Cyber Security Experts Needed in Australia

Technology is one of the fastest growing sectors in Australia and with digital transformation on the rise, the workforce needs to keep growing. According to Australia’s Digital Pulse 2019, the  latest annual investigation into the state of the country’s IT sector more than100,000 tech workers are needed by 2024.

The Australian Associations of ICT Profesioanls (ACS) President, Yohan Ramasundara, says Australia has to keep preparing itslelf for the fourth industrial revolution. “Meeting the voracious demands for more technology workers and increased investments from Australia’s businesses will be a huge challenge,” said. 

The fact there is a chronic shortage sees students snapped up before graduation.

As businesses and organisations around the world shore up their defences against cyber threats, the demand for cyber experts has dramatically increased.

Supply is not keeping up with Demand
Although Australia is facing a general IT skills shortages, the lack of cyber experts might be attributed to the special set of skills needed for these roles, although Australia is well-poised to become a breeding ground for cyber-security professionals.
Richard Buckland is a Professor in Cyberwar, Cybercrime, and Cyber-terror at the University of New South Wales. His experience with sending cyber students into the workforce has been tremendously positive.

“I certainly meet employers a lot and they’re really keen to come out to the uni and meet the students..... They often ask if I can put them in touch with some of my good students and I have to say ‘I can’t because they’ve already got jobs”” Professor Buckland has said.

The wide range of skills required to excel in cyber means there is often a dearth of talented specialists.“Cyber’s all about breaking the rules so we need people with a devious, lateral thinking, skeptical mindset,” says Professor Buckland. 

This last trait, being a rascal, is especially important to thrive in cybersecurity’s attacker/defender world.

For employers and educators alike, the idea of fostering non-conventional thinking can trigger alarm bells. Not only does Professor Buckland think the education system ought to encourage more rascal thinking and less conformity, he has also discovered a profound level of trustworthiness in unlikely places. Even if these various traits are rare to find in combination, Professor Buckland thinks Australia is uniquely positioned to continue producing high-quality cybersecurity experts.

“Australia is well-placed to have great cyber strength because our national characteristics of fairness, of decency, our sense of patriotism, coupled with a sense of skepticism, a sense of humour, and a sense of rascal playfulness, and really that’s the perfect storm for a good cyber person.”

ACS Insights 1:       ACS Insights 2:

You Might Also Read: 

Cyber Security Jobs & The Skills Gap:

 

« IT Governance - FREE Guide
The WannaCry Hangover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.