Girls Are Future Cybercrime Fighters

The Girl Scouts of the USA announced the introduction of 18 new cybersecurity badges this past spring. As a result, Girls Scouts of all ages  are able to explore opportunities in STEM while developing problem-solving and leadership skills starting in 2018.

An official press release from The Girl Scouts of the USA states that according to the latest Cybersecurity Jobs Report by Cybersecurity Ventures, the worldwide deficit of qualified cyber-security professionals will reach 3.5 million by 2021.

The data suggests there’s a lot of career opportunity for girls in cyber. But only 11 percent of the world's information security workforce are women, according to numerous sources.

Why so few women? The Computing Technology Industry Association states that 69 percent of women who have not pursued careers in information technology attribute their choice to not knowing what opportunities are available to them.

A study by Raytheon indicates that less than half of high school students have been approached by a parent, teacher or guidance counselor about an education or career in cyber-security.

If parents and educators don’t start talking to their daughters about cybersecurity now, then it will perpetuate the problem and hold down the number of women entering the field.

Guiding kids to careers in Cybersecurity

The National Cybersecurity Alliance publishes a Parent Primer for Guiding Kids to Careers in Cybersecurity. It’s a quick read chock-full of excellent resources to help parents get up to speed on cybersecurity if they aren’t already.

One of the biggest myths about cyber-security is that all of the jobs involve sitting behind a computer for the day. While that may be true of some positions, it’s hardly the case for all of them.

Diedre Diamond, founder and CEO of CyberSN, a cybersecurity staffing firm, and #Brainbabe, an organization dedicated to the advancement of women in cyber-security, shared a list of cyber-security jobs that sheds more light on career possibilities for girls.

Here is Diamond’s list, narrowed down and with added some commentary for parents to consider.

Non-technical cyber-security jobs

Security Sales Account Manager — A good salesperson can sell anything: Girl Scout cookies, technology, you name it. Why not sell in the cybersecurity market that is predicted to exceed $1 trillion cumulatively over the next five years.

Cybersecurity Recruiter — A high schooler with a knack for match-making might transfer that experience into the world of head-hunting cyber fighters.

Cybersecurity Attorney — Thinking of law? Then think cyber law. It’s a lucrative niche with far more upside than a general practitioner.

Cyber Insurance Specialist — Insurance broker? Nah. Cyber insurance broker? Yup. Cyber-security insurance is the next breakout category in our industry.

Security Awareness Trainer — If you know something about cyber-security, then you know more than most people. The market for training employees on security is exploding and so is the market for professional trainers in cyber-security.

Security Call Center Operator — If a kid likes the idea of sitting behind a computer and wearing a headset all day, then customer service might be the answer.

Technical cyber-security positions

Security Engineer — Software coders with an aptitude for cybersecurity are in high demand, and they earn high pay.

Security Analyst — Information security analysts are one of the fastest-growing occupations, according to the US Bureau of Labor Statistics. There were 100,000 job openings in the US last year just for this position alone, and the median salary was $92,600 — and into six-figures in some cities.

Penetration Tester — Breaking and entering, and it’s legal. These positions are held by people who are hired to test an organisation’s security, or lack of it, by attempting cyber intrusions.

Incident Responder — Much like other professional emergency responders that serve their communities, cyber incident responders are the digital counterparts.

Forensic Engineer — If a kid excels at Who, What, Where, When, and Why, then that transfers well to digital forensics, as well as digital investigations.

Cryptographer — Games such as word descramblers and word finders can be a springboard to an education in cryptography.

Security Sales Engineer — Half salesperson and half engineer, these are some of the highest paid people working for cyber-security software companies. Their job? Giving demos and making presentations.

Leadership and management cyber-security roles

Founder — Billions of dollars have been invested into cybersecurity start-ups-over the past few years, and the money is expected to keep flowing. As with any field, there’s room for entrepreneurs of all ages in cybersecurity.

Chief Information Security Officer (CISO) — The security head honchos, CISOs, at large corporations oversee cyber defense and earn anywhere from $200,000 to $500,000 annually, with some salaries reaching as high as $1 million.

Privacy Officer — Data and digital privacy, as well as personal privacy, is a hot topic and offers hot jobs such as Privacy Officers that focus exclusively on this dimension of security.

Compliance and Risk Manager — Organisations globally are responsible for complying with laws that govern data and computer security. Compliance and Risk Officers are tasked with keeping up on this and overseeing the implementation of business processes, technologies, and security that are required by law.

Security Product Manager — All cyber-security software and hardware companies employ marketing professionals who are responsible for branding, public relations, and revenues for specific products.

According to Diamond, there’s up to 32 different cyber-security jobs that women in cyber-security can choose from.

CSO

You Might Also Read: 

Very Few Women Are CISOs:

Room At The Top For Women In Tech:

 

« What is the Industrial IoT?
Inspired: China Measures Citizens' Trustworthiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.