Careers In Cloud Security

A new study has revealed that professionals see cloud security as the most important technical skill that those entering a cyber security career should possess. 

Recruiters should think outside the box when looking for new talent, advises a study released today by cyber security association (ISC)².

Problem solving was rated the most important soft skill.

Key findings include:

  • Just over half of cyber security pros have degrees in computer and information services.
  • Four in 10 said a dedicated security education is critical for a role in cybersecurity. 
  • Half of cyber security professionals who are new to the sector (with less than three years of experience) had an existing IT background before moving into cyber, compared to 63% of those with between three and seven years of experience. Some 46% of those surveyed do not consider an IT background to be a critical requirement to work in cyber security.
  • Ex-military and law enforcement personnel made up 31% of the respondents, reinforcing the opportunities for career changing from these sectors into cyber security.

(ISC)2 the world’s largest non-profit association of certified cyber security professionals has released the findings of its 2021 Cybersecurity Career Pursuers Study.

And this report provides insights on how to successfully create a balanced and diverse cyber security team with a broad range of skills. The report focuses on the workplace realities and skills of over 2,000 individuals working in in cyber security.

“One of the biggest challenges we have in cyber security is an acute lack of market awareness about what cyber security jobs entail,” said Clar Rosso, CEO of (ISC)2. “There are wide variations in the kinds of tasks entry-level and junior staff can expect. Hiring organisations and their cyber security leadership need to adopt more mature strategies for building teams.

Many organisations still default to job descriptions that rely on cyber security ‘all stars’ who can do it all. The reality is that there are not enough of those individuals to go around, and the smart bet is to hire and invest in people with an ability to learn, who fit your culture and who can be a catalyst for robust, resilient teams for years to come.

Additional highlighted findings include:

  • While cyber security professionals tend to be highly educated, just 51% have degrees in computer and information services. Less than half (42%) of the professionals who responded said a dedicated security education is critical for a role in cyber security.
  • While IT jobs are the leading gateway to cybersecurity roles, that entry pathway is shifting. Half of those newer to the field (with less than three years of experience) came from an IT background, compared to 63% of those with between three and seven years of experience in the field.
  • By a wide margin, fewer professionals who are relatively new to the field (less than three years) consider IT experience to be critical (46%) than do their more senior colleagues (69%)
  • Military veterans and those with law enforcement experience make up 31% of the cybersecurity professional respondents, affirming these backgrounds as ripe areas for recruitment
  • Cloud security was rated by professionals as the most important technical skill new entrants to the field should learn, while problem solving was the top-rated “soft skill” they should have. Both areas were simultaneously the top-rated responses by career pursuers too.

(ISC)2 :

You Might Also Read: 

Hiring Good Cyber Security Professionals Is Hard Work:

 

« Automation & Industry 4.0
Pipeline Hack: Biden Issues An Executive Order »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.