Why Is The Skills Shortage So Big?

The rapid growth of increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses. Digitisation, sensitive data and privacy concerns mean businesses are crying out for technical specialists, managers, CISOs and people with cross-functional expertise.

Companies from different industries are expected to keep their customers’ data safe and secure, but the growing shortage of qualified cybersecurity professionals is making it difficult to do that. 

More than half of all organisations report a “problematic shortage” of cyber security skills, and there is no end in sight.
It is now estimated that the number of unfilled cyber security positions will grow to a staggering 3.5 million by 2021. 

The problem is not lack of ability in the existing workforce, nor lack of promising young people wanting to work in the field. The hard-to-fill roles tend to be those in cyber security areas with a lower profile, the less talked about specialisations.

Many employers are training their staff in specific products, rather than wider security frameworks, so staff aren’t getting the transferable skills they need. This means experienced cyber specialists spend most of their time dealing with emergencies, instead of planning for the future or training staff. 

In building a successful career in cyber security, choosing the right specialism and the right mix of skills to develop will give you an advantage in potential earnings and a greater choice of  employers

Be equally skilled in tech and legal
Specialising in cyber security and the law covers privacy, compliance and data protection legislation. These specialists, such as privacy officers and data protection officers, should be equally skilled in law and cybersecurity technology. They help companies find ways to organise digital data storage, processing and protection that comply with legislation.

The demand for cyber security and law specialists will grow as privacy and personal data regulations increasingly cover these services. Specialists in this area tend to be more skilled in law than technology. For example, data protection officers can usually tell the company how it should organise data processing and protection, but they can’t always say how to achieve that. When communicating with IT specialists, they need to know how to speak their language.

Be able to connect all the pieces
Cybersecurity architects design and test cyber security systems. It’s a more well-known role, but demand is still outstripping supply. Companies want experts who can see the whole picture and connect all the pieces to make one mechanism that works. Cybersecurity architects need to know as much detail as dedicated experts, but they need to know enough to build proper protection systems, such as how parts of the infrastructure work together. They also need strong management skills.

Be able to detect anomalies in constant white noise
While fewer workplaces need more exclusive specialisations like big data analysis, there’s still a lack of skilled people.
Big data analysts build mathematical models to detect anomalies. If a company needs advanced-level cyber protection or offers specific cyber security services like system integration, they’ll probably need a big data analyst. Ecommerce, banks and digital services also use big data analysis and math modeling, as does any business that holds data about user behavior and events. 

To detect behavior anomalies in constant white noise, and create algorithms to describe what happens in response, you’ll need strong analytical, mathematical, statistical and modeling skills, and in-depth knowledge of cyber-threats and attacks.
In the US, you could earn $117,000 as a cyber security data scientist

Strong on detection and response
There are still opportunities and room for improvement in traditional and common specialisations. As the cybersecurity industry has learned, no organisation can prevent all attacks and breaches, detection and response are now more central than threat prevention. Companies need to be able to track attacks and breaches early and minimise damage. This means SOCs need specialists who can detect threats and know what to do next. They’ll know how to create detection rules and algorithms for detecting attacks and incorrect user behavior.

Soft skills
Managers in cyber security often lack ‘soft skills’ like communication, leadership, negotiation and business sense. 
Cybersecurity managers should be able to organise their department’s work to meet business demands. They should be persuasive and able to speak in the language other parts of the business use. 

Leadership skills are one way to stand out from the crowd; it looks like most cyber security professionals don’t yet consider leadership skills a priority, even in top management positions. 

Filling the Skills Gap
As university programs are limited and academic, self-education is vital. Students should choose one or more specialism to develop. They should find out what skills and knowledge it requires, and proactively develop those using the many educational materials and communities out there. When you start work, CPD (continuing professional development) is the mindset to adopt. Taking on tasks that develop new skills will help your career, as well as avoiding too much routine, which can lead to burnout.

‘Learn by doing’ is still the most effective way to gain knowledge and skills. When you ask your peers and managers to involve you in activities around the knowledge and skills you need, you’ll learn quickly and gain confidence while distributing the workload. Everybody wins.

Employers can also help. Many companies, especially IT vendors, are investing in employee education, training and development around cyber security. Employees need to understand the business’s priorities and choose a direction they want to develop in.

Building a career means not only developing skills and knowledge but making these visible above and beyond daily routines. This means having the courage to put yourself forward. 

GovUK:       IPSOS:        Kaspersky:       Varonis:       CSO Online:       OneFile


You Might Also Read:

Every Single Employee Requires Cyber Security Training:

Cyber Jobs And Professional Training:

 

 

 

« Ransomware Authors Go Beyond Malicious Encryption
Massive Business Cost Savings With Effective Cyber Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

Emagine IT

Emagine IT

Emagine IT supports federal agencies and enterprises by leveraging a data-first approach to delivering cutting-edge IT, cybersecurity, and digital transformation services.