Poaching On the Rise For Big Data Professionals

 

Several recent hiring studies have agreed that recruiting for technology professionals has picked up in the second half of 2015, and that includes hiring for data analysts and data scientists. Indeed, the US Bureau of Labor Statistics confirmed that IT is now the hottest hiring sector of all.

That is putting great pressure on hiring managers to find the best talent wherever possible – including luring it from the competition.
“There is a big job churn going on,” confirms John Reed, senior executive director at Robert Half Technology, of data professionals. “Companies are being very aggressive in engaging employees from competitors, other firms in their industry, there’s a large focus on that right now.”

All of this hiring activity has also shortened the window of opportunity for employers to act. Many active data analysts and data engineers may be fielding multiple offers. The most desirable “passive” candidates (those not actively looking, but ripe for the picking if you can reach out to them) have probably already been targeted.
“If you’re just putting a job posting online and sitting back and waiting to see what you’ll receive, you’re not going to get a lot of people actively looking for jobs,” cautions Reed. “They are typically well paid, in a great spot and companies know what they have so they’re doing everything they can to retain them.”

The pressure is also building to land the top talent actively in the job market.
“Competition among businesses for top IT talent today makes it critical for managers to rethink their recruitment and retention methods,” notes the 2016 IT Salary Guide, just published by Robert Half Technology. “Speeding up hiring times, training from within, filling skills gaps with project professionals and offering attractive compensation can help you hire – and keep – the best and brightest for your organization.”
Reed has advice to both hiring managers and job candidates on how to best find and impress each other in this highly competitive market.

For job seekers, Reed says don’t be fooled that employers have relaxed their standards – they still want lots of skills, experience, business and technology savvy, and strategic thinking in the right candidate.
For hiring managers, don’t forget that you must sell yourself to the candidate as much as they are trying to impress you. Candidates actually in the market probably won’t be for long; and passive candidates need convincing on how and why you offer a better gig.

Recruiting starts with the job posting of course, and that is where the process also ends for some organizations.
“What we see is that people continue to rely a lot on their job postings, and they’re not exciting, they’re not compelling,” Reed says. “When you’re competing for that talent you’ve got to really have a story that is exciting and gets people intrigued.”
“Start there,” Reed stresses. “The people that you want to apply – are you telling them not only about the exciting aspects of your company but the cutting edge work that you’re doing; the technology that they get to work with; and the ability to influence your strategy? Highlighting those things is where it starts.”

As the saying goes, ‘you never get a second chance to make a first impression’, and that holds true in recruiting, Reed notes.
“If they’re looking at you’re posting and it just doesn’t stand out, you won’t get the chance to even speak with them. They won’t even apply to your job,” Reed explains.

Once the hiring manager has gotten a candidate’s attention, then the work of really selling the organization begins.
“Really hone your story when you get the chance to talk to them,” Reed continues. Points to stress include: • Here’s why you want to work for our company. • Here’s why you want to work in our industry. • These are the really cool things that we’re doing. • This is the technology that we’re going to put in your hands. • This is why we really think you should entertain this type of opportunity.
“You’ve got to have that story that really engages the job seeker,” Reed says.

Information-management:  http://bit.ly/1GPlGaz

 

 

 

« Can Russian Submarines Cut Off the Internet?
Europe Is Spying on You »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.