Market Growth Leads To Better Job Opportunities

The shortage of cyber security professionals in the EMEA region touched 291,000 in 2019, up from 142,000 in 2018 as the increase in hiring demand was much higher than the number of skilled professionals available, (ISC)² latest Cybersecurity Workforce Study has revealed.

The study was based on the number of cyber security professionals employed by organisations across all sectors and the demand for such professionals in countries like the United States, the UK, France, Germany, Canada, Australia, Brazil, Singapore, South Korea, Japan, and Mexico.

It found that presently there are around 2.8 million cyber security workers in these countries, with the United States accounting for 804,700 workers, the UK accounting for 289,000 workers. Mexico accounting for 341,000 workers and South Korea accounting for 201,000 workers. In Europe, the UK has more than twice as many cyber security professionals compared to France (121,000) and Germany (133,000).

As Internet crimes grows worldwide, cybersecurity firms are having trouble attracting and keeping skilled workers to help protect networks.

Cybersecurity firms are having trouble attracting and keeping skilled workers to help protect networks. Some 2.8 million professionals work in cybersecurity, but an additional 4 million trained workers would be needed to close the skills gap and properly defend organisations.

The lightening-speed development of the Internet of Things (IoT) and the fact that your own fridge can tell you when to buy milk, means that cyber security is something which we’re all now familiar with, hearing almost daily about glitches, wins or innovation in the news.   

Bringing cyber issues into the public consciousness and emphasising the importance of building secure strategies could offer any number of cyber job opportunities. It’s undeniably a burgeoning sector which can only grow, both in importance and in demand for talent.

Cyber trends
Some of the current and emerging issues in the industry are:

  • Remote working in a secure manner: The combination of changing working practices and the IoT means that there are increased risks for those who work remotely. Finding ways to ensure security can exist in this flexible environment is crucial.
  • Skills shortages: There’s a huge concern that talent pools, particularly in the defence sector, are diminishing. However, this presents massive opportunities for attracting young people into cyber roles. 
  • Businesses will take greater action: Further growth of the IoT will prompt more businesses to invest and build cyber security into their products / processes, or risk data breaches and the inevitable customer anger.
  • Permanent hires: In recruitment, there’s a shift towards permanent hires over contractors. This is to retain talent and knowledge in-house, understandably, and to prevent any vulnerabilities being exposed when contractors take up assignments elsewhere.

Advanced Resource Managers:           CNBC:             teiss:

You Might Also Read:

Looking For A Career In Cybersecurity?:

Pay Rates For Security Professionals:

 

 

 

« WEBINAR: How To Leverage Endpoint Detection & Response (EDR) In AWS Investigations
The Geopolitics Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Alliance for Cyber Security

Alliance for Cyber Security

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.