Tech
How to land your next tech role – six top tips | Computer Weekly
The tech recruitment market has become more challenging for individuals over the last couple of years as economic and wider conditions have changed. Employers have had to deal with an array of issues including rising costs through higher inflation, geopolitical uncertainties, trade tariffs in the US, and increasing employment costs in the UK. As a result, some businesses have reined in on their hiring and in some cases have looked to move more roles offshore. This has led to more tech professionals hunkering down in their present roles – staying put for longer than might normally be the case. With less movement in the market, there are fewer new roles coming through.
However, it is also true that there are definite hotspots and areas of high demand such as software development, big data, and cybersecurity. Across all of these, professionals with proven experience utilising AI are especially sought after.
In short, although conditions have tightened and competition for the best roles is fierce, there are still opportunities out there. So, how can candidates maximise their chances of landing that next tech role? Based on my experience filling a wide range of tech roles at businesses across sectors, here are six key tips.
Specialise – In a tighter market, specialists are in a better place than generalists. Employers are looking for candidates who precisely meet their needs. The more you can build up a set of specialisms – in Azure, for example, or Java coding, or machine learning – the more attractive you will be for certain roles. Specialisation also applies on a sectoral basis. Companies look for individuals with proven experience in their sector. To a bank, for example, someone who is working at another financial institution will instantly be of more interest than someone working in a leisure business or a manufacturer. Build up your practice area and sectoral specialisms.
Build longevity – A career history with a smaller number of longer held roles is more attractive to an employer than someone who has moved around quickly multiple times. Even on the contractor side, employers will look to see whether you’ve had your contract extended and have stayed beyond the minimum term. Lack of longevity in previous roles is in fact one of the most common reasons I’m given by employers when rejecting a candidate. Try not to jump around – think longer term.
Keep your profile updated – It’s really essential to keep your LinkedIn profile (and profiles on other channels) up-to-date. Employers and recruiters will almost always look at your profile after receiving an application, and they often use keyword searches on platforms like LinkedIn too. Make sure your profile includes your key skills, experience and qualifications and think about what keywords someone searching for someone like you would use. It’s a constant source of surprise to me how many candidates don’t keep their information current and updated.
Don’t spam apply – It’s tempting when you really want to find a new role to fire off as many applications as you can. But a ‘spray and pray’ approach really doesn’t work. Most of your applications are almost certainly not going to be proper fits. Find roles that you really are qualified and suited for, and concentrate on those. I sometimes have candidates who apply for every single role I’m trying to fill, tweaking their CV or application each time. This is a major red flag. You can’t be a software developer one day, then a data architect the next. It’s a problem that’s being exacerbated by AI – which I’ll discuss in my next tip.
Make proper use of AI – Without doubt, AI is changing the game. It can be a fantastic support tool to job seekers – helping you find roles, polish your CV to highlight key strengths and areas of fit, and even prepare for interviews by finding key information or anticipating questions you may be asked. However, AI should really be that – a support tool – rather than a substitute for you putting in the effort and thinking yourself. For example, increasing numbers of people seem to be entirely re-writing their CVs with AI – but the result is usually a formulaic document with stilted language and standard layouts that doesn’t impress. It usually stands out a mile and puts most employers/recruiters off. More people are also using AI to help them spam apply for scores of roles, flooding employers and recruiters and simply being counter-productive. Use AI as a targeted productivity tool that helps you improve and sharpen your applications. Also make sure to highlight your experience using AI in your work – this is something increasingly being looked for, especially in roles like coding and software engineering.
Build relationships – Although there is an increasing degree of automation in areas like candidate screening, recruitment remains a people business. Reach out to recruiters, and potentially to internal hiring teams at companies you’re interested in, to establish a relationship where possible. Offer to meet or chat via video/phone. Try to build a rapport. Recruiters are much more likely to put forward or recommend people they have met (and were impressed by) than others where the relationship is only remote. Again, don’t overdo this by spam contacting recruiters asking to meet. Identify the best fits based on advertised roles and try to create a handful of good contacts that might pay off in the future.
Other important points are fairly self-evident: prepare well for interviews and make sure you understand both the role and the company; don’t make unreasonable salary/day rate/benefit demands; if unsuccessful, try to obtain feedback that you can learn from and adjust next time.
Another area I’m often asked about is courses and certifications. Is it worth investing in these? The answer is that it can be essential for some roles such as those specialising in vendor platform technologies like Salesforce or Workday – certifications here are a pre-requisite. Beyond that, however, I would say that they are a nice-to-have which may strengthen your application in some cases – but certifications and courses will always be trumped by real-world experience of a technology or application.
Back yourself
Ultimately, employers are looking for proven experience in a similar role at another organisation in the same or similar industry. That’s quite a long ask-list. But it’s a reflection of how the market is. That doesn’t mean you can’t land that next role you’re dreaming about – but you’ll probably need patience, stamina and commitment to get there. Believe in yourself, take a systematic approach and don’t be put off if you don’t succeed straightaway: talent will eventually rise to the top.
Alexander Reeder is managing consultant at Harvey Nash
Tech
PSNI resorted to pen and paper after issues with ControlWorks command and control software | Computer Weekly
Unexpected problems in the Police Service of Northern Ireland’s (PSNI’s) ControlWorks software led to police having to resort to manual forms to record calls from the public soon after the software’s introduction in 2019, Computer Weekly has learned.
The force has not reported the incidents to the Northern Ireland Policing Board, which oversees the PSNI, and has not mentioned any incidents with ControlWorks in its annual reports.
While there is no legal duty to report failures with ControlWorks to the Northern Ireland Policing Board, the Policing Board has told Computer Weekly it would expect any serious incidents with ControlWorks to be reported to it.
The PSNI uses ControlWorks as part of its command and control system, for managing, logging and categorising calls received by the emergency services from the public and for dispatching police officers to incidents.
Computer Weekly has learned that the PNSI’s ControlWorks system had technical issues after it first went live in May 2019.
These included slow-downs of the system that required computer systems to be restarted or software to be patched.
On some occasions, police were forced to return to using paper forms to record incidents reported by the public after ControlWorks became unavailable. Information on the forms had to be typed back into the system when the service resumed.
ControlWorks aimed to improve response times
The PSNI announced it was using Capita Communications and Control Solutions’ ControlWorks software in 2018, replacing its 20-year-old Capita Atlas Command and Control System, which had reached the end of its life.
From February 2018, ControlWorks was installed across the PSNI’s three regional contact management centres, before going live in May 2019, but is understood to have had a series of issues during its first few months of operation.
Critical incidents, which affect force-wide availability of ControlWorks, are categorised as P1 or P2. Less serious incidents that do not require urgent remediation are categorised as P3 and P4, Computer Weekly has previously reported.
Computer Weekly understands that the PSNI runs a 24-hour help desk to deal with IT issues, and that it has the ability to escalate incidents with ControlWorks to its IT supplier.
Missing persons search
Computer Weekly understands that a “major issue” with ControlWorks may have delayed information being passed to police officers searching for missing teenager Noah Donohoe, who disappeared from his home in Belfast on 21 June 2020.
Donohoe’s disappearance sparked a massive search operation, as police reviewed hours of CCTV, and hundreds of volunteers joined the search for the vulnerable 14-year-old.
Computer Weekly has learned that on the evening of 23 June 2020, police recorded a “major issue” with ControlWorks that could have led to delays in information being passed to investigators.
Computer Weekly further understands that on the evening of 24 June, a member of the public called police to say they had seen an individual attempting to sell Donohoe’s missing laptop.
This potentially critical information was delayed in being brought to the attention of police officers investigating Donohoe’s disappearance because of a problem with ControlWorks, Computer Weekly has been told.
It is unclear exactly how long the information was delayed by and what its impact on the search for the missing teenager was. But it is understood that detectives on the case reported and noted the delay during the investigation.
The issue with ControlWorks was understood to have been reported during the live investigation at a critical time when Donohoe was missing – two days after he had gone missing, and four days before he was found dead in a Belfast storm drain.
Manchester had serious IT issues
Greater Manchester Police experienced problems when it went live with its Integrated Operational Policing System (iOPS), which included ControlWorks, in July 2019. iOps attempted to integrate Capita’s ControlWorks software with Capita’s PoliceWorks record management software used by police officers for managing day-to-day investigations and intelligence records.
An independent review found serious issues with the project. At one point, police were forced to revert to pen and paper for 72 hours while records were migrated to the new system.
“This consumed considerable time and capacity, causing a duplication of work,” the report found. “In addition, some legacy demand, which included ongoing investigations, did not successfully transfer from the old systems, so could no longer be worked on.”
Greater Manchester Police subsequently announced plans to replace PoliceWorks after concluding it could not be adapted or fixed, but it has continued to use ControlWorks.
The PSNI uses a different record management system to Manchester’s troubled PoliceWorks system. The PSNI signed a £9m contract with the Canadian company NicheRMS to deploy its Records Management System, which records information about people, locations, vehicles, incidents and evidence, in 2006.
NicheRMS keeps duplicate records of reports from the public that are recorded on ControlWorks when they are escalated as an “incident”. This means that should data be lost because of problems with ControlWorks, the PSNI would still have access to duplicate records reported by the public on NicheRMS if they have been escalated as an “incident”.
Policing Board seeks clarification from PSNI
The Northern Ireland Policing Board has confirmed that if a major system disruption or significant information or data loss occurred, the board would expect to be informed.
A spokesperson told Computer Weekly that the board’s Resources Committee, which has oversight responsibility for matters including the PSNI’s technology systems, has asked the PSNI for clarification about the issues raised by Computer Weekly.
A coroner’s inquest into the circumstances of Noah Donohoe’s death is due to begin on 19 January.
The PSNI said it would “not comment on investigative matters while legal proceedings are ongoing”.
“With regards to questions relating to ControlWorks, police can confirm that, to date, there has been no instance of major disruption which has led to data loss,” a spokesperson said.
Capita declined to comment.
Tech
Cyber body ISC2 signs on as UK software security ambassador | Computer Weekly
ISC2, the non-profit cyber professional membership association, has joined the UK government’s recently launched Software Security Ambassador Scheme as an expert adviser.
Set up at the beginning of the year by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation and Technology (DSIT), the scheme forms part of a wider £210m commitment by Westminster to remodel approaches to public sector cyber resilience from the ground up, acknowledging that previous approaches to the issue have basically gone nowhere and that previously set targets for resilience are unachievable.
It is designed to incentivise organisations to pay more attention to the security of software products, and supports the wider adoption of the Software Security Code of Practice, a set of voluntary principles defining what secure software looks like.
ISC2 joins a number of tech suppliers, including Cisco, Palo Alto Networks and Sage; consultancies and service providers including Accenture and NCC Group; and financial services firms including Lloyds Banking Group and Santander. Fellow cyber association ISACA is also involved.
“Promoting secure software practices that strengthen the resilience of systems underpinning the economy, public services and national infrastructure is central to ISC2’s mission,” said ISC2’s executive vice-president for advocacy and strategic engagement, Tara Wisniewski.
“The code moves software security beyond narrow compliance and elevates it to a board-level resilience priority. As supply chain attacks continue to grow in scale and impact, a shared baseline is essential and through our global community and expertise, ISC2 is committed to helping professionals build the skills needed to put secure-by-design principles into practice,” she said.
Software vulns a huge barrier to resilience
A study of wider supply chain risks conducted last year by ISC2 found that a little over half of organisations worldwide reported that vulnerabilities in their software suppliers’ products represented the most disruptive cyber security threat to their overall supply chain.
And the World Economic Forum’s (WEF’s) Global Cybersecurity Outlook report, published on 12 January, revealed that third-party and supply chain vulnerabilities were seen as a huge barrier to building cyber resilience by C-suite executives.
A total of 65% of respondents to the WEF’s annual poll flagged such flaws as the greatest challenge their organisation faced on its pathway to resilience, compared to 54% at the beginning of 2025. This outpaced factors such as the evolving threat landscape and emerging AI technology, use of legacy IT systems, regulatory compliance and governance, and cyber skills shortages.
Pressed on the top supply chain cyber risks, respondents were most concerned about their ability to assure the integrity of software and other IT services, ahead of a lack of visibility into their supplier’s supply chains and overdependence on critical third-party suppliers.
The UK’s Code of Practice seeks to answer this challenge by establishing expectations and best practices for tech providers and any other organisations that either develop, sell or buy software products. It covers aspects such as secure design and development, the security of build environments, deployment and ongoing upkeep, and transparent communication with customers and users.
As part of its role as an ambassador, ISC2 will assist in developing and improving the Code of Practice, while championing it by embedding its guiding principles into its own cyber education and professional development services – the organisation boasts 10,000 UK members and associates.
It will also help to drive adoption of the Code of Practice through various awareness campaigns, incorporating it into its certifications, training and guidance, engaging with industry stakeholders and members to encourage implementation, and incorporating its provisions into its work with its own commercial suppliers.
Tech
Asus Made a Split Keyboard for Gamers—and Spared No Expense
The wheel on the left side has options to adjust actuation distance, rapid-trigger sensitivity, and RGB brightness. You can also adjust volume and media playback, and turn it into a scroll wheel. The LED matrix below it is designed to display adjustments to actuation distance but feels a bit awkward: Each 0.1 mm of adjustment fills its own bar, and it only uses the bottom nine bars, so the screen will roll over four times when adjusting (the top three bars, with dots next to them, illuminate to show how many times the screen has rolled over during the adjustment). The saving grace of this is that, when adjusting the actuation distance, you can press down any switch to see a visualization of how far you’re pressing it, then tweak the actuation distance to match.
Alongside all of this, the Falcata (and, by extension, the Falchion) now has an aftermarket switch option: TTC Gold magnetic switches. While this is still only two switches, it’s an improvement over the singular switch option of most Hall effect keyboards.
Split Apart
Photograph: Henri Robbins
The internal assembly of this keyboard is straightforward yet interesting. Instead of a standard tray mount, where the PCB and plate bolt directly into the bottom half of the shell, the Falcata is more comparable to a bottom-mount. The PCB screws into the plate from underneath, and the plate is screwed onto the bottom half of the case along the edges. While the difference between the two mounting methods is minimal, it does improve typing experience by eliminating the “dead zones” caused by a post in the middle of the keyboard, along with slightly isolating typing from the case (which creates fewer vibrations when typing).
The top and bottom halves can easily be split apart by removing the screws on the plate (no breakable plastic clips here!), but on the left half, four cables connect the top and bottom halves of the keyboard, all of which need to be disconnected before fully separating the two sections. Once this is done, the internal silicone sound-dampening can easily be removed. The foam dampening, however, was adhered strongly enough that removing it left chunks of foam stuck to the PCB, making it impossible to readhere without using new adhesive. This wasn’t a huge issue, since the foam could simply be placed into the keyboard, but it is still frustrating to see when most manufacturers have figured this out.
-
Politics1 week agoUK says provided assistance in US-led tanker seizure
-
Entertainment1 week agoDoes new US food pyramid put too much steak on your plate?
-
Entertainment1 week agoWhy did Nick Reiner’s lawyer Alan Jackson withdraw from case?
-
Business1 week agoTrump moves to ban home purchases by institutional investors
-
Sports5 days agoClock is ticking for Frank at Spurs, with dwindling evidence he deserves extra time
-
Sports1 week agoPGA of America CEO steps down after one year to take care of mother and mother-in-law
-
Business1 week agoBulls dominate as KSE-100 breaks past 186,000 mark – SUCH TV
-
Sports6 days ago
Commanders go young, promote David Blough to be offensive coordinator
