Hiring Good Cyber Security Professionals Is Hard Work

The Coronavirus pandemic has thrown cyber security professionals into an  unprecedented situation, with many facing the most difficult challenges of their career. For Business and IT leaders the challenge is exaggerated by the shortage of qualified cyber security professionals to fill jobs at their organisations. This is despite the relatively high salaries and stability associated with jobs in the field.

In a recent cyber skills survey carried out by Cyberbit,  60% of respondents said that barely half of all applicants for cyber security positions at their companies were properly qualified. This included a lack of adequate skills in intrusion detection, and network monitoring, again with almost 60% saying these are major areas of concern.

Cyber security jobs will grow by 31% between 2019 and 2020, or much faster than the average for virtually all other occupations, the US Bureau of Labor Statistics has projected. In 2020, the worldwide cybersecurity workforce gap, or the difference between the number of skilled professionals required to protect organisations and the number available to fill those roles, declined slightly according to the leading professional certification organistaion (ISC)2. They calculated the  number of unfilled cybersecurity jobs worldwide in 2019 - 2020 to be 3.12 million people worldwide, with 359,000 of those in the US.

Concerns over inadequately prepared cyber security job applicants come even as demand for cyber security jobs remains strong and there are five important reasons why organisations have difficulty  in finding the right cyber security employees.  

  • There is a disconnect exists between HR and the information security team at many organisations.  Cyberbit's survey found that HR departments often do not have a clear idea of cyber security roles and the requirements for those roles; in fact, just one-third of the respondents to the survey felt that HR understood those requirements. The gap can often affect an organisation's ability to attract the right talent for the cybersecurity team.
  • Wrong perceptions about cyber security may be holding back people from entering or exploring the field as a career option.   A 2020 report from (ISC)2 of 2,500 individuals in the US and UK who are not currently in the cyber security field suggests that not enough job seekers are considering a cybersecurity job to close the gaps. Despite a ready availability of jobs, relatively high salaries, and good job stability, many are not drawn to the field because of mistaken perceptions of what the work entails. Many individuals consider the cyber security profession to be one that requires a high level of specialised technical skills, the survey found.

Though 69% agreed that cyber security might offer a good career path, 61% felt that they would need more education or certifications to enter the field. Some 27% felt that their inability to code was a disqualification, while more than one-quarter (26%) described the field as being too intimidating.

  • One important reason why some organisations have a hard time finding cyber security professionals is that they insist on hiring only people with formal four-year degrees in cyber security. That's a mistake, said John Pescatore at the SANS Institute, who thinks that its more valuable  to have hands-on experience with cyber security, rather than merely having attended classroom lectures that talk about doing something.

This is especially true for entry-level cyber security jobs, he said. Many university cyber security degree programs tend not to be very useful to hiring organisations because of their over emphasis on a lecture-driven format, Pescatore said. Often, they are also not especially exciting to creative, inquisitive, and analytical individuals seeking a career in cyber security, he added. 

  • Hiring managers should think more broadly about the requirements for cyber security roles. Academic degrees in cyber security and certifications in the field are important. But not all roles require technical skills. In fact, plenty of opportunities in the cyber security field are good fits for non-technical professionals. 
  • Individuals looking to break into the cyber security profession can help themselves and their employers by picking up coding skills and one of the best skills to break in at the entry level is considered to be Python coding, which was designed to be a straight-forward and generally lightweight scripting language that would require minimal coding background to accomplish automation and analysis.

Tackling the skills shortage calls for a fundamental reassessment of how organisations deal with defining the requirements for cyber security roles. Also, improving the ways in which they communicate those requirements to candidates, especially those who may want to enter the field but are put off by their misconceptions about the profession.

ISC2:          Cyberbit:          TechBeacon:       US Bureau of Labor Statistics:     Image: Unsplash

You Might Also Read: 

Five Reasons Why Women Should Consider A Career In Cyber Security:

« Instagram, TikTok & Twitter Shutdown Stolen Accounts
5G Will Disrupt Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.