TechDigits

Tech news
Thursday, Mar 28, 2024

How to get a lucrative job in cybersecurity

How to get a lucrative job in cybersecurity

One of Oscar Anaya's earliest successful hacks was in to a personal computer he shared with his older sister when he was 11 years old.

"My sister wanted to play some weird game on the computer and didn't want me to use it, so she locked it with a password," he says.

Undaunted, he began turning the machine off and on again, which led him to discover Safe Mode in Windows XP. "It allowed me to log in as the administrator of the personal computer and change the password," he says.

"My sister was baffled when she got home," he adds. "She wondered how I got in."

This early hack by Mr Anaya was just the beginning of his circuitous route into his career as an IT security, or cybersecurity, professional. His route took him from music producer to security alarm installer to an apprentice on a hacking programme.

"I've always looked at things and thought, 'How can someone abuse it?'" he says.

"That's the root of a hacker - to find how things can operate in ways they were not intended to."

As much as he wanted to work in cybersecurity, it seemed this would be an unfulfilled dream until he began actively looking for jobs in the field at the urging of his pregnant wife.

Eventually he ended up on a cybersecurity apprenticeship run by IBM in 2019. Based in Texas, he now has a full-time position with the company's X-Force Red team as a hardware hacker - hired to try to deliberately break into company systems and expose vulnerabilities.

Mr Anaya's journey is an example of one of the many diverse paths that might lead you in to a career in cybersecurity.

It's a well-paid profession. The average salary for a cybersecurity professional in Europe is around €62,000 (£54,000; $74,000), according to (ISC)², the US organisation which administers the Certified Information Systems Security Professional (CISSP) certification exam.

The sector is booming but there is still an acute shortage of cybersecurity staff

And there are still many many roles that need filling, although the workforce gap dropped from four million in 2019 to 3.1 million in 2020 according to (ISC)².

"The market is huge," says Ida Byrd-Hill, chief executive and founder of Automation Workz, a Detroit-based re-skilling and diversity consulting firm.

"With all the attacks and data breaches and data leaks, there's a lot of need for cybersecurity people," she says.

This acute demand has begun to drive hiring trends. "What recruiters are looking for is starting to shift," says Clar Rosso, chief executive of (ISC)².

"Organisations are facing the stark reality of the cybersecurity [skills] gap, so they've started thinking differently about who they're recruiting," she says.

"That starts with a mindset shift that is focused on the idea that technical skills can be taught, but there are other critical skills for cybersecurity professionals that are harder to teach," she continues. "Those are things like analytical and critical thinking, problem solving, and the ability to work well as both an individual and in a team."

Ms Rosso says a recent study found that more than half of individuals entering the cybersecurity profession now come from non-IT, or computer science, backgrounds.

A shift in approach to recruitment has been embraced by some very large companies.

"Paths into cybersecurity can vary hugely," says Wil Rockall, UK lead on cyber talent at Deloitte, a global professional services company.

"Some people have a technical education, degree courses and [training] programmes in cybersecurity, but the majority of our hires come from non-technical backgrounds," he says. "We focus on talent development. We have a path within the firm around how we can develop a person's soft skills and technical skills, as a person goes through their career."

He adds: "It's a broad industry. Security encompasses a whole number of different things so there's lots of different industries where people have transferrable skills."

Mr Rockall says the sector has changed a lot in the last two decades. "It's not about guys in hoodies tapping away on keyboards doing technical things. It's a business function so you need people with business skills."

Some common career paths from other industries in to the sector include people who have previously worked in penetration testing (ethical hacking); or as a compliance analyst; security consultant; security operations or threat intelligence analyst.

"These paths range in core competencies. From very technical roles that are a natural fit for someone with an engineering background, to roles that are more process, data and analytics oriented," explains Melanie Kruger, vice president of talent at Red Canary, a cloud-based security services provider.

"When considering which path is right for you," she says, "I would advise creating an inventory of the skills you are most energised using in your current role."

While the cybersecurity labour shortage isn't going to disappear any time soon, experts agree that broadening the candidate pool will be crucial in addressing the shortage.

"What that means now is pulling people out of adjacent disciplines and retraining them, or helping colleges improve their training so there's a better pipeline," explained Paul Farnsworth, Chief Technology Officer at the DHI Group, parent of the Dice high-tech job website.

Companies are retraining staff from other areas to go into cybersecurity says Paul Farnsworth

Jim Johnson, a senior vice president in the technology division of Robert Half, a national professional staffing firm, adds that businesses need to be more proactive in expanding their talent pool.

"Companies need to be engaged in their communities, with their local schools and networking groups and support them and help drive that audience, and help create the talent pool," he says.

"Part of that is offering internships or real world experience for students. It's going to help students ramp up much more quickly."

Heather Ricciuto, academic and talent outreach lead at IBM Security, says several years ago IBM came to the realisation that it could no longer keep looking for staff in the same old places.

IBM had to look in new places for cybersecurity staff says Heather Ricciuto

"We couldn't keep trying to hire folks with bachelors and masters degrees from top-tier universities. We recognised we had to start looking at the non-traditional talent pool," she says.

"We've been hiring people with college certificates, associate degrees, boot camp graduates, free online training, self-learning. And people who come in through apprenticeship programmes.

"There are so many unfilled cybersecurity jobs around the world, we couldn't possibly fill them all with university graduates. There just isn't enough people graduating with the right skills to fill all the open positions."

Diversity will also play an important role in expanding the pool much further and bridging the skills gap.

"Diversity is massively important," says Mr Rockall. "We're not solving a single problem that has a single answer."

"We work in dynamically evolving environment where attackers are trying to find diverse ways of disrupting our clients," he says. "So it's really important that we have a diversity of thought and a diversity of approach to think of new ways of combatting that."

Newsletter

Related Articles

TechDigits
0:00
0:00
Close
FTX's Bankman-Fried headed for jail after judge revokes bail
America's First New Nuclear Reactor in Nearly Seven Years Begins Operations
Southeast Asia moves closer to economic unity with new regional payments system
Today Hunter Biden’s best friend and business associate, Devon Archer, testified that Joe Biden met in Georgetown with Russian Moscow Mayor's Wife Yelena Baturina who later paid Hunter Biden $3.5 million in so called “consulting fees”
Google testing journalism AI. We are doing it already 2 years, and without Google biased propoganda and manipulated censorship
Musk announces Twitter name and logo change to X.com
The future of sports
TikTok Takes On Spotify And Apple, Launches Own Music Service
Hacktivist Collective Anonymous Launches 'Project Disclosure' to Unearth Information on UFOs and ETIs
Typo sends millions of US military emails to Russian ally Mali
Server Arrested For Theft After Refusing To Pay A Table's $100 Restaurant Bill When They Dined & Dashed
Democracy not: EU's Digital Commissioner Considers Shutting Down Social Media Platforms Amid Social Unrest
Sarah Silverman and Renowned Authors Lodge Copyright Infringement Case Against OpenAI and Meta
Why Do Tech Executives Support Kennedy Jr.?
The New York Times Announces Closure of its Sports Section in Favor of The Athletic
Florida Attorney General requests Meta CEO's testimony on company's platforms' alleged facilitation of illicit activities
The Poor Man With Money, Mark Zuckerberg, Unveils Twitter Replica with Heavy-Handed Censorship: A New Low in Innovation?
The Double-Edged Sword of AI: AI is linked to layoffs in industry that created it
US Sanctions on China's Chip Industry Backfire, Prompting Self-Inflicted Blowback
Meta Copy Twitter with New App, Threads
BlackRock Bitcoin ETF Application Refiled, Naming Coinbase as ‘Surveillance-Sharing’ Partner
UK Crypto and Stablecoin Regulations Become Law as Royal Assent is Granted
A Delaware city wants to let businesses vote in its elections
Alef Aeronautics Achieves Historic Milestone with Flight Certification for World's First Flying Car
Google Blocked Access to Canadian News in Response to New Legislation
French Politicians Advocate for Pan-European Regulation on Social Media Influencers
Melinda French Gates Advocates for Increased Female Representation in AI to Prevent Bias
Snapchat+ gains 4 million paying subscribers in its first year
Apple Makes History as the First Public Company Valued at $3 Trillion
Elon Musk Implements Twitter Limits to Tackle Data Scraping, but Faces Criticism for Technical Misunderstanding
EU and UK's Slow Electric Vehicle Adoption Raises Questions About the Transition to Green Mobility
Top Companies Express Concerns Over Europe's Proposed AI Law, Citing Competitiveness and Investment Risks
Meta Unveils Insights on AI Usage in Facebook and Instagram, Amid Growing Calls for Transparency
Crypto Scams Against Seniors Soar by 78% in 2022, Experts Urge Vigilance
The End of an Era: National Geographic Dismisses Last of Its Staff Writers
Shield Your Wallet: The Perils of Wireless Credit Card Theft
Harvard Scientist Who Studies Honesty Accused Of Data Fraud, Put On Leave
Putting an End to the Subscription Snare: The Battle Against Unwitting Commitments
The Legal Perils of AI: Lawyer Faces Sanctions for Relying on Fictional Cases Generated by Chatbot
ChatGPT’s "Grandma Exploit": Ingenious Hack Exposes Loophole in AI, Generates Free Software Codes
The Disney Downturn: A Near Billion-Dollar Box Office Blow for the House of Mouse
A Digital Showdown: Canada Challenges Tech Giants with The Online News Act, Meta Strikes Back
Distress in the Depths: Submersible and Passengers Missing in Titanic Wreckage Expedition
Mark Zuckerberg stealing another idea: Twitter
European Union's AI Regulations Risk Self-Sabotage, Cautions smart and brave Venture Capitalist Joe Lonsdale
Nvidia GPUs are so hard to get that rich venture capitalists are buying them for the startups they invest in
Chinese car exports surge
Reddit Blackout: Thousands of Communities Protest "Ludicrous" Pricing Changes
Nvidia Joins Tech Giants as First Chipmaker to Reach $1 Trillion Valuation
AI ‘extinction’ should be same priority as nuclear war – experts
×