Poaching On the Rise For Big Data Professionals

 

Several recent hiring studies have agreed that recruiting for technology professionals has picked up in the second half of 2015, and that includes hiring for data analysts and data scientists. Indeed, the US Bureau of Labor Statistics confirmed that IT is now the hottest hiring sector of all.

That is putting great pressure on hiring managers to find the best talent wherever possible – including luring it from the competition.
“There is a big job churn going on,” confirms John Reed, senior executive director at Robert Half Technology, of data professionals. “Companies are being very aggressive in engaging employees from competitors, other firms in their industry, there’s a large focus on that right now.”

All of this hiring activity has also shortened the window of opportunity for employers to act. Many active data analysts and data engineers may be fielding multiple offers. The most desirable “passive” candidates (those not actively looking, but ripe for the picking if you can reach out to them) have probably already been targeted.
“If you’re just putting a job posting online and sitting back and waiting to see what you’ll receive, you’re not going to get a lot of people actively looking for jobs,” cautions Reed. “They are typically well paid, in a great spot and companies know what they have so they’re doing everything they can to retain them.”

The pressure is also building to land the top talent actively in the job market.
“Competition among businesses for top IT talent today makes it critical for managers to rethink their recruitment and retention methods,” notes the 2016 IT Salary Guide, just published by Robert Half Technology. “Speeding up hiring times, training from within, filling skills gaps with project professionals and offering attractive compensation can help you hire – and keep – the best and brightest for your organization.”
Reed has advice to both hiring managers and job candidates on how to best find and impress each other in this highly competitive market.

For job seekers, Reed says don’t be fooled that employers have relaxed their standards – they still want lots of skills, experience, business and technology savvy, and strategic thinking in the right candidate.
For hiring managers, don’t forget that you must sell yourself to the candidate as much as they are trying to impress you. Candidates actually in the market probably won’t be for long; and passive candidates need convincing on how and why you offer a better gig.

Recruiting starts with the job posting of course, and that is where the process also ends for some organizations.
“What we see is that people continue to rely a lot on their job postings, and they’re not exciting, they’re not compelling,” Reed says. “When you’re competing for that talent you’ve got to really have a story that is exciting and gets people intrigued.”
“Start there,” Reed stresses. “The people that you want to apply – are you telling them not only about the exciting aspects of your company but the cutting edge work that you’re doing; the technology that they get to work with; and the ability to influence your strategy? Highlighting those things is where it starts.”

As the saying goes, ‘you never get a second chance to make a first impression’, and that holds true in recruiting, Reed notes.
“If they’re looking at you’re posting and it just doesn’t stand out, you won’t get the chance to even speak with them. They won’t even apply to your job,” Reed explains.

Once the hiring manager has gotten a candidate’s attention, then the work of really selling the organization begins.
“Really hone your story when you get the chance to talk to them,” Reed continues. Points to stress include: • Here’s why you want to work for our company. • Here’s why you want to work in our industry. • These are the really cool things that we’re doing. • This is the technology that we’re going to put in your hands. • This is why we really think you should entertain this type of opportunity.
“You’ve got to have that story that really engages the job seeker,” Reed says.

Information-management:  http://bit.ly/1GPlGaz

 

 

 

« Can Russian Submarines Cut Off the Internet?
Europe Is Spying on You »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.