Cyber Security Talent Crunch - 3.5m Jobs Vacant

There is a serious shortage of cybersecurity professionals and the gap is expected to lead to at least three and a half million jobs being vacant within the next year according to the experts at Cybersecurity Ventures - an increase of 2.5 million since 2014.
 
This cyber employment figure has been validated by hundreds of media outlets, including the world’s largest, as well as industry associations, universities, governments, vendors, recruitment firms, and security experts. According to (ISC2) there are currently nearly 3 million unfilled cybersecurity jobs worldwide and employees who take on these roles play a key role in the enterprise.
 
As cybercriminals grow more sophisticated and news of major hacks reach headlines nearly daily, cybersecurity professionals are in high demand. 
 
Data breaches can cause devastating financial losses and affect an organisation’s reputation for years. From lost business to regulatory fines and remediation costs, data breaches have far reaching consequences.The annual Cost of a Data Breach Report, conducted by the Ponemon Institute and sponsored by IBM Security, analyzes data breach costs reported by 507 organisations across 16 geographies and 17 industries. hey found  the average cost of a data breach worldwide is about $3.62 million. 
 
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.
 
Why is there an increased demand for cybersecurity professionals?
Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. The rise of the Internet of Things (IoT) has also opened up new threats. To protect their information and that of their clients, companies across all industries are seeking cybersecurity professionals to secure their networks.
However, many enterprises face difficulties filling these positions: 55% of US organisations reported that open cybersecurity positions take at least three months to fill, while 32% said they take six months or more, according to a 2017 ISACA. And 27% of companies said they are unable to fill cybersecurity positions at all. 
 
Cybersecurity remains a relatively new field compared to other computer sciences, so a lack of awareness is part of the reason for the talent shortage, according to Lauren Heyndrickx, CISO at JCPenney. Misconceptions about what a cybersecurity job actually entails are common, and might be part of the reason few women and minorities go into the field, she added. 
 
Women now make up 24% of the cybersecurity workforce, and 45% of those women are millennials, according to an and it's likely that these numbers will continue to grow over time.
 
A job in cybersecurity can also command a high paycheck: The average salary for an information security analyst in the US is $98,350, according to the US Bureau of Labour Statistics and it's significantly higher in cities such as San Francisco and New York. 
 
The shortage of trained cybersecurity professionals has led many organisations to seek other non-traditional candidates to fill these roles. To help those interested in the field better understand how to break into a career in cybersecurity, we've pulled together the most important details and resources.
 
  • Why is there an increased demand for cybersecurity professionals? Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. To protect their information and that of their clients, companies across all industries are seeking cyber professionals to secure their networks.
  • What are some of the cybersecurity job roles? A career in cybersecurity can take the form of various roles, including penetration tester, chief information security officer (CISO), security engineer, incident responder, security software developer, security auditor, or security consultant.
  • What skills are required to work in cybersecurity? The skills required to work in cybersecurity vary depending on the position and company, but generally may include penetration testing, risk analysis, and security assessment. Certifications, including Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP) are also in demand, and can net you a higher salary in the field.
  • Where are the hottest markets for cybersecurity jobs? Top companies including Apple, Lockheed Martin, General Motors, Capital One, and Cisco have all been hiring cyber professionals in recent years. Industries such as healthcare, education, and government are most likely to suffer a cyberattack, which will probably lead to an increase in the number of IT security jobs in these sectors.
  •  What is the average salary of a cybersecurity professional? The average salary for a cybersecurity professional depends on the position. For example, information security analysts earn a median salary of $98,350 per year, according to the US Bureau of Labour Statistics. Meanwhile, CISOs earn a median salary of $221,991, according to Salary.com. Salaries are significantly higher in certain cities, such as San Francisco and New York. 
  • What are typical interview questions for a career in cybersecurity? Questions can vary depending on the position and what the specific company is looking for, according to Forrester analyst Jeff Pollard. For entry and early career roles, more technical questions should be expected. As you move up the ranks, the questions may become more about leadership, running a program, conflict resolution, and budgeting. 
  • Where can I find resources for a career in cybersecurity? ISACA, (ISC2)), ISSA and The SANS Institute are national and international organisations where you can seek out information about the profession as well as certification and training options. A number of universities and online courses also offer cybersecurity-related degrees, certifications, and prep programs.
 
US Bureau of Labor:       TechRepublic:            IBM:           ZDNet:         SC Magazine
 
You Might Also Read:
 
Cyber Security Training Ans Jobs:
 
Cyber Security Training That Employees Don’t Hate:
 
 
« Cyber Spying, Digital Theft & Espionage
Cyber Security 2020 - Some Other Predictions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.