TeamLifepage
5+ Views

Is Chartered Accountancy a good Career option?

Is Chartered Accountancy a good Career option?



Chartered Accountancy


A Career in Chartered Accountancy has always intrigued me. Unfortunately, it is very difficult to find information about What Chartered Accountancy actually is. Most pages on the internet just talk about How to get into Chartered Accountancy. While I was searching for reliable information about aCareer in Chartered Accountancy, I came across this amazing page: https://www.lifepage.in/careers/chartered-accountancy-7

Harshit Gupta's perspective!

With 5 years & 7 months of professional experience, Harshit Gupta understands Chartered Accountancy. Harshit Gupta has worked in Chartered Accountancy as Partner in N Kumar Gupta & Associates. In Harshit Gupta's own words, this is how Harshit Gupta got into Chartered Accountancy:"I did B Com (H) from Khalsa College, DU. I did a professional course in Chartered Accountancy alongside. I became a certified Chartered Accountant in 2013. I worked at Ernst & Young for a year for corporate experience. I joined my family firm N Kumar Gupta & Associates as a Partner."Harshit Guptahas a profile in a very interesting format on: https://www.lifepage.in/page/harshitgupta1

Career Video on Chartered Accountancy

In a video, Harshit Gupta has talked about various aspects of a Career in Chartered Accountancy. Harshit Gupta started by explaining Chartered Accountancy as:"A Chartered accountant is one who is specialised in accounting, auditing and taxation. He also serves as a management and corporate caretaker. Some are engaged in public practice work, others work in the private sector and some are employed by government bodies."I watched the full video and I absolutely loved it.


It is easy to Google information about what Qualifications are needed to enter Chartered Accountancy, this video went a step ahead to talk about the body of knowledge one needs to develop to excel at Chartered Accountancy. Harshit Gupta touches upon these in the Education section of the Video:
Report Writing
Mathematics
Logical Reasoning
Economics
Law
Accountancy
Skills are the most important factor determining success in a particular Career.
Harshit Gupta then explains why these Skills are essential for a Career in Chartered Accountancy:
Leadership
Investigative Skill
Communication
Analytical Skills
Interpersonal Skills
Positives of this Career are quite interesting.
Harshit Gupta believes that the following are some of the Positives of a Career in Chartered Accountancy:
Dynamic
Multiple Opportunities
Flexibility
Early Start To Career
Respect
Challenges are the other side of Positives and this Career is no exception.
And, Harshit Gupta believes that one needs to prepare for following Challenges of a Career in Chartered Accountancy:
Difficult To Set Up
Regular Updation
Cabin Job
High Stake
Repititive

In the final section of the video Harshit Gupta talks about How a day goes in a Career in Chartered Accountancy. This video is by far the best video on a Career in Chartered Accountancy, that I have ever come across. To see the full Talk, one needs to install the LifePage Career Talks App. Here is a direct deep link of the Video: https://lifepage.app.link/20181221-0002

Career Counseling 2.0

This video on a Career in Chartered Accountancy was an eye opener and it got me very interested to learn more about the LifePage platform. LifePage has the most comprehensiveCareer List. LifePage is the world’s most evolvedCareerPlatform. You can use LifePage to find yourCareer Objective. LifePage also offers the most comprehensiveCareer Planningprocess. You can use LifePage to explore more than a thousandCareer Options. LifePage has the most exhaustiveCareer List. It is trulyCareer Counseling2.0 LifePage has created thelargest knowledge repository of Careersin the whole world. I salute the efforts of Team LifePage. I also encourage you to learn more about LifePage on: https://www.lifepage.in

Similar Career List on LifePage

I continued with my research on LifePage and thoroughly studied these links to gain more perspective:
[Managing Partner | Saurabh Agarwal and Company]


Career in Accountancy
[Accounts Clerk | D A V PG College, Dehradun]


[Partner | N Kumar Gupta & Associates]


[Accountant | Various Assignments]


Career in Accountancy
[Account Assistant | Pioneer Property Zone]


[Deputy Finance Officer | DIT University]


[Partner | Surinder Mahajan & Associate]


[Partner | Batra Agrawal Associates]


[Chartered Accountant | Godfrey Phillips India Ltd]


Career in Accountancy
[Head of Audit Section | GMVN]


[Chartered Accountant | Dubey and Company]


Career in Accountancy
[Head, Accounts Department | Summer Valley School]


Career in Accountancy
[General Accountant | The Hershey Company]


[Founder & CEO | Pramisha Business School]


Career in Accounting
[Accountant | Vkj Private Ltd]




Information about other Career Options

I also looked out for more information about other Career options and found these great articles:







Career in Psychology



Career in Cafe Management

Career in Filmmaking



Career in Content Writing

Career in Counselling

Career in Politics




Career in Chef Management


Career in Mountaineering

Career in Hair Styling






Interesting Career Articles










Just in case, you are interested inDesign of Houseyou may want to look at leading Design company in India which provides comprehensive solutions including planning, architecture, interior and landscape. Have a look at http://www.aka.net.in

And, in case you are interested inComment Blogging for SEOthen you should definitely visit this incredible resource: https://www.careerdiscussion.xyz/2020/01/259-un-moderated-blogs-for-seo.html
TeamLifepage
0 Likes
0 Shares
Comment
Suggested
Recent
Cards you may also be interested in
DIGITAL FORENSICS: KEY SKILLS OF A CERTIFIED INVESTIGATOR
The terms ‘forensics’, ‘digital forensics‘, ‘computer forensics‘, or ‘cyber forensics’ gives the impression of law enforcement. Whereas, in reality, digital forensics plays an important role in cybersecurity. Digital forensic is an independent team of cyber forensic is an expertise similar to other cybersecurity teams. Proficient standards to be a certified cyber forensic investigator Owing to a continuous demand for digital forensic training by the companies, appreciable number of certifications are available. Employers preferably look for certified forensic investigators having key-skills on digital forensic. The most common standards that a certified digital forensic investigator should have are as follows: “Practitioners require technical and professional training in digital forensics principles and processes.” – Jason Jordaan, principal forensic scientist at DFIRLABS, at the ITWeb Security Defeating anti-forensics techniques Computer forensic tools allow cyber forensic investigators to retrieve deleted files. On other hand, anti-forensic tools do the reverse. Anti-forensic tools and techniques work against cyber forensic tools. The anti-forensic tools alters, hides, or deletes the information. Anti-forensic tools also implicate users by introducing fake evidences, or by exploiting bugs in the tools, and more. A digital forensic investigator is the one who should have the knowledge and skill to identify and mitigate anti-forensic tools and techniques. Understanding hard disks and file systems Hard disk and internal files serve as important sources of information to the forensic investigator. Hence, an investigator should be aware of behavior and structure of hard disk. A cyber forensic investigator should be able to retrieve, protect, and store the information from the hard disk drive. The procedure of file system is also important during investigation as it relates with the hard disk again. Operating system forensics Operating system forensic is the process of identifying evidences from the operating system. It involves extracting and analyzing information from the operating systems of any device. The common operating systems like MAX, Windows, and Linux are usually targeted for criminal activities. A cyber forensic investigator should have a complete knowledge of these systems to trace the cyberattacks. Investigating email crimes Due to large dependency on the electronic communication channels, email has evolved as a preferred source of communication. The reliable nature of emails has become a powerful tool for criminals. They use emails to perform phishing and other common cyberattacks in large volumes. Regional laws govern email crimes except those that are agreed globally. The trailing emails can be a great source of information to the forensic investigators. Cloud forensic Cloud computing is an emerging technology, which many organizations are adopting the trend. On another hand, due to their potential repository of data, attackers perpetrate various attacks. The attackers make their attempts continuously to gain anonymous access over the cloud networks and retrieve the information. A cloud forensic implies the application of forensic investigation in a cloud environment. The cloud network involves both public and private networks. A digital forensic investigator is well-versed with cloud forensic to get through the investigation process. Dawie Wentzel, Head of Cyber Forensics Investigation at Absa Group has shared immense information on the latest tools and methods to collect cloud-stored data in accordance with evidentiary requirements. During his webinar via Cyber Talks, Dawie talked about the numerous challenges of legally obtaining cloud-stored electronic evidence and possible solutions. Watch the full Cyber Talk here: https://www.eccu.edu/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps/ Mobile forensics Mobile device forensics is the process of recovering digital evidence from mobile phones during the investigation process. A certified digital forensic investigator can examine and report possible digital evidence sources from mobile phones. The investigator collects the evidence to present in the court of law. The certified forensic investigators analyze the mobile phones for message history, call history, pictures, or other data on the memory to trace the perpetrators of crimes. The Computer Forensic Hacking Investigation (C|HFI) is a recognized certification on cyber forensic from EC-Council. The certification validates the candidates’ skills in identifying perpetrators’ footprints and gather the evidence to produce in the court of law. C|HFI is a vendor-neutral certification that fortifies the application knowledge of law enforcement personnel, security officers, military personnel, system administrators and everyone concerned of the integrity of the network infrastructure.
HOW TO START A CAREER IN ETHICAL HACKING
As per the 2018 HackerOne report, internet users are already facing over 166,000 registered hackers. [1] With stringent cyber laws, governments and various organizations are trying to make the internet a healthy place for its users. Now, the decision is yours, do you want to make a positive change in our world? Ethical hackers are those professionals who choose hacking methods to serve a greater purpose in the world with a good intent to benefit others. This guide is for those: With basic or no knowledge of ethical hacking With limited experience and waiting for an opportunity in ethical hacking This guide will lead you through the beginner knowledge of ethical hacking, later acquiring expertise in the domain. One of the important requirements to become an ethical hacker would be your desire and intent to make a difference in the world. If you want to try your hand at cybersecurity, then you must know that it is a vast industry with numerous domains such as application security, network security, and digital forensics which is sometimes further classified into other branches. So, you should be aware of your interest before you take your first step toward the industry. But if you have already made up your mind to become an ethical hacker, then stay with us. Reasons to Choose Ethical Hacking as Career Ethical hackers always have a handful of roles and responsibilities to deal with. An ethical hacker not only safeguards the data and network of an organization but is also responsible for taking preventive measures to avoid a security breach via penetration testing or any other method. It does possess a great career scope. And, the salary package is another fascinating aspect of it. However, if you are still unsure of pursuing ethical hacking as a career, then the listed reasons will serve as food for thought. 1. Scope for Career with Amazing Salary Trends The updated 2019 report by PayScale suggests the average salary of a certified ethical hacker is to be $90k. The top employers of these certified hackers include: Booz, Allen, and Hamilton S. Army S. Air Force General Dynamics Information Technology Inc. [2] The scope for this career route is broadening with each passing year. It has been evidently noticed that government agencies (military, law enforcement department, and national intelligence departments) and private organizations both are hiring cybersecurity experts, though IT firms are primary recruiters of ethical hackers, usually under the title of a penetration tester, security analyst, cybersecurity engineer, network security administrator, and a few others. Apart from that, service providers like airlines, hotels, and financial institutions are also hiring certified ethical hackers to protect their sensitive data. [2] 2. Growing Job Market for Certified Ethical Hackers Joblift, a UK-based job search platform, reported in 2018 that there are around 3240 job vacancies for ethical hackers. The report analyzed data for the past 24 months and declared that these job vacancies are increasing at an average of 4% per month. Another interesting calculation of the same platform mentions that 7 of every 10 job vacancies are looking for candidates with accredited credentials. [3] 3. Perfect Way to Enter Other Domains of Cybersecurity An ethical hacker possesses thorough knowledge of network security, application security, information security, and a lot more. There are organizations looking for professionals with specialized knowledge making it convenient for certified ethical hackers to take up other cybersecurity jobs, too, such as: Network administrator/manager Security investigator Penetration tester Web security administrator/manager Data security analyst/specialist Computer/digital forensics investigator IT security administrator/consultant/manager Network defense technicians The list doesn’t end here. These are just a few of the professional profiles that an ethical hacker can easily fit into. Guide to Becoming Certified Ethical Hacker Follow the listed steps to establish yourself as a certified ethical hacker. Step 1—Understanding Ethical Hacking Ethical hacking can be defined as a simple approach of defending the system and network security of an organization by exploiting its existing vulnerabilities and weaknesses and strengthening them with appropriate countermeasures. Ethical hackers follow the same methods and techniques of a malicious hacker for finding vulnerabilities, which will later be fixed. Unlike black hat hackers, ethical hackers offer their services only when they are lawfully and legitimately employed to do so. These hired professionals report all their findings to the management board of the firm. Step 2—Skills Required to Start Your Career as an Ethical Hacker Pursuing a career in ethical hacking demands an ever-evolving attitude. You will be required to update your knowledge with the continuously changing trend. Plus, you need to have a sound technical knowledge of certain scripting or coding programming languages (such as HTML, JSP, ASP, C/C++, Java, Python, or any other strong computer language). You can consider these two points as the mandatory prerequisites for learning ethical hacking to the core. The below-listed skills are revealed by Joblift in their survey of 2018. 70% job vacancies look for candidates holding accredited certifications 25% of job vacancies are subjected to candidates with the knowledge of programming languages 22% of job vacancies are meant for those candidates who can security check Employers also look for soft skills, which include confidence, passion, communication skills, flexibility, and innovative nature of a candidate before hiring him/her as an ethical hacker. [3] Step 3—Ways to Acquire the Required Skills To acquire the required skills, you need to go through our three-step process to become a certified ethical hacker. Certified Network Defender An ethical hacker needs to have extensive knowledge of network security. You need to have a thorough understanding of how a network operates, various network security controls, protocols, topologies, intricate nature of network traffic, firewall configuration, vulnerability scanning of a network, and a lot more. For that deep understanding, EC-Council offers you a comprehensive skill-based program which is not only designed after intense job market research but is also recognized by the Department of Defense. This Certified Network Defender program will take you to a step closer to your target. Certified Ethical Hacker This is another important step in your journey. The Certified Ethical Hacker (C|EH) program will start by helping you learn the fundamentals of ethical hacking. Then gradually build concepts like footprinting, network scanning, system hacking, sniffing, session hijacking, web servers and web applications hacking, and many other major subject matters. This program always gets updated as per the market demand of the contemporary world. For instance, our updated C|EH program includes IoT hacking, cloud computing, vulnerability analysis, and much more. With that, to adapt professional ethical hacking skills, you will be exposed to real-time scenarios in a virtual environment. C|EH Practical C|EH practical program is designed to test your ethical hacking skills on every possible level. It is a 6-h practical exam which tests your ethical hacking techniques. This credential ensures that you have a detailed understanding of all the major aspects of ethical hacking. Other Important Tips 1. Practice and Self-Learning You should understand the importance of practicing your gained technical knowledge and learning other trending ethical-hacking-related skills. The evolution of your knowledge is one of the most required steps that you need to take. You can do this by reading articles, watching videos, and interacting with experts. 2. Think Out of the Box Innovation is the key to stand out from the crowd. You need not follow the same path as other ethical hackers do. 3. Look for More Information All the information is just a click away. If you find some subject matter difficult or interesting, then try learning more about it. These days, the internet is the key to all your queries. Sources: https://www.hackerone.com/sites/default/files/2018-01/2018_Hacker_Report.pdf https://www.payscale.com/research/US/Certification=Certified_Ethical_Hacker_(CEH)/Salary https://joblift.co.uk/Press/ethical-hackers
[ROLL CALL] What's Your Wackiest Retail Story?
So it's the most craziest retail weekend of the year here in the States, and chances are that you or someone close to you has gone to the mall within the past 48 hours. Maybe you're one of the many that bank on some awesome Black Friday deals, maybe you just got dragged unwillingly - or even worse, maybe you went to the mall to WORK because you WORK RETAIL and this weekend, you are a SLAVE. Needless to say, I'm realizing some of you might need a place to vent out your frustrations, and don't worry, the Funny Community is here for you - and probably have some stories of our own! Today's big question - What are some of your wackiest stories about working retail? I'll start first: Now, this isn't the only weird story I have, but probably the quickest and funniest one I can remember while still keeping things G-rated. I used to work at Starbucks as a barista, and one of the things we do at work is called a 'spin'. Basically, you have to go around the lobby of the cafe and wipe down all the tables, make sure the trash cans aren't overflowing and the bathrooms are stocked, etc. One time, when I was doing a 'spin', a stereotypical soccer mom type with her 'venti three-shot no-whip no-foam extra hot white chocolate mocha' saw that I had walked right past her, and I guess she needed something and wanted some assistance. What you do when you want assistance: Go up to an employee at the front counter, the hand-off area, or maybe even someone doing a 'spin' and say "Excuse me, can you help me for a second?" What you don't do when you want assistance: Whistle at the employee like a dog. Yes, I got whistled at the same way someone would whistle at their Australian Shepherd at your local dog park. Not one of those 'yoohoo' whistles, but the one that requires you to put your thumb and your index finger into your mouth so you can let out a swift and loud WHIIIIIIIIIISTLE. My eyebrows raised in a way that I don't ever recall them raising before, and I remember thinking something along the lines of "Wow, uh.. that just happened." The best part about this whole scenario is this woman's son ended up working at our same Starbucks location only a few months later, and I spent the rest of our job together wondering if he knows his mom is the kind of person who dog-whistles at retail employees. So now it's your turn! Comment below with YOUR weirdest/funniest/most terrifying experience working retail. (Extra points if the manager backed you up.) LET'S GOOOOOOOOOOOOOOOO!!!!!!!!!!! @jgallegos222 @BrookieyElba @AmbieB @AlexanderBeta @jiggzy19 @pickettbailey10 @ChriSingularis @Taigara @stevieq @jcl4rks0n @adikiller @VeronicaArtino @loftonc16 @XxFallingStar @ElizabethT @karencorchado @ckienitz @MimiZu17 @MissB82 @RobertMarsh @Marichel @Matokokepa @KTM2014 @Baekyeol27 @jiannebalanza @loveyjen1 @ReyesGarcia @LillyThePotato @JessLynn258 @KyleJames @Spitefairyx @HollyWymore @ZoilaObregon @Luci546 @mikeystumbo @HazemAttia @CourtneyDoose @JustinaKocher @xAmberx @RaymondBarragan @metaladdict @EniorehFrancois @AshToast23 @AlishiaDavis @tashamarie22 @EdwinHernandez @hallamber87 @JosiahRosner @lnewberry420 @jannellvillanue @Beastboy93 @DebbyMuozToledo @KpopTwinz @DarthRevan @crazyfury @Beeplzzz @hannacat27 @Dezillia @MechelleLesane @RachelDover @ShaheedRonny @MichaelMahoney @NicoleFireRose @KarleyFrance @Ragde @FuwaFuwa02 @InshaAllah @Enzaire @HaydenGroves @DavidFall @Ragnorak @cherryblossom42 @MarkDias @KaseySmith @Harshini39 @MoraSolstice @sparklytrash @TimBey420 @RomeoEdgar @EmaHeart @EricEdwards @noxwalthorne @JamesFried @Fenris76 @Zeerow @madi1528 @YaretLeon @JaneFenner @D3adpoolz @t3r3z1pyrop3 @PerseveranceSF @mrstiffanywhitt @XenoEdge @JoshVillanueva @JonathanKerns @AaronEli @JosephAcostaIII @LouieD @Emmi @PassionLandrum @LilianaSerrato @kskatie82 @ChiefAlphaGoat @Nekochan55000 @grammur @cburgoon @AlejandraMarin @gummibawrx @SkylorFeryance @CaseyKing @misskurmet82 @JessicaChaney @KpopLuver13 @chris98vamg @VixenViVi @wjdeogks76 @jokes @fallendendenjr @missvicky69 @Angel124 @ShaleciaSales @JaxomB @AnnaArai @TyranMcCall @Animefoxgirl97 @ChosenKnight @myabeard04 @jeremiah1226 @glostick @shantalcamara @ariannagorniak1 @aishalakshmi @B2STANG88 @Ninjinuity @TinaDang @deilig @OGPanda @Bekka @kimleekwonshin @TheGreenEyedPup @RobynHope @FabiolaGavina @zoila205 @P2rsv @celesteyc @lilybaby @KristinaCaron @ArielWoods @thisismylife @Shawollete @WiviDemol @lizzy2589 @EddiePozo @smnthcarter773 @drummergirl1691 @EinnaAm @paularasnick @estrella4584 @fourstargeneral @Kuramariin @JunieRose @treblelove @EmilyT411 @Joshsmithokc @BeckyNewman @DannyMoses @oppadesu @EstefanOlivares @BurningAries @astrohelix @Priscillasdoor @Iamsasha @reesesrisa @GreyStorm84 @WeeabooBookworm @Alieisafreak @AshelyJewell @MengNoZhang @GinTenma @FallenDeath @Akki630 @DeadlyCyanide @CleoHoney @StephanieDuong @VienKnight @KpopGaby @DeniseiaGardner @tayunnie @biancadanica98 @JackMehoff @amazingangelini @Megamind @LexiiIrrii @nenegrint14 @KDramaKPop1015 @RinSeok1650 @MyNoahIsName @amandamuska @CandaceJordan @orenshani7 @JasonHeins @NerukaWong @MarySEW @kmccord95 @RosePark @myylifeisnow @GalaxyTacoCat @ZahidAli86 @YoSoySoysauce @delnygro @KevinRodriguez @ZoeMe @biancaP @doraga @VarunNambiar @SarahVanDorn @sugajin94 @Pranittare @malibella @nikkinjg @mistymaity @r3ptar21 @BleuRay @notgucci3 @JonPatrickHyde @Exoexo @TashaBitner @PuddinPumpkinz @nykechun @BarbiDearborn @inuyashagal @eggtiny98 @CostaGermanican @MooshieBay @GuerlyReyes @Marilovexoxo @Zxenna @raenel @sherrysahar @CheyenneKay @esmeraldagutirr @RaquelArredondo @DekaraMiller @ReynaMcArthur @m1chaela @DroPuenteAG93 @katekendrii @girikrishna @DeliaBray @KiamiYumi @SurrealTheMad @pitafuentes48 @RoninGaijin @MauricioCamacho @Pocahontas41 @ruhlihal @BanditChan @Link4TW @IsaacAponte @warren @KelleyDaniel @BeannachtOraibh @Zelda27896 @baileykayleen @candyland1986 @Animaniafreak @DenieceSuit @XergaB20 @missophiestik @warjeensuleiman @rcuero @ErinGregory @DianaCastaneda @hyolouxx @NiahriTaylor @thetaz12 @CorlethaTurner @edwin94 @breyflessert @Dino21 @animechild51 @jannatd93 @nievesyaide @Amye1 @esha @RobertZ @tardisdragon7 @GingerMJones @JezziCrypt @KellyOConnor @LeilaB @AluSparklez @MattK95 @KiKi29 @Taijiotter @drea4u @JPBenedetto @jltobar07 @Yusuf12 @JayAi @SaeedMazhar @DerrickKuni @lovelikematoi @amobigbang @wllmvns @RavenQueen0810 @RachelParker @Arellano1052 @DanaNikole89 @aliciasalinas @CameronGrondzki @csmoon01 @melifluosmelodi @magentaflower @KhedeenEvans @BlockBVillains @jazziejazz @TaliZorah17 @mileshiiipower @KyleSearl @PaulWragg @hopeismyanchor @JuliaLynea @ZwankimaWalker @cncota @KaraHevner @shannawi @ThePinkPrincess @zwdodds @AimeeH @BluBear07 @RainaC3 @JeremyGilmore @shannonl5 @TerrecaRiley @JasonNilsson @HeatherWright @JacobHaynie @BittyBerrie @lillychris224 @LAVONYORK @xxwriter389xx @Danse @KingDragnee191 @SethOwens @MeaganSeeliger @ColbyRecord @JasmineWilliams @odayja @TurtleyTurtles @YarabiStein @ClaireRedfield @blackvelveteen @SethScarlett @addri @shamwowpow @SarahRoot @AGale @VinMcCarthy @InPlainSight @Jason41 @TylerOrtega @quietone @Ziran @Ng98 @clobbersaurus @ButterflyBlu @LilianaZeferino @JhayBee @CenaSenpai @Stoneyy @balloonz3 @RocioNaranjo @gayalchemy @SeanMcintosh @JonathantheAwes @verolovesanime @yaakattackk @BlueStar2222 @VanessaStamps @RogerMcghee @DerrickAldana @AndrewHondras @AleciaReedy @Shilolobun
Get Paid To Cuddle Goats!
Feeling the strain of your office job? Has stress reached an all-time high? Maybe you're looking for something a little more? Well, fortunately, you're in luck, as a Virginia-based dairy farm is looking to hire volunteers to cuddle their goats. That's right. You - yes, you! - can be a professional goat cuddler. Caromont Farm is mainly a dairy purveyor, and its base farm in Esmont, Virgninia houses several cows and goats, and as the farm strives to ethically care for the livestock in their possession, all the animals are grass-fed and cared for by someone they describe as an 'assistant goat herds(wo)man'. (That could be you. If you get the job, that is.) According to the official job posting, in order to be an aforementioned goat-cuddling herdsman, these are the requirements the company expects from applicants: Able to lift 50 pounds Committed to local food and agriculture Works well independently and on a team Willing to take initiative Excited to learn Goat lover! Spanish speaking a plus+ Am I the only one that's a little confused as to why something like Spanish-speaking is required to hang out with goats? Anyway, if you know someone in the Virginia area that is willing to get their snuggle on with a billy goat, feel free to send them to the official volunteer website, where they'll be able to sign up for a four-hour cuddle shift. For the rest of you, I just want to know this: Would YOU want to become a professional goat cuddler? Or does your fear of intimacy extend to livestock? (Just kidding. I just wanted to make a creepy joke.) Anyway, leave your thoughts in the comment area below, and for more WTF news, follow the WTF Street Journal collection!