Making It Big in Cybersecurity

Cybersecurity expertise is one of the most in-demand skills in today's IT landscape, and those with security proficiency have some of the most promising career options in all of tech.

In the past year alone we’ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others. Most most recently, we saw the biggest hack of them all, the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people.

The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals. In 2016, the global cyber security industry was estimated to be worth $106 billion. By 2023, that’s expected to explode to around $639 billion according to research firm IT-Harvest.

That explosive growth has led to a huge skills gap when it comes to cyber security. Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021.

Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years. According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017.

Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57%. And professional body ISACA’s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer, a huge increase from the 50% just a year before.

The high demand for cyber security experts has also driven wages in the sector considerably. According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017, among the highest rate in any industry.

In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000.

Job salary survey site PayScale reports somewhat similar figures. It lists the median salary of an IT security consultant and computer security specialist at $105,000 - $110,000, with more entry level roles at $88,000. IT security architects can expect a median salary of $135,000+.

Getting Qualified

So how do you get a career in cyber security? Right now there is no official accreditation, although the Australian Information Security Association has been in talks with the Professional Standards Council to create one, but there are plenty of courses one can take to prepare yourself for a career in cyber security.

One example of a qualifying course is the Master of IT Management from Australian Southern Cross University. It’s a two-year part time course that will qualify you for many roles in IT security.

It’s comprised of 12 units, all of which can be completed using the University’s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments. You can jump in and out of the course as your life allows.

Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities.

What you’ll learn in Southern Cross University’s Information Systems Security Management

SCU's Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:

  • How to identify and describe the various threats to the security of digital information and information systems.
  • How to analyse models and practices for managing security of digital information and information systems.
  • How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
  • The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
  • Analysing the need for managing security of digital information and information systems.
  • How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.

TechRadar:

You Might Also Read: 

GCHQ Approved: Ten Cyber Degree Courses:

Want A Career In Cybersecurity?:

How Much Do IT Graduate & Intern Jobs Currently Pay?:

 

« When AI Takes Our jobs, Only Developers Stand A Chance Of Work
Russian Spies Used Kaspersky Anti-V To Hack NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

TeraByte

TeraByte

TeraByte is an information security company which helps to educate and protect businesses from cyber security related risks.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.