Poaching On the Rise For Big Data Professionals

 

Several recent hiring studies have agreed that recruiting for technology professionals has picked up in the second half of 2015, and that includes hiring for data analysts and data scientists. Indeed, the US Bureau of Labor Statistics confirmed that IT is now the hottest hiring sector of all.

That is putting great pressure on hiring managers to find the best talent wherever possible – including luring it from the competition.
“There is a big job churn going on,” confirms John Reed, senior executive director at Robert Half Technology, of data professionals. “Companies are being very aggressive in engaging employees from competitors, other firms in their industry, there’s a large focus on that right now.”

All of this hiring activity has also shortened the window of opportunity for employers to act. Many active data analysts and data engineers may be fielding multiple offers. The most desirable “passive” candidates (those not actively looking, but ripe for the picking if you can reach out to them) have probably already been targeted.
“If you’re just putting a job posting online and sitting back and waiting to see what you’ll receive, you’re not going to get a lot of people actively looking for jobs,” cautions Reed. “They are typically well paid, in a great spot and companies know what they have so they’re doing everything they can to retain them.”

The pressure is also building to land the top talent actively in the job market.
“Competition among businesses for top IT talent today makes it critical for managers to rethink their recruitment and retention methods,” notes the 2016 IT Salary Guide, just published by Robert Half Technology. “Speeding up hiring times, training from within, filling skills gaps with project professionals and offering attractive compensation can help you hire – and keep – the best and brightest for your organization.”
Reed has advice to both hiring managers and job candidates on how to best find and impress each other in this highly competitive market.

For job seekers, Reed says don’t be fooled that employers have relaxed their standards – they still want lots of skills, experience, business and technology savvy, and strategic thinking in the right candidate.
For hiring managers, don’t forget that you must sell yourself to the candidate as much as they are trying to impress you. Candidates actually in the market probably won’t be for long; and passive candidates need convincing on how and why you offer a better gig.

Recruiting starts with the job posting of course, and that is where the process also ends for some organizations.
“What we see is that people continue to rely a lot on their job postings, and they’re not exciting, they’re not compelling,” Reed says. “When you’re competing for that talent you’ve got to really have a story that is exciting and gets people intrigued.”
“Start there,” Reed stresses. “The people that you want to apply – are you telling them not only about the exciting aspects of your company but the cutting edge work that you’re doing; the technology that they get to work with; and the ability to influence your strategy? Highlighting those things is where it starts.”

As the saying goes, ‘you never get a second chance to make a first impression’, and that holds true in recruiting, Reed notes.
“If they’re looking at you’re posting and it just doesn’t stand out, you won’t get the chance to even speak with them. They won’t even apply to your job,” Reed explains.

Once the hiring manager has gotten a candidate’s attention, then the work of really selling the organization begins.
“Really hone your story when you get the chance to talk to them,” Reed continues. Points to stress include: • Here’s why you want to work for our company. • Here’s why you want to work in our industry. • These are the really cool things that we’re doing. • This is the technology that we’re going to put in your hands. • This is why we really think you should entertain this type of opportunity.
“You’ve got to have that story that really engages the job seeker,” Reed says.

Information-management:  http://bit.ly/1GPlGaz

 

 

 

« Can Russian Submarines Cut Off the Internet?
Europe Is Spying on You »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.