Careers In Cloud Security

A new study has revealed that professionals see cloud security as the most important technical skill that those entering a cyber security career should possess. 

Recruiters should think outside the box when looking for new talent, advises a study released today by cyber security association (ISC)².

Problem solving was rated the most important soft skill.

Key findings include:

  • Just over half of cyber security pros have degrees in computer and information services.
  • Four in 10 said a dedicated security education is critical for a role in cybersecurity. 
  • Half of cyber security professionals who are new to the sector (with less than three years of experience) had an existing IT background before moving into cyber, compared to 63% of those with between three and seven years of experience. Some 46% of those surveyed do not consider an IT background to be a critical requirement to work in cyber security.
  • Ex-military and law enforcement personnel made up 31% of the respondents, reinforcing the opportunities for career changing from these sectors into cyber security.

(ISC)2 the world’s largest non-profit association of certified cyber security professionals has released the findings of its 2021 Cybersecurity Career Pursuers Study.

And this report provides insights on how to successfully create a balanced and diverse cyber security team with a broad range of skills. The report focuses on the workplace realities and skills of over 2,000 individuals working in in cyber security.

“One of the biggest challenges we have in cyber security is an acute lack of market awareness about what cyber security jobs entail,” said Clar Rosso, CEO of (ISC)2. “There are wide variations in the kinds of tasks entry-level and junior staff can expect. Hiring organisations and their cyber security leadership need to adopt more mature strategies for building teams.

Many organisations still default to job descriptions that rely on cyber security ‘all stars’ who can do it all. The reality is that there are not enough of those individuals to go around, and the smart bet is to hire and invest in people with an ability to learn, who fit your culture and who can be a catalyst for robust, resilient teams for years to come.

Additional highlighted findings include:

  • While cyber security professionals tend to be highly educated, just 51% have degrees in computer and information services. Less than half (42%) of the professionals who responded said a dedicated security education is critical for a role in cyber security.
  • While IT jobs are the leading gateway to cybersecurity roles, that entry pathway is shifting. Half of those newer to the field (with less than three years of experience) came from an IT background, compared to 63% of those with between three and seven years of experience in the field.
  • By a wide margin, fewer professionals who are relatively new to the field (less than three years) consider IT experience to be critical (46%) than do their more senior colleagues (69%)
  • Military veterans and those with law enforcement experience make up 31% of the cybersecurity professional respondents, affirming these backgrounds as ripe areas for recruitment
  • Cloud security was rated by professionals as the most important technical skill new entrants to the field should learn, while problem solving was the top-rated “soft skill” they should have. Both areas were simultaneously the top-rated responses by career pursuers too.

(ISC)2 :

You Might Also Read: 

Hiring Good Cyber Security Professionals Is Hard Work:

 

« Automation & Industry 4.0
Pipeline Hack: Biden Issues An Executive Order »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.