Attract and Retain Great Cyber Security Talent

What strategies can companies use to retain talented IT Security specialists and attract potential hires?

A growing need for cyber-security organisations to recruit the best and brightest to defend governments, organisations and businesses from attack has meant that the market for university graduates in the cyber-security sector has expanded rapidly over the last few years.

According to UK government figures, the UK cyber-security sector is worth more than £6 billion and employs 40,000 people. In addition to national demands, the cyber export market grew from £850 million to more than £1 billion during 2013, and is expected to reach £2 billion by 2016. All this investment is to tackle the growing ‘business' of cyber-crime – an example of which can be seen in GOV.UK's recent findings that 81 percent of large corporations reported a cyber-breach in 2014, with an estimated cost to organisations between £600,000 to £1.15 million per attack

BAE Systems Applied Intelligence have significantly stepped up their graduate recruitment programme in recent years, in recognition of the need for the UK to foster talent within the cyber-security sector if we are to tackle cyber-crime effectively. For example, in 2014, over a third of BAE Systems' graduate intake – around 120 out of 287 – joined BAE Systems Applied Intelligence, to help companies and organisations protect themselves and their customers from fraud, cyber-attack and digital criminality. To achieve these solid graduate numbers and attract the best talent, in a landscape that is becoming increasingly competitive, BAe are focusing on utilising expert alumni and keeping the enthusiasm up once graduates come in-house.

At its core, the ability to attract bright graduates lies in the relationships your company has with universities and organisations that produce the strongest talent. An example could be the Cyber Security Challenge UK.

Backed by more than 50 sponsors from across government, industry and academia, including BAE Systems Applied Intelligence, the Challenge incorporates a range of competitions, including a schools-specific programme, that test the knowledge and skills of the UK's young people. Within the Challenge, participants experience face-to-face competitions with adversaries, as well as a series of technical challenges that are assessed by a number of its experts within the cyber-security field.

What is interesting about challenges and competitions such as this is that they motivate us to continue the fun when the graduates come in-house. As too often happens, once companies get graduates in they relegate these junior members to the most menial, unexciting tasks. In order to retain and engage with our graduates BAe set them up with strong mentors and experts who will challenge them and test them on a daily basis.

If we are to effectively and efficiently tackle the cyber-attacks that we are starting to see with more regularity we must come together as an industry and do our best to get the best and brightest young people on our side.
SC Magazine: http://bit.ly/1NkdQFv

 

« The Dark Web Uncovered
Asking Just 4 Questions Will Stop 90% of Hacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.