Story image

AU woman fakes CV to get $245k CIO salary, but gets sacked instead

06 Feb 2018

The IT skills shortage in Australia is bad enough without having to factor in potential fraud.

News broke recently of the sacking of former chief information officer of South Australia’s Department of Premier and Cabinet, Veronica Theriault.

The reason? She allegedly faked a resume that claimed previous employment at a handful of large technology firms, in addition to a number of university degrees, to claim the substantial $245,000 per annum job.

Theriault was let go after seven weeks when her employers realised they’d been deceived. After being charged by the state’s corruption watchdog, Theriault appeared in the Adelaide magistrates court recently and is expected to enter her plea in the case when she next appears in court on April 19.

The vacant CIO position has since been restructured into a chief technology officer role and filled by Abhishek Singh after being drawn from the South Australian department of finance in his former role as the head of business and IT.

Singh is to be joined by Dr Eva Balan-Vnuk (formerly Microsoft SA state leader) who will be assuming the role of executive director of ICT and digital government after the woman formerly in the role reportedly quit over the Theriault scandal.

Affix founder and managing director Jarrad Skeen says people should never fake anything on their CV as they will get caught and the consequences will be severe.

“We see embellishment on CVs all the time in the tech industry. The most common example is candidates embellishing their skills and using every acronym in the hope that they appear in search engines, even when they've never had any experience with what they're listing,” says Skeen.

“We’ve also encountered extreme cases of fake CVs. You’ll always eventually be caught as the Australian market is small and with the rise of social media, it’s easier than ever before to verify claims.”

Skeen says it’s much better to have an honest self-assessment of your skills and develop in the areas you want to go.

“CVs are also becoming less important as public profiles on sites like LinkedIn replace their relevance. If you’re faking a public profile, you will quickly be exposed because co-workers and employers may challenge your claims,” says Skeen.

“Instead of reference checking at the end of the process, we reference check before we shortlist to remove any risk of emotional bias."

Skeen says too many companies and government departments fall into the trap of going through the shortlist and interview process and then treat the reference check like a compliance exercise.

“At that point, you’re emotionally invested and think you’ve found the right candidate, you might have invested four hours or more in meetings with them, so if the reference check highlights a red flag it might not be investigated properly and taken seriously,” says Skeen.

“Then it’s found out once the candidate starts the job and causes a much bigger issue.”

GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.