Why Is The Skills Shortage So Big?

The rapid growth of increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses. Digitisation, sensitive data and privacy concerns mean businesses are crying out for technical specialists, managers, CISOs and people with cross-functional expertise.

Companies from different industries are expected to keep their customers’ data safe and secure, but the growing shortage of qualified cybersecurity professionals is making it difficult to do that. 

More than half of all organisations report a “problematic shortage” of cyber security skills, and there is no end in sight.
It is now estimated that the number of unfilled cyber security positions will grow to a staggering 3.5 million by 2021. 

The problem is not lack of ability in the existing workforce, nor lack of promising young people wanting to work in the field. The hard-to-fill roles tend to be those in cyber security areas with a lower profile, the less talked about specialisations.

Many employers are training their staff in specific products, rather than wider security frameworks, so staff aren’t getting the transferable skills they need. This means experienced cyber specialists spend most of their time dealing with emergencies, instead of planning for the future or training staff. 

In building a successful career in cyber security, choosing the right specialism and the right mix of skills to develop will give you an advantage in potential earnings and a greater choice of  employers

Be equally skilled in tech and legal
Specialising in cyber security and the law covers privacy, compliance and data protection legislation. These specialists, such as privacy officers and data protection officers, should be equally skilled in law and cybersecurity technology. They help companies find ways to organise digital data storage, processing and protection that comply with legislation.

The demand for cyber security and law specialists will grow as privacy and personal data regulations increasingly cover these services. Specialists in this area tend to be more skilled in law than technology. For example, data protection officers can usually tell the company how it should organise data processing and protection, but they can’t always say how to achieve that. When communicating with IT specialists, they need to know how to speak their language.

Be able to connect all the pieces
Cybersecurity architects design and test cyber security systems. It’s a more well-known role, but demand is still outstripping supply. Companies want experts who can see the whole picture and connect all the pieces to make one mechanism that works. Cybersecurity architects need to know as much detail as dedicated experts, but they need to know enough to build proper protection systems, such as how parts of the infrastructure work together. They also need strong management skills.

Be able to detect anomalies in constant white noise
While fewer workplaces need more exclusive specialisations like big data analysis, there’s still a lack of skilled people.
Big data analysts build mathematical models to detect anomalies. If a company needs advanced-level cyber protection or offers specific cyber security services like system integration, they’ll probably need a big data analyst. Ecommerce, banks and digital services also use big data analysis and math modeling, as does any business that holds data about user behavior and events. 

To detect behavior anomalies in constant white noise, and create algorithms to describe what happens in response, you’ll need strong analytical, mathematical, statistical and modeling skills, and in-depth knowledge of cyber-threats and attacks.
In the US, you could earn $117,000 as a cyber security data scientist

Strong on detection and response
There are still opportunities and room for improvement in traditional and common specialisations. As the cybersecurity industry has learned, no organisation can prevent all attacks and breaches, detection and response are now more central than threat prevention. Companies need to be able to track attacks and breaches early and minimise damage. This means SOCs need specialists who can detect threats and know what to do next. They’ll know how to create detection rules and algorithms for detecting attacks and incorrect user behavior.

Soft skills
Managers in cyber security often lack ‘soft skills’ like communication, leadership, negotiation and business sense. 
Cybersecurity managers should be able to organise their department’s work to meet business demands. They should be persuasive and able to speak in the language other parts of the business use. 

Leadership skills are one way to stand out from the crowd; it looks like most cyber security professionals don’t yet consider leadership skills a priority, even in top management positions. 

Filling the Skills Gap
As university programs are limited and academic, self-education is vital. Students should choose one or more specialism to develop. They should find out what skills and knowledge it requires, and proactively develop those using the many educational materials and communities out there. When you start work, CPD (continuing professional development) is the mindset to adopt. Taking on tasks that develop new skills will help your career, as well as avoiding too much routine, which can lead to burnout.

‘Learn by doing’ is still the most effective way to gain knowledge and skills. When you ask your peers and managers to involve you in activities around the knowledge and skills you need, you’ll learn quickly and gain confidence while distributing the workload. Everybody wins.

Employers can also help. Many companies, especially IT vendors, are investing in employee education, training and development around cyber security. Employees need to understand the business’s priorities and choose a direction they want to develop in.

Building a career means not only developing skills and knowledge but making these visible above and beyond daily routines. This means having the courage to put yourself forward. 

GovUK:       IPSOS:        Kaspersky:       Varonis:       CSO Online:       OneFile


You Might Also Read:

Every Single Employee Requires Cyber Security Training:

Cyber Jobs And Professional Training:

 

 

 

« Ransomware Authors Go Beyond Malicious Encryption
Massive Business Cost Savings With Effective Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.