Credit Union Jobs

3 Most Wanted Credit Union Jobs

Credit Union Jobs

Credit Unions have changed their strategies and landscape over the last decade. As I recruit for financial institutions, I’m discussing the hiring pain points of many hiring managers in today’s tight market. These are the top three credit union jobs my clients are in need of in this candidate-driven market.

Loan Officers

According to the Bureau of Labor Statistics, employment for Loan Officers is expected to grow 11 percent from 2016 to 2026. Loan Officers have a significant impact on revenue, especially if they farm that customer relationship. If a Loan Officer gets a customer to switch over to the bank or credit union for all of their banking services, they will generate more revenue for their employer. So, whether it’s a Mortgage, Commercial, or Consumer Loan Officer, this position is essential to financial institutions all over the country.

Information Technology

Just 15 years ago, more than half of all banking transactions transpired inside of banking branches, face-to-face. However, that number fell to below 10% in 2019. Financial institutions are continuously needing to make the shift to keep up with the digital era. Therefore, the need for specialized IT folks is in high demand. We see positions often anywhere from Help Desk to System Administrators, all the way up to CIO positions.

I personally am seeing numerous IT changes emerge throughout my clients’ teams. The great thing about these candidates is that their skills are transferrable across any industry! In other words, there are tons of great IT professionals out there. However, they may be difficult to recruit in today’s challenging job market without partnering with an expert. My team and I have a wealthy network of IT professionals with banking experience. And they are exclusively looking for their next opportunity through us!

Financial Analysts

Similar to the first two positions, employment for Financial Analysts is expected to grow 11 percent from 2016 to 2026, according to the Bureau of Labor Statistics. There aren’t a plethora of candidates with this skillset, typically because my clients look for someone with banking or financial services experience.

Let us help you navigate this tight market

If you’re a hiring manager at a Credit Union, I’d love to have a conversation about the candidates I’ve been working within these areas. Or, if you’re a candidate looking for your next opportunity, reach out to me and my team! I would be happy to discuss any opportunities.

Is Your Mine Being Data Mined?, data mining, cyber threats, lock, computer, guidelines, computer safety, technology,

Is Your Mine Being Data Mined?

Is Your Mine Being Data Mined?

Cybersecurity has been a buzzword across many industries over the last few years. As data is moved into the cloud, Operational (OT) and Information (IT) technologies merge creating an increase in the development of digital innovation along with the competitive nature of the global commodities market coupled with the fluctuation of geopolitical climates, this all contributes to an increase in destructive cyber-attacks and cyber espionage.

After spending 24 years in the Army watching technology develop and an increase of data and platforms that run every aspect of the military, we have all had to learn our place in keeping the personal, sensitive, and intelligence data stored on our computers and databases secure. Though the information and secrets that are on your computer may not jeopardize lives as it does in the military, it still jeopardizes your company’s bottom line, which affects your pay and job. Here are some security tips that you the end user can do to help your IT, IS personnel keep your systems secure.

Security tips everyone can follow

  1. Follow corporate specific guidance at all times.
  2. Proper password management, mix letters, numbers, and special characters. Do not use the same password for multiple things.
  3. Use caution when opening attachments or links.
  4. Never leave your computer unlocked or on when unattended.
  5. When your computer has updates (System or Anti-Virus) run the updates. Don’t let them pile up.
  6. Your social media says a lot about yourself, keep it secure and do not share information that could jeopardize you or your company. Do not share details of that project you are working on. A good corporate espionage expert can piece together information from multiple employees to find a ripe target to go after.
  7. Everyone is a target don’t be a victim!

With 2017 shaping up to be a huge year for the mining industry, there are a lot of companies that are integrating new technologies across all spectrums of their organizations. These technologies are becoming more and more interlocked with each other and becoming more complex. This has started a boom in IT and Information Security (IS) positions due to the mining industry being behind the power curve when it comes to cybersecurity. The question is what are you and your company doing to combat this data mining?

IT Security in Healthcare

IT Security in Healthcare: We’re All in This Together

Over the last several weeks I have had the pleasure of speaking to whom I consider the top leaders in IT in healthcare in the Mid-South and Southwest. As someone whose personal information was compromised in a data breach a couple of years ago I wanted to know what I could as a consumer to protect myself, my family and hopefully in turn you and yours.

IT Security in Healthcare

Quickly think back about a visit to the doctor or hospital 15 years ago. You presented your ID, insurance card and filled out reams of paperwork. The staff then put all of that in a folder and stored in the office for the next time you came in. Now it’s all scanned and saved digitally for easier access and sharing between medical providers to hopefully give you better care as all of your doctors can see your medical history and previous treatments. The goal is to save time and money. Time not filling out what seems to be the same paperwork and money by not ordering test or procedures done by another doctor.

With the merger and acquisitions of facilities and practices being absorbed we now have the issue of consolidating systems and achieving standardization. It doesn’t matter the size of the organization; large hospital corporations with multiple locations or critical access and rural hospitals. Personally Identifiable Information (PII) is everywhere, full name, date of birth, social security number, address, phone numbers and family relations. Every piece of information a hacker needs to commit fraud. The large amount of PII means that a breach will be deeper and have longer lasting effect on an individual.

IT Security in Healthcare

So what are healthcare organizations doing to protect you? Everything they can, based on my conversations. One thing became very clear, and please don’t panic when I say this; it’s not a matter of if a system is breached it’s when. Early detection and resistance are vital as are the actions of all of us.

The CIO’s and Directors of IT that I spoke with emphasized that process and investment in technology/infrastructure are two of the steps in protecting our PII. The third and most important is people. Making sure end users are aware of phishing scams, securing work stations when not in use and knowing who you are sharing your information with.

Here are two everyday things you can do to help keep your information safe:

  • Be mindful of opening attachments from unknown senders.

Just because it looks like it’s from a company you do business with does not guarantee it is. No longer are we getting messages from overseas princes with millions they want to share, it’s more likely to be what looks like a request from your bank, insurance company or pharmacy asking you to update information. One key stroke or opened attachment can lead to malware infecting your computer and putting you at risk whether at home or at work.

  • Be proactive when it comes to protecting your information.

It’s not just your IT departments responsibility to protect you it’s yours. So when they ask you to change your password every 90 days or to start including special characters and capital letters it’s for your protection and one more level of security in the battle against those who wish to ruin your good name.

Thank you to the IT leaders who provided their valuable time and insightful input! Is your hospital doing something different to fight the war on cyber attacks? I’d love to hear your thoughts! Email me at