New Cyber Security Jobs

No company, or individual for that matter, with an online presence is immune to attacks. Once a specialty only associated with government agencies and defense contractors, cyber security is now mainstream.  Industries such as healthcare, finance, manufacturing and retail all need to hire cyber security professionals to protect valuable information from cyber breaches. 

Cyber security skills are in high demand and it doesn’t seem like the need for more security professionals is not going to slow down in the foreseeable future. 

According to the US Bureau of Labor Statistics:  “Employment of information security analysts is projected to grow 32 percent from 2018 to 2028, much faster than the average for all occupations. Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks”.

Computer science roles are already in high demand as it is; adding in the element of security makes these roles even more critical and sought after.

The Current State of Cybersecurity Training
With so many jobs available, and the need to fill them so dire, more colleges are offering degrees in cybersecurity, though it has yet to become a staple in undergraduate coursework for students majoring in related fields. For many professionals currently in the cybersecurity field, they learned the necessary skills through certificate programs and in-the-field training versus degree programs. 

For those who are already in the field and want additional training, both Cisco and Microsoft security training certificate programs are common among all professionals looking for certification. Further collegiate education is also an option, but with relatively few schools offering programs, it might not be easy for professionals to find a program nearby that offers what they need.

Common Cyber Security Positions
Jobs that require cyber security know-how will usually have a range of titles. The most common titles, are Security Analyst, Security Engineer or Architect, Security Software Developer, Cryptographer, Cryptanalyst and Security Consultant among other roles. 

Common skills required for cyber security job roles are incident handling and response, audit and compliance, firewall/IDS/IPS skills, intrusion detection, analytics and intelligence, SIEM management, access/identity management, application security development, advanced malware prevention, and cloud computing/virtualisation. 

While these are the most common skills, most cyber security roles require a handful of these skills plus others. Based on a  SANS survey, the top five industries for cybersecurity professionals are Banking/Finance/Insurance, Information Technology/Management, Government (Defense), Government (Nondefense), and Consulting/Professional Services. Not surprisingly, these top industries all deal with sensitive information, which is commonly targeted by attackers.

Just the Beginning
While we’ve already seen a large boom in these jobs and skill sets, it is safe to say that it is only just the beginning for the rise in cyber security roles. Not only will current professionals be able to easily broaden their skill sets with more security training, if colleges continue to expand their offerings, more young talent will continue to fill these roles. 

 SANS:       LearnHowToBecome:     US Bureau of Labor:       Monster   

Looking For A Career In Cybersecurity?
Our Directory of Suppliers lists Job sites and Recruitment firms focused on Cybersecurity talent acquisition, job placements & career development:  HERE 

Access Thousands of Active Cyber Securty Jobs Worldwide Now with JOOBLE

You Might Also Read: 

The Hot Jobs In Cyber Security & How To Get One:


 

 

« Supporting British Healthcare Cybersecurity During COVID-19
Half Of UK Business Has A Critical Cyber Skills Gap »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.