Did the consultant actually work in a defined role within the client organization performing security management tasks that map to one or more of the five Job Task areas?
Additionally, the nature of the consulting role in any of the above three scenarios would need to map to one or more of the five job task areas. An affirmative answer to one or more of these three questions and mapping to one or more job task areas is a good indication that the experience will qualify for information security management. In summary, a review of the consultative work performed assessed by the qualifying questions and compared to the job task areas and their related task statements is the proper way to determine if consultative work should be counted. As a final point, time should be considered as well. As consultants may have well worked on many different projects at one time, the candidate should ensure that the for the time period submitted, the majority of their time was actually dedicated to management level security consulting.
Related Questions
- Did the consultant actually work in a defined role within the client organization performing security management tasks that map to one or more of the five Job Task areas?
- Im a security consultant who performs telephone audits of client sites, and I understand that PhoneSweep can do that. How else could I use PhoneSweep?
- When Green Investment Management, Inc. is hired to manage an account, who actually has the client’s money?