Cyber Security Talent Crunch - 3.5m Jobs Vacant

There is a serious shortage of cybersecurity professionals and the gap is expected to lead to at least three and a half million jobs being vacant within the next year according to the experts at Cybersecurity Ventures - an increase of 2.5 million since 2014.
 
This cyber employment figure has been validated by hundreds of media outlets, including the world’s largest, as well as industry associations, universities, governments, vendors, recruitment firms, and security experts. According to (ISC2) there are currently nearly 3 million unfilled cybersecurity jobs worldwide and employees who take on these roles play a key role in the enterprise.
 
As cybercriminals grow more sophisticated and news of major hacks reach headlines nearly daily, cybersecurity professionals are in high demand. 
 
Data breaches can cause devastating financial losses and affect an organisation’s reputation for years. From lost business to regulatory fines and remediation costs, data breaches have far reaching consequences.The annual Cost of a Data Breach Report, conducted by the Ponemon Institute and sponsored by IBM Security, analyzes data breach costs reported by 507 organisations across 16 geographies and 17 industries. hey found  the average cost of a data breach worldwide is about $3.62 million. 
 
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.
 
Why is there an increased demand for cybersecurity professionals?
Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. The rise of the Internet of Things (IoT) has also opened up new threats. To protect their information and that of their clients, companies across all industries are seeking cybersecurity professionals to secure their networks.
However, many enterprises face difficulties filling these positions: 55% of US organisations reported that open cybersecurity positions take at least three months to fill, while 32% said they take six months or more, according to a 2017 ISACA. And 27% of companies said they are unable to fill cybersecurity positions at all. 
 
Cybersecurity remains a relatively new field compared to other computer sciences, so a lack of awareness is part of the reason for the talent shortage, according to Lauren Heyndrickx, CISO at JCPenney. Misconceptions about what a cybersecurity job actually entails are common, and might be part of the reason few women and minorities go into the field, she added. 
 
Women now make up 24% of the cybersecurity workforce, and 45% of those women are millennials, according to an and it's likely that these numbers will continue to grow over time.
 
A job in cybersecurity can also command a high paycheck: The average salary for an information security analyst in the US is $98,350, according to the US Bureau of Labour Statistics and it's significantly higher in cities such as San Francisco and New York. 
 
The shortage of trained cybersecurity professionals has led many organisations to seek other non-traditional candidates to fill these roles. To help those interested in the field better understand how to break into a career in cybersecurity, we've pulled together the most important details and resources.
 
  • Why is there an increased demand for cybersecurity professionals? Cybercrime has exploded in the past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises' data at risk. To protect their information and that of their clients, companies across all industries are seeking cyber professionals to secure their networks.
  • What are some of the cybersecurity job roles? A career in cybersecurity can take the form of various roles, including penetration tester, chief information security officer (CISO), security engineer, incident responder, security software developer, security auditor, or security consultant.
  • What skills are required to work in cybersecurity? The skills required to work in cybersecurity vary depending on the position and company, but generally may include penetration testing, risk analysis, and security assessment. Certifications, including Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP) are also in demand, and can net you a higher salary in the field.
  • Where are the hottest markets for cybersecurity jobs? Top companies including Apple, Lockheed Martin, General Motors, Capital One, and Cisco have all been hiring cyber professionals in recent years. Industries such as healthcare, education, and government are most likely to suffer a cyberattack, which will probably lead to an increase in the number of IT security jobs in these sectors.
  •  What is the average salary of a cybersecurity professional? The average salary for a cybersecurity professional depends on the position. For example, information security analysts earn a median salary of $98,350 per year, according to the US Bureau of Labour Statistics. Meanwhile, CISOs earn a median salary of $221,991, according to Salary.com. Salaries are significantly higher in certain cities, such as San Francisco and New York. 
  • What are typical interview questions for a career in cybersecurity? Questions can vary depending on the position and what the specific company is looking for, according to Forrester analyst Jeff Pollard. For entry and early career roles, more technical questions should be expected. As you move up the ranks, the questions may become more about leadership, running a program, conflict resolution, and budgeting. 
  • Where can I find resources for a career in cybersecurity? ISACA, (ISC2)), ISSA and The SANS Institute are national and international organisations where you can seek out information about the profession as well as certification and training options. A number of universities and online courses also offer cybersecurity-related degrees, certifications, and prep programs.
 
US Bureau of Labor:       TechRepublic:            IBM:           ZDNet:         SC Magazine
 
You Might Also Read:
 
Cyber Security Training Ans Jobs:
 
Cyber Security Training That Employees Don’t Hate:
 
 
« Cyber Spying, Digital Theft & Espionage
Cyber Security 2020 - Some Other Predictions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

CommVault Systems

CommVault Systems

CommVault is focused on helping organisations protect, manage, find and use their data and information quickly, simply and cost effectively.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Pirean

Pirean

Recognised experts in Identity and Access Management, we deliver best practice solutions through Software and Consulting Services, supporting organisations in the secure access of systems and services

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Red Canari

Red Canari

Red Canari are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Modular Law

Modular Law

Modular Law is a specialist IT law firm focused exclusively on technology, outsourcing and digital projects.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.