Careers In Cloud Security

A new study has revealed that professionals see cloud security as the most important technical skill that those entering a cyber security career should possess. 

Recruiters should think outside the box when looking for new talent, advises a study released today by cyber security association (ISC)².

Problem solving was rated the most important soft skill.

Key findings include:

  • Just over half of cyber security pros have degrees in computer and information services.
  • Four in 10 said a dedicated security education is critical for a role in cybersecurity. 
  • Half of cyber security professionals who are new to the sector (with less than three years of experience) had an existing IT background before moving into cyber, compared to 63% of those with between three and seven years of experience. Some 46% of those surveyed do not consider an IT background to be a critical requirement to work in cyber security.
  • Ex-military and law enforcement personnel made up 31% of the respondents, reinforcing the opportunities for career changing from these sectors into cyber security.

(ISC)2 the world’s largest non-profit association of certified cyber security professionals has released the findings of its 2021 Cybersecurity Career Pursuers Study.

And this report provides insights on how to successfully create a balanced and diverse cyber security team with a broad range of skills. The report focuses on the workplace realities and skills of over 2,000 individuals working in in cyber security.

“One of the biggest challenges we have in cyber security is an acute lack of market awareness about what cyber security jobs entail,” said Clar Rosso, CEO of (ISC)2. “There are wide variations in the kinds of tasks entry-level and junior staff can expect. Hiring organisations and their cyber security leadership need to adopt more mature strategies for building teams.

Many organisations still default to job descriptions that rely on cyber security ‘all stars’ who can do it all. The reality is that there are not enough of those individuals to go around, and the smart bet is to hire and invest in people with an ability to learn, who fit your culture and who can be a catalyst for robust, resilient teams for years to come.

Additional highlighted findings include:

  • While cyber security professionals tend to be highly educated, just 51% have degrees in computer and information services. Less than half (42%) of the professionals who responded said a dedicated security education is critical for a role in cyber security.
  • While IT jobs are the leading gateway to cybersecurity roles, that entry pathway is shifting. Half of those newer to the field (with less than three years of experience) came from an IT background, compared to 63% of those with between three and seven years of experience in the field.
  • By a wide margin, fewer professionals who are relatively new to the field (less than three years) consider IT experience to be critical (46%) than do their more senior colleagues (69%)
  • Military veterans and those with law enforcement experience make up 31% of the cybersecurity professional respondents, affirming these backgrounds as ripe areas for recruitment
  • Cloud security was rated by professionals as the most important technical skill new entrants to the field should learn, while problem solving was the top-rated “soft skill” they should have. Both areas were simultaneously the top-rated responses by career pursuers too.

(ISC)2 :

You Might Also Read: 

Hiring Good Cyber Security Professionals Is Hard Work:

 

« Automation & Industry 4.0
Pipeline Hack: Biden Issues An Executive Order »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.