Why Is The Skills Shortage So Big?

The rapid growth of increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses. Digitisation, sensitive data and privacy concerns mean businesses are crying out for technical specialists, managers, CISOs and people with cross-functional expertise.

Companies from different industries are expected to keep their customers’ data safe and secure, but the growing shortage of qualified cybersecurity professionals is making it difficult to do that. 

More than half of all organisations report a “problematic shortage” of cyber security skills, and there is no end in sight.
It is now estimated that the number of unfilled cyber security positions will grow to a staggering 3.5 million by 2021. 

The problem is not lack of ability in the existing workforce, nor lack of promising young people wanting to work in the field. The hard-to-fill roles tend to be those in cyber security areas with a lower profile, the less talked about specialisations.

Many employers are training their staff in specific products, rather than wider security frameworks, so staff aren’t getting the transferable skills they need. This means experienced cyber specialists spend most of their time dealing with emergencies, instead of planning for the future or training staff. 

In building a successful career in cyber security, choosing the right specialism and the right mix of skills to develop will give you an advantage in potential earnings and a greater choice of  employers

Be equally skilled in tech and legal
Specialising in cyber security and the law covers privacy, compliance and data protection legislation. These specialists, such as privacy officers and data protection officers, should be equally skilled in law and cybersecurity technology. They help companies find ways to organise digital data storage, processing and protection that comply with legislation.

The demand for cyber security and law specialists will grow as privacy and personal data regulations increasingly cover these services. Specialists in this area tend to be more skilled in law than technology. For example, data protection officers can usually tell the company how it should organise data processing and protection, but they can’t always say how to achieve that. When communicating with IT specialists, they need to know how to speak their language.

Be able to connect all the pieces
Cybersecurity architects design and test cyber security systems. It’s a more well-known role, but demand is still outstripping supply. Companies want experts who can see the whole picture and connect all the pieces to make one mechanism that works. Cybersecurity architects need to know as much detail as dedicated experts, but they need to know enough to build proper protection systems, such as how parts of the infrastructure work together. They also need strong management skills.

Be able to detect anomalies in constant white noise
While fewer workplaces need more exclusive specialisations like big data analysis, there’s still a lack of skilled people.
Big data analysts build mathematical models to detect anomalies. If a company needs advanced-level cyber protection or offers specific cyber security services like system integration, they’ll probably need a big data analyst. Ecommerce, banks and digital services also use big data analysis and math modeling, as does any business that holds data about user behavior and events. 

To detect behavior anomalies in constant white noise, and create algorithms to describe what happens in response, you’ll need strong analytical, mathematical, statistical and modeling skills, and in-depth knowledge of cyber-threats and attacks.
In the US, you could earn $117,000 as a cyber security data scientist

Strong on detection and response
There are still opportunities and room for improvement in traditional and common specialisations. As the cybersecurity industry has learned, no organisation can prevent all attacks and breaches, detection and response are now more central than threat prevention. Companies need to be able to track attacks and breaches early and minimise damage. This means SOCs need specialists who can detect threats and know what to do next. They’ll know how to create detection rules and algorithms for detecting attacks and incorrect user behavior.

Soft skills
Managers in cyber security often lack ‘soft skills’ like communication, leadership, negotiation and business sense. 
Cybersecurity managers should be able to organise their department’s work to meet business demands. They should be persuasive and able to speak in the language other parts of the business use. 

Leadership skills are one way to stand out from the crowd; it looks like most cyber security professionals don’t yet consider leadership skills a priority, even in top management positions. 

Filling the Skills Gap
As university programs are limited and academic, self-education is vital. Students should choose one or more specialism to develop. They should find out what skills and knowledge it requires, and proactively develop those using the many educational materials and communities out there. When you start work, CPD (continuing professional development) is the mindset to adopt. Taking on tasks that develop new skills will help your career, as well as avoiding too much routine, which can lead to burnout.

‘Learn by doing’ is still the most effective way to gain knowledge and skills. When you ask your peers and managers to involve you in activities around the knowledge and skills you need, you’ll learn quickly and gain confidence while distributing the workload. Everybody wins.

Employers can also help. Many companies, especially IT vendors, are investing in employee education, training and development around cyber security. Employees need to understand the business’s priorities and choose a direction they want to develop in.

Building a career means not only developing skills and knowledge but making these visible above and beyond daily routines. This means having the courage to put yourself forward. 

GovUK:       IPSOS:        Kaspersky:       Varonis:       CSO Online:       OneFile


You Might Also Read:

Every Single Employee Requires Cyber Security Training:

Cyber Jobs And Professional Training:

 

 

 

« Ransomware Authors Go Beyond Malicious Encryption
Massive Business Cost Savings With Effective Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.

OOKOS

OOKOS

OOKOS was founded in 2023 by a team of cybersecurity veterans who recognized that traditional security models were failing to keep pace with evolving threats.