The Five Most In-Demand Cybersecurity Roles

Cybersecurity job openings continue to grow as more businesses fall victim to massive cyberattacks, according to Indeed.

More companies are seeking cybersecurity professionals in efforts to comply with the EU's General Data Protection Regulation (GDPR) and avoid falling victim to one of the growing number of cyberthreats plaguing their business, according to a Thursday report from Indeed.

Companies looking to avoid GDPR non-compliance penalties—which can result in a fine of 4% of annual global turnover, or €20 million, whichever is greater—are increasingly looking to hire professionals to help them protect their information. As GDPR set in, Indeed found a 261% increase in job postings per million for data protection officers on its job search engine in the past year alone.

Supply and demand for cybersecurity professionals in general continues to grow: Between March 2017 and March 2018, postings of cybersecurity roles increase by 3.5%, Indeed found. Meanwhile, job searches for cybersecurity roles increased by 5.7%.

"As more and more devices connect to the internet and each other, we can expect that securing

information will remain a top priority for individuals and companies alike," the report stated. "This is good news for those in the cybersecurity space, as demand for their products and services will likely continue to increase and lead to more jobs."

To determine the most in-demand cybersecurity roles, Indeed calculated the percentage increase of job postings and job searches for these positions in the US per million from March 2017 to March 2018.

Here are the top five most in-demand cyber jobs:

1. IT security specialist
2. Information security analyst
3. Network security engineer
4. Security engineer
5. Application security engineer

The top five are not surprising, the report noted. The massive Target breach of 2013 occured because attackers gained access to the retailer's network, hence the increased interest in network security engineers. And the explosion of apps led to the application security engineer position reaching the top five this year: Mobile consumer app downloads exceeded 175 million in 2017, and that number doesn't even include the increasing number of business web applications in use, the report noted.

In terms of location, no one geographic region dominates when it comes to open cybersecurity jobs, the report found. The top five metro areas with the most jobs available were Washington, DC, New York, NY, Dallas-Fort Worth, TX, Baltimore, MD, and Chicago, IL.

While cyber pros with the right skills are in high demand and can command a high salary, it's important to adjust for cost of living. Indeed calculated average salaries for information security specialists, and adjusted them based on the Bureau of Economic Analysis' Price Parity Index, which accounts for price differences in goods, rents, and transportation.

For cybersecurity pros, the five top-paying metro areas and their average adjusted salaries were as follows:

1. Charlotte, NC ($125,173)
2. Chicago, IL ($119,887)
3. San Francisco, CA ($116,073)
4. Austin, TX ($113,126)
5. Denver, CO ($112,206)

TechRepublic:

You Might Aso Read: 

Why Are So Few Women In Cybersecurity?:

Cybersecurity Salaries 7% Up In 2018:

 

« CyberPatriot Trains Kids To Protect America
MSAB Joins CASE Initiative On Digital Forensics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Affinity IoT

Affinity IoT

Affinity IoT certifies the security features of interconnectable devices.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.