Cyber Security Talent Crunch - 3.5m Jobs Vacant

There is a serious shortage of cybersecurity professionals and the gap is expected to lead to at least three and a half million jobs being vacant within the next year according to the experts at Cybersecurity Ventures - an increase of 2.5 million since 2014.
 
This cyber employment figure has been validated by hundreds of media outlets, including the world’s largest, as well as industry associations, universities, governments, vendors, recruitment firms, and security experts. According to (ISC2) there are currently nearly 3 million unfilled cybersecurity jobs worldwide and employees who take on these roles play a key role in the enterprise.
 
As cybercriminals grow more sophisticated and news of major hacks reach headlines nearly daily, cybersecurity professionals are in high demand. 
 
Data breaches can cause devastating financial losses and affect an organisation’s reputation for years. From lost business to regulatory fines and remediation costs, data breaches have far reaching consequences.The annual Cost of a Data Breach Report, conducted by the Ponemon Institute and sponsored by IBM Security, analyzes data breach costs reported by 507 organisations across 16 geographies and 17 industries. hey found  the average cost of a data breach worldwide is about $3.62 million. 
 
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.
 
Why is there an increased demand for cybersecurity professionals?
Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. The rise of the Internet of Things (IoT) has also opened up new threats. To protect their information and that of their clients, companies across all industries are seeking cybersecurity professionals to secure their networks.
However, many enterprises face difficulties filling these positions: 55% of US organisations reported that open cybersecurity positions take at least three months to fill, while 32% said they take six months or more, according to a 2017 ISACA. And 27% of companies said they are unable to fill cybersecurity positions at all. 
 
Cybersecurity remains a relatively new field compared to other computer sciences, so a lack of awareness is part of the reason for the talent shortage, according to Lauren Heyndrickx, CISO at JCPenney. Misconceptions about what a cybersecurity job actually entails are common, and might be part of the reason few women and minorities go into the field, she added. 
 
Women now make up 24% of the cybersecurity workforce, and 45% of those women are millennials, according to an and it's likely that these numbers will continue to grow over time.
 
A job in cybersecurity can also command a high paycheck: The average salary for an information security analyst in the US is $98,350, according to the US Bureau of Labour Statistics and it's significantly higher in cities such as San Francisco and New York. 
 
The shortage of trained cybersecurity professionals has led many organisations to seek other non-traditional candidates to fill these roles. To help those interested in the field better understand how to break into a career in cybersecurity, we've pulled together the most important details and resources.
 
  • Why is there an increased demand for cybersecurity professionals? Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. To protect their information and that of their clients, companies across all industries are seeking cyber professionals to secure their networks.
  • What are some of the cybersecurity job roles? A career in cybersecurity can take the form of various roles, including penetration tester, chief information security officer (CISO), security engineer, incident responder, security software developer, security auditor, or security consultant.
  • What skills are required to work in cybersecurity? The skills required to work in cybersecurity vary depending on the position and company, but generally may include penetration testing, risk analysis, and security assessment. Certifications, including Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP) are also in demand, and can net you a higher salary in the field.
  • Where are the hottest markets for cybersecurity jobs? Top companies including Apple, Lockheed Martin, General Motors, Capital One, and Cisco have all been hiring cyber professionals in recent years. Industries such as healthcare, education, and government are most likely to suffer a cyberattack, which will probably lead to an increase in the number of IT security jobs in these sectors.
  •  What is the average salary of a cybersecurity professional? The average salary for a cybersecurity professional depends on the position. For example, information security analysts earn a median salary of $98,350 per year, according to the US Bureau of Labour Statistics. Meanwhile, CISOs earn a median salary of $221,991, according to Salary.com. Salaries are significantly higher in certain cities, such as San Francisco and New York. 
  • What are typical interview questions for a career in cybersecurity? Questions can vary depending on the position and what the specific company is looking for, according to Forrester analyst Jeff Pollard. For entry and early career roles, more technical questions should be expected. As you move up the ranks, the questions may become more about leadership, running a program, conflict resolution, and budgeting. 
  • Where can I find resources for a career in cybersecurity? ISACA, (ISC2)), ISSA and The SANS Institute are national and international organisations where you can seek out information about the profession as well as certification and training options. A number of universities and online courses also offer cybersecurity-related degrees, certifications, and prep programs.
 
US Bureau of Labor:       TechRepublic:            IBM:           ZDNet:         SC Magazine
 
You Might Also Read:
 
Cyber Security Training Ans Jobs:
 
Cyber Security Training That Employees Don’t Hate:
 
 
« Cyber Spying, Digital Theft & Espionage
Cyber Security 2020 - Some Other Predictions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.