - 12/21/2021
The top stories in the space of cyber security

Certs for progressing your pen testing careerAdviser Jack - 12/3/2021
This pen testing focused blog will be the first in a series of posts where I will break down infosec roles and walk through the certifications hiring managers are looking for at each phase of your career.

Earn rewards by referring Upward SpiralAdviser Jack - 11/19/2021
Recommend Upward Spiral to your network, and we’ll reward you for the new users.

Companies: How do Upward spiral vet candidates?Adviser Jack - 11/16/2021
If we are unsure, we require a candidate to complete a skill assessment or other relevant screening test, and then we review them based on their results and their profile together.
What does Upward Spiral do exactly?Adviser Jack - 11/16/2021
Upward Spiral helps information security candidates find amazing jobs.

Companies: Does Upward Spiral do background checks?Adviser Jack - 11/16/2021
Employers are responsible for performing due diligence on all candidates.

Cyber Security Analyst JobsAdviser Jack - 11/16/2021
From 2013 to 2021, the number of unfilled cybersecurity positions grew by a whopping 350%. It would be crazy to expect the demand for cyber security analysts to fall any time soon...

Malware analyst jobsAdviser Jack - 11/13/2021
This role is part security engineer, part programmer, and part digital forensics and is a crucial function in providing necessary intelligence after a cyber security incident.