Making It Big in Cybersecurity

Cybersecurity expertise is one of the most in-demand skills in today's IT landscape, and those with security proficiency have some of the most promising career options in all of tech.

In the past year alone we’ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others. Most most recently, we saw the biggest hack of them all, the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people.

The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals. In 2016, the global cyber security industry was estimated to be worth $106 billion. By 2023, that’s expected to explode to around $639 billion according to research firm IT-Harvest.

That explosive growth has led to a huge skills gap when it comes to cyber security. Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021.

Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years. According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017.

Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57%. And professional body ISACA’s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer, a huge increase from the 50% just a year before.

The high demand for cyber security experts has also driven wages in the sector considerably. According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017, among the highest rate in any industry.

In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000.

Job salary survey site PayScale reports somewhat similar figures. It lists the median salary of an IT security consultant and computer security specialist at $105,000 - $110,000, with more entry level roles at $88,000. IT security architects can expect a median salary of $135,000+.

Getting Qualified

So how do you get a career in cyber security? Right now there is no official accreditation, although the Australian Information Security Association has been in talks with the Professional Standards Council to create one, but there are plenty of courses one can take to prepare yourself for a career in cyber security.

One example of a qualifying course is the Master of IT Management from Australian Southern Cross University. It’s a two-year part time course that will qualify you for many roles in IT security.

It’s comprised of 12 units, all of which can be completed using the University’s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments. You can jump in and out of the course as your life allows.

Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities.

What you’ll learn in Southern Cross University’s Information Systems Security Management

SCU's Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:

  • How to identify and describe the various threats to the security of digital information and information systems.
  • How to analyse models and practices for managing security of digital information and information systems.
  • How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
  • The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
  • Analysing the need for managing security of digital information and information systems.
  • How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.

TechRadar:

You Might Also Read: 

GCHQ Approved: Ten Cyber Degree Courses:

Want A Career In Cybersecurity?:

How Much Do IT Graduate & Intern Jobs Currently Pay?:

 

« When AI Takes Our jobs, Only Developers Stand A Chance Of Work
Russian Spies Used Kaspersky Anti-V To Hack NSA »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.