Making It Big in Cybersecurity

Cybersecurity expertise is one of the most in-demand skills in today's IT landscape, and those with security proficiency have some of the most promising career options in all of tech.

In the past year alone we’ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others. Most most recently, we saw the biggest hack of them all, the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people.

The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals. In 2016, the global cyber security industry was estimated to be worth $106 billion. By 2023, that’s expected to explode to around $639 billion according to research firm IT-Harvest.

That explosive growth has led to a huge skills gap when it comes to cyber security. Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021.

Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years. According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017.

Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57%. And professional body ISACA’s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer, a huge increase from the 50% just a year before.

The high demand for cyber security experts has also driven wages in the sector considerably. According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017, among the highest rate in any industry.

In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000.

Job salary survey site PayScale reports somewhat similar figures. It lists the median salary of an IT security consultant and computer security specialist at $105,000 - $110,000, with more entry level roles at $88,000. IT security architects can expect a median salary of $135,000+.

Getting Qualified

So how do you get a career in cyber security? Right now there is no official accreditation, although the Australian Information Security Association has been in talks with the Professional Standards Council to create one, but there are plenty of courses one can take to prepare yourself for a career in cyber security.

One example of a qualifying course is the Master of IT Management from Australian Southern Cross University. It’s a two-year part time course that will qualify you for many roles in IT security.

It’s comprised of 12 units, all of which can be completed using the University’s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments. You can jump in and out of the course as your life allows.

Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities.

What you’ll learn in Southern Cross University’s Information Systems Security Management

SCU's Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:

  • How to identify and describe the various threats to the security of digital information and information systems.
  • How to analyse models and practices for managing security of digital information and information systems.
  • How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
  • The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
  • Analysing the need for managing security of digital information and information systems.
  • How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.

TechRadar:

You Might Also Read: 

GCHQ Approved: Ten Cyber Degree Courses:

Want A Career In Cybersecurity?:

How Much Do IT Graduate & Intern Jobs Currently Pay?:

 

« When AI Takes Our jobs, Only Developers Stand A Chance Of Work
Russian Spies Used Kaspersky Anti-V To Hack NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

A-LIGN

A-LIGN

A-LIGN is a global cybersecurity, compliance and privacy solutions provider.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

Riddle&Code

Riddle&Code

Riddle&Code combines the security of smart cards with the potential of Bitcoin Technology and the Internet of Things (IoT) to help master the challenges of our digital society.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

NASK

NASK

NASK is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.