Making It Big in Cybersecurity

Cybersecurity expertise is one of the most in-demand skills in today's IT landscape, and those with security proficiency have some of the most promising career options in all of tech.

In the past year alone we’ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others. Most most recently, we saw the biggest hack of them all, the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people.

The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals. In 2016, the global cyber security industry was estimated to be worth $106 billion. By 2023, that’s expected to explode to around $639 billion according to research firm IT-Harvest.

That explosive growth has led to a huge skills gap when it comes to cyber security. Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021.

Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years. According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017.

Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57%. And professional body ISACA’s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer, a huge increase from the 50% just a year before.

The high demand for cyber security experts has also driven wages in the sector considerably. According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017, among the highest rate in any industry.

In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000.

Job salary survey site PayScale reports somewhat similar figures. It lists the median salary of an IT security consultant and computer security specialist at $105,000 - $110,000, with more entry level roles at $88,000. IT security architects can expect a median salary of $135,000+.

Getting Qualified

So how do you get a career in cyber security? Right now there is no official accreditation, although the Australian Information Security Association has been in talks with the Professional Standards Council to create one, but there are plenty of courses one can take to prepare yourself for a career in cyber security.

One example of a qualifying course is the Master of IT Management from Australian Southern Cross University. It’s a two-year part time course that will qualify you for many roles in IT security.

It’s comprised of 12 units, all of which can be completed using the University’s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments. You can jump in and out of the course as your life allows.

Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities.

What you’ll learn in Southern Cross University’s Information Systems Security Management

SCU's Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:

  • How to identify and describe the various threats to the security of digital information and information systems.
  • How to analyse models and practices for managing security of digital information and information systems.
  • How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
  • The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
  • Analysing the need for managing security of digital information and information systems.
  • How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.

TechRadar:

You Might Also Read: 

GCHQ Approved: Ten Cyber Degree Courses:

Want A Career In Cybersecurity?:

How Much Do IT Graduate & Intern Jobs Currently Pay?:

 

« When AI Takes Our jobs, Only Developers Stand A Chance Of Work
Russian Spies Used Kaspersky Anti-V To Hack NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.