Girls Are Future Cybercrime Fighters

The Girl Scouts of the USA announced the introduction of 18 new cybersecurity badges this past spring. As a result, Girls Scouts of all ages  are able to explore opportunities in STEM while developing problem-solving and leadership skills starting in 2018.

An official press release from The Girl Scouts of the USA states that according to the latest Cybersecurity Jobs Report by Cybersecurity Ventures, the worldwide deficit of qualified cyber-security professionals will reach 3.5 million by 2021.

The data suggests there’s a lot of career opportunity for girls in cyber. But only 11 percent of the world's information security workforce are women, according to numerous sources.

Why so few women? The Computing Technology Industry Association states that 69 percent of women who have not pursued careers in information technology attribute their choice to not knowing what opportunities are available to them.

A study by Raytheon indicates that less than half of high school students have been approached by a parent, teacher or guidance counselor about an education or career in cyber-security.

If parents and educators don’t start talking to their daughters about cybersecurity now, then it will perpetuate the problem and hold down the number of women entering the field.

Guiding kids to careers in Cybersecurity

The National Cybersecurity Alliance publishes a Parent Primer for Guiding Kids to Careers in Cybersecurity. It’s a quick read chock-full of excellent resources to help parents get up to speed on cybersecurity if they aren’t already.

One of the biggest myths about cyber-security is that all of the jobs involve sitting behind a computer for the day. While that may be true of some positions, it’s hardly the case for all of them.

Diedre Diamond, founder and CEO of CyberSN, a cybersecurity staffing firm, and #Brainbabe, an organization dedicated to the advancement of women in cyber-security, shared a list of cyber-security jobs that sheds more light on career possibilities for girls.

Here is Diamond’s list, narrowed down and with added some commentary for parents to consider.

Non-technical cyber-security jobs

Security Sales Account Manager — A good salesperson can sell anything: Girl Scout cookies, technology, you name it. Why not sell in the cybersecurity market that is predicted to exceed $1 trillion cumulatively over the next five years.

Cybersecurity Recruiter — A high schooler with a knack for match-making might transfer that experience into the world of head-hunting cyber fighters.

Cybersecurity Attorney — Thinking of law? Then think cyber law. It’s a lucrative niche with far more upside than a general practitioner.

Cyber Insurance Specialist — Insurance broker? Nah. Cyber insurance broker? Yup. Cyber-security insurance is the next breakout category in our industry.

Security Awareness Trainer — If you know something about cyber-security, then you know more than most people. The market for training employees on security is exploding and so is the market for professional trainers in cyber-security.

Security Call Center Operator — If a kid likes the idea of sitting behind a computer and wearing a headset all day, then customer service might be the answer.

Technical cyber-security positions

Security Engineer — Software coders with an aptitude for cybersecurity are in high demand, and they earn high pay.

Security Analyst — Information security analysts are one of the fastest-growing occupations, according to the US Bureau of Labor Statistics. There were 100,000 job openings in the US last year just for this position alone, and the median salary was $92,600 — and into six-figures in some cities.

Penetration Tester — Breaking and entering, and it’s legal. These positions are held by people who are hired to test an organisation’s security, or lack of it, by attempting cyber intrusions.

Incident Responder — Much like other professional emergency responders that serve their communities, cyber incident responders are the digital counterparts.

Forensic Engineer — If a kid excels at Who, What, Where, When, and Why, then that transfers well to digital forensics, as well as digital investigations.

Cryptographer — Games such as word descramblers and word finders can be a springboard to an education in cryptography.

Security Sales Engineer — Half salesperson and half engineer, these are some of the highest paid people working for cyber-security software companies. Their job? Giving demos and making presentations.

Leadership and management cyber-security roles

Founder — Billions of dollars have been invested into cybersecurity start-ups-over the past few years, and the money is expected to keep flowing. As with any field, there’s room for entrepreneurs of all ages in cybersecurity.

Chief Information Security Officer (CISO) — The security head honchos, CISOs, at large corporations oversee cyber defense and earn anywhere from $200,000 to $500,000 annually, with some salaries reaching as high as $1 million.

Privacy Officer — Data and digital privacy, as well as personal privacy, is a hot topic and offers hot jobs such as Privacy Officers that focus exclusively on this dimension of security.

Compliance and Risk Manager — Organisations globally are responsible for complying with laws that govern data and computer security. Compliance and Risk Officers are tasked with keeping up on this and overseeing the implementation of business processes, technologies, and security that are required by law.

Security Product Manager — All cyber-security software and hardware companies employ marketing professionals who are responsible for branding, public relations, and revenues for specific products.

According to Diamond, there’s up to 32 different cyber-security jobs that women in cyber-security can choose from.

CSO

You Might Also Read: 

Very Few Women Are CISOs:

Room At The Top For Women In Tech:

 

« What is the Industrial IoT?
Inspired: China Measures Citizens' Trustworthiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.