Poaching On the Rise For Big Data Professionals

 

Several recent hiring studies have agreed that recruiting for technology professionals has picked up in the second half of 2015, and that includes hiring for data analysts and data scientists. Indeed, the US Bureau of Labor Statistics confirmed that IT is now the hottest hiring sector of all.

That is putting great pressure on hiring managers to find the best talent wherever possible – including luring it from the competition.
“There is a big job churn going on,” confirms John Reed, senior executive director at Robert Half Technology, of data professionals. “Companies are being very aggressive in engaging employees from competitors, other firms in their industry, there’s a large focus on that right now.”

All of this hiring activity has also shortened the window of opportunity for employers to act. Many active data analysts and data engineers may be fielding multiple offers. The most desirable “passive” candidates (those not actively looking, but ripe for the picking if you can reach out to them) have probably already been targeted.
“If you’re just putting a job posting online and sitting back and waiting to see what you’ll receive, you’re not going to get a lot of people actively looking for jobs,” cautions Reed. “They are typically well paid, in a great spot and companies know what they have so they’re doing everything they can to retain them.”

The pressure is also building to land the top talent actively in the job market.
“Competition among businesses for top IT talent today makes it critical for managers to rethink their recruitment and retention methods,” notes the 2016 IT Salary Guide, just published by Robert Half Technology. “Speeding up hiring times, training from within, filling skills gaps with project professionals and offering attractive compensation can help you hire – and keep – the best and brightest for your organization.”
Reed has advice to both hiring managers and job candidates on how to best find and impress each other in this highly competitive market.

For job seekers, Reed says don’t be fooled that employers have relaxed their standards – they still want lots of skills, experience, business and technology savvy, and strategic thinking in the right candidate.
For hiring managers, don’t forget that you must sell yourself to the candidate as much as they are trying to impress you. Candidates actually in the market probably won’t be for long; and passive candidates need convincing on how and why you offer a better gig.

Recruiting starts with the job posting of course, and that is where the process also ends for some organizations.
“What we see is that people continue to rely a lot on their job postings, and they’re not exciting, they’re not compelling,” Reed says. “When you’re competing for that talent you’ve got to really have a story that is exciting and gets people intrigued.”
“Start there,” Reed stresses. “The people that you want to apply – are you telling them not only about the exciting aspects of your company but the cutting edge work that you’re doing; the technology that they get to work with; and the ability to influence your strategy? Highlighting those things is where it starts.”

As the saying goes, ‘you never get a second chance to make a first impression’, and that holds true in recruiting, Reed notes.
“If they’re looking at you’re posting and it just doesn’t stand out, you won’t get the chance to even speak with them. They won’t even apply to your job,” Reed explains.

Once the hiring manager has gotten a candidate’s attention, then the work of really selling the organization begins.
“Really hone your story when you get the chance to talk to them,” Reed continues. Points to stress include: • Here’s why you want to work for our company. • Here’s why you want to work in our industry. • These are the really cool things that we’re doing. • This is the technology that we’re going to put in your hands. • This is why we really think you should entertain this type of opportunity.
“You’ve got to have that story that really engages the job seeker,” Reed says.

Information-management:  http://bit.ly/1GPlGaz

 

 

 

« Can Russian Submarines Cut Off the Internet?
Europe Is Spying on You »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.