Making It Big in Cybersecurity

Cybersecurity expertise is one of the most in-demand skills in today's IT landscape, and those with security proficiency have some of the most promising career options in all of tech.

In the past year alone we’ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others. Most most recently, we saw the biggest hack of them all, the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people.

The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals. In 2016, the global cyber security industry was estimated to be worth $106 billion. By 2023, that’s expected to explode to around $639 billion according to research firm IT-Harvest.

That explosive growth has led to a huge skills gap when it comes to cyber security. Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021.

Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years. According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017.

Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57%. And professional body ISACA’s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer, a huge increase from the 50% just a year before.

The high demand for cyber security experts has also driven wages in the sector considerably. According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017, among the highest rate in any industry.

In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000.

Job salary survey site PayScale reports somewhat similar figures. It lists the median salary of an IT security consultant and computer security specialist at $105,000 - $110,000, with more entry level roles at $88,000. IT security architects can expect a median salary of $135,000+.

Getting Qualified

So how do you get a career in cyber security? Right now there is no official accreditation, although the Australian Information Security Association has been in talks with the Professional Standards Council to create one, but there are plenty of courses one can take to prepare yourself for a career in cyber security.

One example of a qualifying course is the Master of IT Management from Australian Southern Cross University. It’s a two-year part time course that will qualify you for many roles in IT security.

It’s comprised of 12 units, all of which can be completed using the University’s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments. You can jump in and out of the course as your life allows.

Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities.

What you’ll learn in Southern Cross University’s Information Systems Security Management

SCU's Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:

  • How to identify and describe the various threats to the security of digital information and information systems.
  • How to analyse models and practices for managing security of digital information and information systems.
  • How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
  • The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
  • Analysing the need for managing security of digital information and information systems.
  • How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.

TechRadar:

You Might Also Read: 

GCHQ Approved: Ten Cyber Degree Courses:

Want A Career In Cybersecurity?:

How Much Do IT Graduate & Intern Jobs Currently Pay?:

 

« When AI Takes Our jobs, Only Developers Stand A Chance Of Work
Russian Spies Used Kaspersky Anti-V To Hack NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.