Iteration 2 (career exploration} this iteration is to explore the career that you are focusing on(as
Fantastic news! We've Found the answer you've been seeking!
Question:
Iteration 2 – (career exploration} this iteration is to explore the career that you are focusing on(as a security auditor) for example explore the role of a security auditor, what are the roles ,companies , research career types, research industries,research geographic locations, understand career requirements} Hypothetical example - one on one interview sessions The Plan would address the - who, what, where, when, why, and how regarding all three of the divisions. Since you would be interviewing three different division representatives, you would create one plan, but have three actions, three observations and possibly three reflections (or one reflection that addresses thoughts about each of the interviews). So it may look like: Plan The plan may include a one page description of the division representatives (may want to include specific influence), anticipated questions or dialogue, as well as justification why along with the meeting schedule (where, when, how long) Action The action section could include a page detailing the interview of each representative (e.g., one page with the interview of the Operations representative, one page of the interview with the Data/Telecom representative, and one page with the interview of the HR representative) Observation The observation section could include a page detailing the interview of each representative (e.g., one page with the interview outcomes from the Operations representative, one page with the interview outcomes from the Data/Telecom representative, and one page with the interview outcomes from the HR representative) Reflection The reflection section should include your perspective of all three meetings: • Examine what went well • Examine what did not go well • Explain what actions/processes could be improved • Provide a self-critique yourself as well as the processes you are applying • Provide a critique of processes you applied during the iteration • Identify any restrictions, limitations, and risks associated with the iteration and task accomplishment
Related Book For
Management of Information Security
ISBN: 978-1285062297
4th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date: