New Cyber Security Jobs

No company, or individual for that matter, with an online presence is immune to attacks. Once a specialty only associated with government agencies and defense contractors, cyber security is now mainstream.  Industries such as healthcare, finance, manufacturing and retail all need to hire cyber security professionals to protect valuable information from cyber breaches. 

Cyber security skills are in high demand and it doesn’t seem like the need for more security professionals is not going to slow down in the foreseeable future. 

According to the US Bureau of Labor Statistics:  “Employment of information security analysts is projected to grow 32 percent from 2018 to 2028, much faster than the average for all occupations. Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks”.

Computer science roles are already in high demand as it is; adding in the element of security makes these roles even more critical and sought after.

The Current State of Cybersecurity Training
With so many jobs available, and the need to fill them so dire, more colleges are offering degrees in cybersecurity, though it has yet to become a staple in undergraduate coursework for students majoring in related fields. For many professionals currently in the cybersecurity field, they learned the necessary skills through certificate programs and in-the-field training versus degree programs. 

For those who are already in the field and want additional training, both Cisco and Microsoft security training certificate programs are common among all professionals looking for certification. Further collegiate education is also an option, but with relatively few schools offering programs, it might not be easy for professionals to find a program nearby that offers what they need.

Common Cyber Security Positions
Jobs that require cyber security know-how will usually have a range of titles. The most common titles, are Security Analyst, Security Engineer or Architect, Security Software Developer, Cryptographer, Cryptanalyst and Security Consultant among other roles. 

Common skills required for cyber security job roles are incident handling and response, audit and compliance, firewall/IDS/IPS skills, intrusion detection, analytics and intelligence, SIEM management, access/identity management, application security development, advanced malware prevention, and cloud computing/virtualisation. 

While these are the most common skills, most cyber security roles require a handful of these skills plus others. Based on a  SANS survey, the top five industries for cybersecurity professionals are Banking/Finance/Insurance, Information Technology/Management, Government (Defense), Government (Nondefense), and Consulting/Professional Services. Not surprisingly, these top industries all deal with sensitive information, which is commonly targeted by attackers.

Just the Beginning
While we’ve already seen a large boom in these jobs and skill sets, it is safe to say that it is only just the beginning for the rise in cyber security roles. Not only will current professionals be able to easily broaden their skill sets with more security training, if colleges continue to expand their offerings, more young talent will continue to fill these roles. 

 SANS:       LearnHowToBecome:     US Bureau of Labor:       Monster   

Looking For A Career In Cybersecurity?
Our Directory of Suppliers lists Job sites and Recruitment firms focused on Cybersecurity talent acquisition, job placements & career development:  HERE 

Access Thousands of Active Cyber Securty Jobs Worldwide Now with JOOBLE

You Might Also Read: 

The Hot Jobs In Cyber Security & How To Get One:


 

 

« Supporting British Healthcare Cybersecurity During COVID-19
Half Of UK Business Has A Critical Cyber Skills Gap »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

International Maritime Cyber Security Organisation (IMCSO)

International Maritime Cyber Security Organisation (IMCSO)

The IMCSO mission is to be the standard in the maritime cyber security industry, a collective voice, working towards alignment and standardisation.