Girls Are Future Cybercrime Fighters

The Girl Scouts of the USA announced the introduction of 18 new cybersecurity badges this past spring. As a result, Girls Scouts of all ages  are able to explore opportunities in STEM while developing problem-solving and leadership skills starting in 2018.

An official press release from The Girl Scouts of the USA states that according to the latest Cybersecurity Jobs Report by Cybersecurity Ventures, the worldwide deficit of qualified cyber-security professionals will reach 3.5 million by 2021.

The data suggests there’s a lot of career opportunity for girls in cyber. But only 11 percent of the world's information security workforce are women, according to numerous sources.

Why so few women? The Computing Technology Industry Association states that 69 percent of women who have not pursued careers in information technology attribute their choice to not knowing what opportunities are available to them.

A study by Raytheon indicates that less than half of high school students have been approached by a parent, teacher or guidance counselor about an education or career in cyber-security.

If parents and educators don’t start talking to their daughters about cybersecurity now, then it will perpetuate the problem and hold down the number of women entering the field.

Guiding kids to careers in Cybersecurity

The National Cybersecurity Alliance publishes a Parent Primer for Guiding Kids to Careers in Cybersecurity. It’s a quick read chock-full of excellent resources to help parents get up to speed on cybersecurity if they aren’t already.

One of the biggest myths about cyber-security is that all of the jobs involve sitting behind a computer for the day. While that may be true of some positions, it’s hardly the case for all of them.

Diedre Diamond, founder and CEO of CyberSN, a cybersecurity staffing firm, and #Brainbabe, an organization dedicated to the advancement of women in cyber-security, shared a list of cyber-security jobs that sheds more light on career possibilities for girls.

Here is Diamond’s list, narrowed down and with added some commentary for parents to consider.

Non-technical cyber-security jobs

Security Sales Account Manager — A good salesperson can sell anything: Girl Scout cookies, technology, you name it. Why not sell in the cybersecurity market that is predicted to exceed $1 trillion cumulatively over the next five years.

Cybersecurity Recruiter — A high schooler with a knack for match-making might transfer that experience into the world of head-hunting cyber fighters.

Cybersecurity Attorney — Thinking of law? Then think cyber law. It’s a lucrative niche with far more upside than a general practitioner.

Cyber Insurance Specialist — Insurance broker? Nah. Cyber insurance broker? Yup. Cyber-security insurance is the next breakout category in our industry.

Security Awareness Trainer — If you know something about cyber-security, then you know more than most people. The market for training employees on security is exploding and so is the market for professional trainers in cyber-security.

Security Call Center Operator — If a kid likes the idea of sitting behind a computer and wearing a headset all day, then customer service might be the answer.

Technical cyber-security positions

Security Engineer — Software coders with an aptitude for cybersecurity are in high demand, and they earn high pay.

Security Analyst — Information security analysts are one of the fastest-growing occupations, according to the US Bureau of Labor Statistics. There were 100,000 job openings in the US last year just for this position alone, and the median salary was $92,600 — and into six-figures in some cities.

Penetration Tester — Breaking and entering, and it’s legal. These positions are held by people who are hired to test an organisation’s security, or lack of it, by attempting cyber intrusions.

Incident Responder — Much like other professional emergency responders that serve their communities, cyber incident responders are the digital counterparts.

Forensic Engineer — If a kid excels at Who, What, Where, When, and Why, then that transfers well to digital forensics, as well as digital investigations.

Cryptographer — Games such as word descramblers and word finders can be a springboard to an education in cryptography.

Security Sales Engineer — Half salesperson and half engineer, these are some of the highest paid people working for cyber-security software companies. Their job? Giving demos and making presentations.

Leadership and management cyber-security roles

Founder — Billions of dollars have been invested into cybersecurity start-ups-over the past few years, and the money is expected to keep flowing. As with any field, there’s room for entrepreneurs of all ages in cybersecurity.

Chief Information Security Officer (CISO) — The security head honchos, CISOs, at large corporations oversee cyber defense and earn anywhere from $200,000 to $500,000 annually, with some salaries reaching as high as $1 million.

Privacy Officer — Data and digital privacy, as well as personal privacy, is a hot topic and offers hot jobs such as Privacy Officers that focus exclusively on this dimension of security.

Compliance and Risk Manager — Organisations globally are responsible for complying with laws that govern data and computer security. Compliance and Risk Officers are tasked with keeping up on this and overseeing the implementation of business processes, technologies, and security that are required by law.

Security Product Manager — All cyber-security software and hardware companies employ marketing professionals who are responsible for branding, public relations, and revenues for specific products.

According to Diamond, there’s up to 32 different cyber-security jobs that women in cyber-security can choose from.

CSO

You Might Also Read: 

Very Few Women Are CISOs:

Room At The Top For Women In Tech:

 

« What is the Industrial IoT?
Inspired: China Measures Citizens' Trustworthiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.