Girls Are Future Cybercrime Fighters

The Girl Scouts of the USA announced the introduction of 18 new cybersecurity badges this past spring. As a result, Girls Scouts of all ages  are able to explore opportunities in STEM while developing problem-solving and leadership skills starting in 2018.

An official press release from The Girl Scouts of the USA states that according to the latest Cybersecurity Jobs Report by Cybersecurity Ventures, the worldwide deficit of qualified cyber-security professionals will reach 3.5 million by 2021.

The data suggests there’s a lot of career opportunity for girls in cyber. But only 11 percent of the world's information security workforce are women, according to numerous sources.

Why so few women? The Computing Technology Industry Association states that 69 percent of women who have not pursued careers in information technology attribute their choice to not knowing what opportunities are available to them.

A study by Raytheon indicates that less than half of high school students have been approached by a parent, teacher or guidance counselor about an education or career in cyber-security.

If parents and educators don’t start talking to their daughters about cybersecurity now, then it will perpetuate the problem and hold down the number of women entering the field.

Guiding kids to careers in Cybersecurity

The National Cybersecurity Alliance publishes a Parent Primer for Guiding Kids to Careers in Cybersecurity. It’s a quick read chock-full of excellent resources to help parents get up to speed on cybersecurity if they aren’t already.

One of the biggest myths about cyber-security is that all of the jobs involve sitting behind a computer for the day. While that may be true of some positions, it’s hardly the case for all of them.

Diedre Diamond, founder and CEO of CyberSN, a cybersecurity staffing firm, and #Brainbabe, an organization dedicated to the advancement of women in cyber-security, shared a list of cyber-security jobs that sheds more light on career possibilities for girls.

Here is Diamond’s list, narrowed down and with added some commentary for parents to consider.

Non-technical cyber-security jobs

Security Sales Account Manager — A good salesperson can sell anything: Girl Scout cookies, technology, you name it. Why not sell in the cybersecurity market that is predicted to exceed $1 trillion cumulatively over the next five years.

Cybersecurity Recruiter — A high schooler with a knack for match-making might transfer that experience into the world of head-hunting cyber fighters.

Cybersecurity Attorney — Thinking of law? Then think cyber law. It’s a lucrative niche with far more upside than a general practitioner.

Cyber Insurance Specialist — Insurance broker? Nah. Cyber insurance broker? Yup. Cyber-security insurance is the next breakout category in our industry.

Security Awareness Trainer — If you know something about cyber-security, then you know more than most people. The market for training employees on security is exploding and so is the market for professional trainers in cyber-security.

Security Call Center Operator — If a kid likes the idea of sitting behind a computer and wearing a headset all day, then customer service might be the answer.

Technical cyber-security positions

Security Engineer — Software coders with an aptitude for cybersecurity are in high demand, and they earn high pay.

Security Analyst — Information security analysts are one of the fastest-growing occupations, according to the US Bureau of Labor Statistics. There were 100,000 job openings in the US last year just for this position alone, and the median salary was $92,600 — and into six-figures in some cities.

Penetration Tester — Breaking and entering, and it’s legal. These positions are held by people who are hired to test an organisation’s security, or lack of it, by attempting cyber intrusions.

Incident Responder — Much like other professional emergency responders that serve their communities, cyber incident responders are the digital counterparts.

Forensic Engineer — If a kid excels at Who, What, Where, When, and Why, then that transfers well to digital forensics, as well as digital investigations.

Cryptographer — Games such as word descramblers and word finders can be a springboard to an education in cryptography.

Security Sales Engineer — Half salesperson and half engineer, these are some of the highest paid people working for cyber-security software companies. Their job? Giving demos and making presentations.

Leadership and management cyber-security roles

Founder — Billions of dollars have been invested into cybersecurity start-ups-over the past few years, and the money is expected to keep flowing. As with any field, there’s room for entrepreneurs of all ages in cybersecurity.

Chief Information Security Officer (CISO) — The security head honchos, CISOs, at large corporations oversee cyber defense and earn anywhere from $200,000 to $500,000 annually, with some salaries reaching as high as $1 million.

Privacy Officer — Data and digital privacy, as well as personal privacy, is a hot topic and offers hot jobs such as Privacy Officers that focus exclusively on this dimension of security.

Compliance and Risk Manager — Organisations globally are responsible for complying with laws that govern data and computer security. Compliance and Risk Officers are tasked with keeping up on this and overseeing the implementation of business processes, technologies, and security that are required by law.

Security Product Manager — All cyber-security software and hardware companies employ marketing professionals who are responsible for branding, public relations, and revenues for specific products.

According to Diamond, there’s up to 32 different cyber-security jobs that women in cyber-security can choose from.

CSO

You Might Also Read: 

Very Few Women Are CISOs:

Room At The Top For Women In Tech:

 

« What is the Industrial IoT?
Inspired: China Measures Citizens' Trustworthiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Data Protection Commission (DPC)

Data Protection Commission (DPC)

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.