The Five Most In-Demand Cybersecurity Roles

Cybersecurity job openings continue to grow as more businesses fall victim to massive cyberattacks, according to Indeed.

More companies are seeking cybersecurity professionals in efforts to comply with the EU's General Data Protection Regulation (GDPR) and avoid falling victim to one of the growing number of cyberthreats plaguing their business, according to a Thursday report from Indeed.

Companies looking to avoid GDPR non-compliance penalties—which can result in a fine of 4% of annual global turnover, or €20 million, whichever is greater—are increasingly looking to hire professionals to help them protect their information. As GDPR set in, Indeed found a 261% increase in job postings per million for data protection officers on its job search engine in the past year alone.

Supply and demand for cybersecurity professionals in general continues to grow: Between March 2017 and March 2018, postings of cybersecurity roles increase by 3.5%, Indeed found. Meanwhile, job searches for cybersecurity roles increased by 5.7%.

"As more and more devices connect to the internet and each other, we can expect that securing

information will remain a top priority for individuals and companies alike," the report stated. "This is good news for those in the cybersecurity space, as demand for their products and services will likely continue to increase and lead to more jobs."

To determine the most in-demand cybersecurity roles, Indeed calculated the percentage increase of job postings and job searches for these positions in the US per million from March 2017 to March 2018.

Here are the top five most in-demand cyber jobs:

1. IT security specialist
2. Information security analyst
3. Network security engineer
4. Security engineer
5. Application security engineer

The top five are not surprising, the report noted. The massive Target breach of 2013 occured because attackers gained access to the retailer's network, hence the increased interest in network security engineers. And the explosion of apps led to the application security engineer position reaching the top five this year: Mobile consumer app downloads exceeded 175 million in 2017, and that number doesn't even include the increasing number of business web applications in use, the report noted.

In terms of location, no one geographic region dominates when it comes to open cybersecurity jobs, the report found. The top five metro areas with the most jobs available were Washington, DC, New York, NY, Dallas-Fort Worth, TX, Baltimore, MD, and Chicago, IL.

While cyber pros with the right skills are in high demand and can command a high salary, it's important to adjust for cost of living. Indeed calculated average salaries for information security specialists, and adjusted them based on the Bureau of Economic Analysis' Price Parity Index, which accounts for price differences in goods, rents, and transportation.

For cybersecurity pros, the five top-paying metro areas and their average adjusted salaries were as follows:

1. Charlotte, NC ($125,173)
2. Chicago, IL ($119,887)
3. San Francisco, CA ($116,073)
4. Austin, TX ($113,126)
5. Denver, CO ($112,206)

TechRepublic:

You Might Aso Read: 

Why Are So Few Women In Cybersecurity?:

Cybersecurity Salaries 7% Up In 2018:

 

« CyberPatriot Trains Kids To Protect America
MSAB Joins CASE Initiative On Digital Forensics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.