Cyber Security Needs Workers Who Are 'Neuro Diverse'

A British Governmment Survey  finds that a high proportion of UK businesses lack staff with the technical, incident response and governance skills needed to manage their cyber security, with nearly half of all UK businesses reporting a basic cyber skills gap. 
 
In the cyber security sector, almost 70%% of businesses attemped to recruit  suitable candidadtes in the last three years, with 35% of vacancies  considered as ‘hard to fill’.  Of these just over a third wrere entry level roles. The most common reason why roles are considered ‘hard to fill’ is that candidates lack both technical skills and the quality of  neuro diversity,
 
Neurodiversity refers to the different ways the brain can work and interpret information.  It highlights that people naturally think about things differently. We have different interests and motivations and are naturally better at some things and poorer at others.
 
 In the cyber security sector some neuro diverse traits are seen as strengths and these include being logical and methodical, cognitive pattern recognition, ‘outside the box’ thinking, attention to detail, reliability, loyalty, integrity and being task focused, which in some other settings might be considered very mild forms of learning disorder.
 
Some firms have taken extensive measures to support neuro diverse employees, including giving colleagues with autism ongoing training on how to manage relationships with line managers and hiring a welfare officer to assist with employee wellbeing. These initiatives were regarded as highly successful, and the firms felt that it was far more innovative as a result of its diverse workforce.
 
A third of UK businesses think they need to hire people with advanced technical cyber skills, including penetration testing, forensic analysis, security architecture/engineering, threat intelligence, interpreting malicious code and user monitoring. The most in-demand cyber security roles in the UK market include IT Security Specialist (average salary £46,000 / $ 57,000), Security Engineer (average salary £32,000 / $40,000) and Information Security Analyst (average salary £40,000 / $50,000). 
 
These roles are suitable to those with a talent for IT in general and a desire and willingness to learn more about cyber security. For those without a cyber specific qualification, a great way to start is to do an apprenticeship in IT.  There are many different types of IT apprenticeships available in hardware, network, cloud and infrastructure, software development, analysis and of course, cyber security. There are also apprenticeships in digital marketing and sales which are also vital to support the IT industry. 
 
All of the apprenticeships are at a range of levels and are suitable to learners of all ages from school leavers through to more experienced professionals looking to enhance their experience. Apprenticeships also benefit people who have often not flourished in more traditional education. 
 
Across the cyber sector, 9% of employees have neuro diverse conditions or learning disorders (the definition includes autism, Asperger syndrome, dyslexia, dyspraxia and ADHD). 
 
Of the near 70% of cyber firms that have tried to recruit people in the last three years, 16% say that they have adapted their recruitment processes, or carried out specific activities to encourage applications from people with neuro diverse conditions or learning disorders. 
 
Amongst some employers, there is a sense that diverse cyber teams would benefit from new ways of thinking and problem solving, which could lead to greater productivity and innovation. For example, one highlighted that cyber teams needed to match the diversity of those carrying out cyber attacks. Cyber security analysts help to protect an organisation by employing a range of technologies and processes to prevent, detect and manage cyber threats. This can include protection of computers, data, networks and programmes. Job titles vary and may include information security analyst, security analyst, information security consultant, security operations centre (SOC) analyst and cyber intelligence analyst.
 
In the UK there are geographic hotspots of activity in the cyber security labour market, which include London, Edinburgh and Belfast, as well as parts of the West Midlands including the Malvern area in Worcestershire and the South West, such as Bristol, Cheltenham and wider Gloucestershire.
 
While technical skills and qualifications are important, so is having the right mindset and good security analysts need to be innovative and be able to think like a creative hacker
 
As the skills gap widens in almost every sector of IT, but especially cyber security, the industry will need to find new and innovative ways to both train and attract new and diverse talent from every area of society. Schools, universities and training providers need to give young people and training recipients a holistic cyber skillset, covering the relevant technical skills and soft skills that employers demand, and the ability to implement those skills in a business context.
 
UK GOV;        BCS:        Prospects:      eFinancial Careers:
 
You Might Also Read: 
 
The Rise Of The Introvert: Is There An IT Personality?:
 
 
 
 
« Millions of Facebook Profiles For Sale
Cyber Criminals Exploit Lockdown Workers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.