Cyber Security Experts Needed in Australia

Technology is one of the fastest growing sectors in Australia and with digital transformation on the rise, the workforce needs to keep growing. According to Australia’s Digital Pulse 2019, the  latest annual investigation into the state of the country’s IT sector more than100,000 tech workers are needed by 2024.

The Australian Associations of ICT Profesioanls (ACS) President, Yohan Ramasundara, says Australia has to keep preparing itslelf for the fourth industrial revolution. “Meeting the voracious demands for more technology workers and increased investments from Australia’s businesses will be a huge challenge,” said. 

The fact there is a chronic shortage sees students snapped up before graduation.

As businesses and organisations around the world shore up their defences against cyber threats, the demand for cyber experts has dramatically increased.

Supply is not keeping up with Demand
Although Australia is facing a general IT skills shortages, the lack of cyber experts might be attributed to the special set of skills needed for these roles, although Australia is well-poised to become a breeding ground for cyber-security professionals.
Richard Buckland is a Professor in Cyberwar, Cybercrime, and Cyber-terror at the University of New South Wales. His experience with sending cyber students into the workforce has been tremendously positive.

“I certainly meet employers a lot and they’re really keen to come out to the uni and meet the students..... They often ask if I can put them in touch with some of my good students and I have to say ‘I can’t because they’ve already got jobs”” Professor Buckland has said.

The wide range of skills required to excel in cyber means there is often a dearth of talented specialists.“Cyber’s all about breaking the rules so we need people with a devious, lateral thinking, skeptical mindset,” says Professor Buckland. 

This last trait, being a rascal, is especially important to thrive in cybersecurity’s attacker/defender world.

For employers and educators alike, the idea of fostering non-conventional thinking can trigger alarm bells. Not only does Professor Buckland think the education system ought to encourage more rascal thinking and less conformity, he has also discovered a profound level of trustworthiness in unlikely places. Even if these various traits are rare to find in combination, Professor Buckland thinks Australia is uniquely positioned to continue producing high-quality cybersecurity experts.

“Australia is well-placed to have great cyber strength because our national characteristics of fairness, of decency, our sense of patriotism, coupled with a sense of skepticism, a sense of humour, and a sense of rascal playfulness, and really that’s the perfect storm for a good cyber person.”

ACS Insights 1:       ACS Insights 2:

You Might Also Read: 

Cyber Security Jobs & The Skills Gap:

 

« IT Governance - FREE Guide
The WannaCry Hangover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Tracer

Tracer

Tracer is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.