Girls Are Future Cybercrime Fighters

The Girl Scouts of the USA announced the introduction of 18 new cybersecurity badges this past spring. As a result, Girls Scouts of all ages  are able to explore opportunities in STEM while developing problem-solving and leadership skills starting in 2018.

An official press release from The Girl Scouts of the USA states that according to the latest Cybersecurity Jobs Report by Cybersecurity Ventures, the worldwide deficit of qualified cyber-security professionals will reach 3.5 million by 2021.

The data suggests there’s a lot of career opportunity for girls in cyber. But only 11 percent of the world's information security workforce are women, according to numerous sources.

Why so few women? The Computing Technology Industry Association states that 69 percent of women who have not pursued careers in information technology attribute their choice to not knowing what opportunities are available to them.

A study by Raytheon indicates that less than half of high school students have been approached by a parent, teacher or guidance counselor about an education or career in cyber-security.

If parents and educators don’t start talking to their daughters about cybersecurity now, then it will perpetuate the problem and hold down the number of women entering the field.

Guiding kids to careers in Cybersecurity

The National Cybersecurity Alliance publishes a Parent Primer for Guiding Kids to Careers in Cybersecurity. It’s a quick read chock-full of excellent resources to help parents get up to speed on cybersecurity if they aren’t already.

One of the biggest myths about cyber-security is that all of the jobs involve sitting behind a computer for the day. While that may be true of some positions, it’s hardly the case for all of them.

Diedre Diamond, founder and CEO of CyberSN, a cybersecurity staffing firm, and #Brainbabe, an organization dedicated to the advancement of women in cyber-security, shared a list of cyber-security jobs that sheds more light on career possibilities for girls.

Here is Diamond’s list, narrowed down and with added some commentary for parents to consider.

Non-technical cyber-security jobs

Security Sales Account Manager — A good salesperson can sell anything: Girl Scout cookies, technology, you name it. Why not sell in the cybersecurity market that is predicted to exceed $1 trillion cumulatively over the next five years.

Cybersecurity Recruiter — A high schooler with a knack for match-making might transfer that experience into the world of head-hunting cyber fighters.

Cybersecurity Attorney — Thinking of law? Then think cyber law. It’s a lucrative niche with far more upside than a general practitioner.

Cyber Insurance Specialist — Insurance broker? Nah. Cyber insurance broker? Yup. Cyber-security insurance is the next breakout category in our industry.

Security Awareness Trainer — If you know something about cyber-security, then you know more than most people. The market for training employees on security is exploding and so is the market for professional trainers in cyber-security.

Security Call Center Operator — If a kid likes the idea of sitting behind a computer and wearing a headset all day, then customer service might be the answer.

Technical cyber-security positions

Security Engineer — Software coders with an aptitude for cybersecurity are in high demand, and they earn high pay.

Security Analyst — Information security analysts are one of the fastest-growing occupations, according to the US Bureau of Labor Statistics. There were 100,000 job openings in the US last year just for this position alone, and the median salary was $92,600 — and into six-figures in some cities.

Penetration Tester — Breaking and entering, and it’s legal. These positions are held by people who are hired to test an organisation’s security, or lack of it, by attempting cyber intrusions.

Incident Responder — Much like other professional emergency responders that serve their communities, cyber incident responders are the digital counterparts.

Forensic Engineer — If a kid excels at Who, What, Where, When, and Why, then that transfers well to digital forensics, as well as digital investigations.

Cryptographer — Games such as word descramblers and word finders can be a springboard to an education in cryptography.

Security Sales Engineer — Half salesperson and half engineer, these are some of the highest paid people working for cyber-security software companies. Their job? Giving demos and making presentations.

Leadership and management cyber-security roles

Founder — Billions of dollars have been invested into cybersecurity start-ups-over the past few years, and the money is expected to keep flowing. As with any field, there’s room for entrepreneurs of all ages in cybersecurity.

Chief Information Security Officer (CISO) — The security head honchos, CISOs, at large corporations oversee cyber defense and earn anywhere from $200,000 to $500,000 annually, with some salaries reaching as high as $1 million.

Privacy Officer — Data and digital privacy, as well as personal privacy, is a hot topic and offers hot jobs such as Privacy Officers that focus exclusively on this dimension of security.

Compliance and Risk Manager — Organisations globally are responsible for complying with laws that govern data and computer security. Compliance and Risk Officers are tasked with keeping up on this and overseeing the implementation of business processes, technologies, and security that are required by law.

Security Product Manager — All cyber-security software and hardware companies employ marketing professionals who are responsible for branding, public relations, and revenues for specific products.

According to Diamond, there’s up to 32 different cyber-security jobs that women in cyber-security can choose from.

CSO

You Might Also Read: 

Very Few Women Are CISOs:

Room At The Top For Women In Tech:

 

« What is the Industrial IoT?
Inspired: China Measures Citizens' Trustworthiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Engineering Ingegneria Informatica

Engineering Ingegneria Informatica

Ingegneria Informatica is a leading Italian provider of Information Technology consulting, services and solutions including cyber security.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Singularico

Singularico

Singularico help secure your software using the power of AI.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.