New Cyber Security Jobs

No company, or individual for that matter, with an online presence is immune to attacks. Once a specialty only associated with government agencies and defense contractors, cyber security is now mainstream.  Industries such as healthcare, finance, manufacturing and retail all need to hire cyber security professionals to protect valuable information from cyber breaches. 

Cyber security skills are in high demand and it doesn’t seem like the need for more security professionals is not going to slow down in the foreseeable future. 

According to the US Bureau of Labor Statistics:  “Employment of information security analysts is projected to grow 32 percent from 2018 to 2028, much faster than the average for all occupations. Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks”.

Computer science roles are already in high demand as it is; adding in the element of security makes these roles even more critical and sought after.

The Current State of Cybersecurity Training
With so many jobs available, and the need to fill them so dire, more colleges are offering degrees in cybersecurity, though it has yet to become a staple in undergraduate coursework for students majoring in related fields. For many professionals currently in the cybersecurity field, they learned the necessary skills through certificate programs and in-the-field training versus degree programs. 

For those who are already in the field and want additional training, both Cisco and Microsoft security training certificate programs are common among all professionals looking for certification. Further collegiate education is also an option, but with relatively few schools offering programs, it might not be easy for professionals to find a program nearby that offers what they need.

Common Cyber Security Positions
Jobs that require cyber security know-how will usually have a range of titles. The most common titles, are Security Analyst, Security Engineer or Architect, Security Software Developer, Cryptographer, Cryptanalyst and Security Consultant among other roles. 

Common skills required for cyber security job roles are incident handling and response, audit and compliance, firewall/IDS/IPS skills, intrusion detection, analytics and intelligence, SIEM management, access/identity management, application security development, advanced malware prevention, and cloud computing/virtualisation. 

While these are the most common skills, most cyber security roles require a handful of these skills plus others. Based on a  SANS survey, the top five industries for cybersecurity professionals are Banking/Finance/Insurance, Information Technology/Management, Government (Defense), Government (Nondefense), and Consulting/Professional Services. Not surprisingly, these top industries all deal with sensitive information, which is commonly targeted by attackers.

Just the Beginning
While we’ve already seen a large boom in these jobs and skill sets, it is safe to say that it is only just the beginning for the rise in cyber security roles. Not only will current professionals be able to easily broaden their skill sets with more security training, if colleges continue to expand their offerings, more young talent will continue to fill these roles. 

 SANS:       LearnHowToBecome:     US Bureau of Labor:       Monster   

Looking For A Career In Cybersecurity?
Our Directory of Suppliers lists Job sites and Recruitment firms focused on Cybersecurity talent acquisition, job placements & career development:  HERE 

Access Thousands of Active Cyber Securty Jobs Worldwide Now with JOOBLE

You Might Also Read: 

The Hot Jobs In Cyber Security & How To Get One:


 

 

« Supporting British Healthcare Cybersecurity During COVID-19
Half Of UK Business Has A Critical Cyber Skills Gap »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.