Samer Aoudi
The Need for Cybersecurity Professionals

In today's digital age, cybersecurity has become a critical concern for individuals, businesses, and governments around the world. With the increasing reliance on the internet and online services, the risk of cyber attacks has also grown exponentially. From identity theft and financial fraud to data breaches and network disruptions, the consequences of cyber attacks can be devastating and far-reaching.

This is where cybersecurity professionals come in. These highly skilled professionals are responsible for protecting organizations and individuals from cyber threats by designing and implementing security measures, monitoring networks for suspicious activity, and responding to cyber incidents.

The demand for cybersecurity professionals has never been higher. According to a report by Cybersecurity Ventures, the global cybersecurity market is expected to reach $170 billion by 2020, and there will be a shortage of 3.5 million cybersecurity jobs by 2021. This shortage is due, in part, to the rapid evolution of technology and the constantly evolving nature of cyber threats. Cybercriminals are constantly finding new ways to infiltrate systems and steal sensitive information, and it takes highly trained professionals to stay ahead of these threats and keep organizations and individuals safe.

Cybersecurity Careers

In addition to the technical skills required to be a cybersecurity professional, these professionals also need to have strong problem-solving and critical thinking skills. They must be able to think on their feet and make quick, informed decisions under pressure. They must also be able to communicate complex technical concepts to non-technical audiences and work well as part of a team.

The need for cybersecurity professionals is not limited to the private sector. Governments around the world are also in need of skilled cybersecurity professionals to protect their networks and critical infrastructure from cyber attacks. With the increasing use of connected devices and the internet of things (IoT), the risk of cyber attacks on critical infrastructure, such as power grids and water treatment facilities, has grown significantly. Cybersecurity professionals play a critical role in protecting these vital systems from cyber attacks and ensuring the safety and security of citizens.

In conclusion, the need for cybersecurity professionals is clear. From protecting individuals and businesses from cyber attacks to safeguarding critical infrastructure, these professionals play a crucial role in our digital world. As the threat of cyber attacks continues to grow, the demand for skilled cybersecurity professionals will only increase. It is more important than ever for individuals to consider a career in cybersecurity and for organizations to invest in the training and development of these critical professionals. Long story short, there is a need for cybersecurity professionals all over the world. There are many opportunities for workers to start and advance their careers within cybersecurity. Data shows there is a demand for entry-level, mid-level, and advanced-level cybersecurity professionals. While the data in this article is US-specific, it can be used, perhaps, as a global indicator.

As we rely more on digital technology, cyber attacks are evolving in complexity and increasing in occurence. These two facts have been driving up the demand for qualified professionals to help defend organizations against cyber threats. According to the CyberSeek USA job market, Cybersecurity talent gaps exist across the country. The cybersecurity workforce supply/demand gap is just over two job postings for every one available cybersecurity professional (CyberSeek).

Cybersecurity Job Market Snapshot

The data below is based on the CyberSeek Cybersecurity Heat Map from May 2021 through April 2022

#Online Job Listings (Cybersecurity-related positions):
Total 714,548
Public Sector 38,948
Private Sector 675,600


#Workers (Cybersecurity-related jobs):
Total 1,091,575
Public Sector 69,322
Private Sector 1,022,253


Supply/Demand Ratio (National Average)
There are only enough cybersecurity workers in the US to fill 68% of the cybersecurity jobs that employers demand:
68%


Why The Gap?

Let us recap; a) there is an increasing demand for cybersecurity professionals; and b) there isn't enough supply to meet the demand. According to Sarah Hospelhorn from Varonis, there are four contributing factors:

  1. Increasing Number of Attacks
  2. Lack of Interest from Younger Generations
  3. Not Enough Skilled Defenders
  4. Burnout and Turnover

The first factor is clearly global and can be generalized. The second factor is not necessarily true for all countries. Hospelhorn relies on a survey conducted in the US showing only 9% interest in cybersecurity among the younger generation. In the UAE, where I live, I believe things are different. As a chair for the largest cybersecurity program in the country, I see huge interest measured by number of new admissions. Not only is the Cybersecurity program the largest in the Computer Science division, but also it continues to grow.

"There is another gap; a gap between academia and industry."

This takes me to the third factor: shortage of skilled defenders. As I mentioned before, the complexity of attacks keeps on evolving. In response, education providers, such as universities and training centers, introduce cybersecurity programs that equip learners with the necessary knowledge and skills to defend organizational resources and infrastructures. However, I believe there is another gap; a gap between academia and industry. Academia is focused on knowledge, while industry's focus is skills. Due to the complexity of cybersecurity attacks, there is a need for both. The NIST NICE Framework provides an excellent foundation that can help address this gap. Read more about NICE:

And finally, the fourth factor relates to the "hospitability" of the cybersecurity workforce market. When an industry is not hospitable, burnout and turnover become an inevitable risk. Whether you are considering a career in cybersecurity, or already a cybersecurity professional, burnout is a serious issue in the industry. There is a responsibility both on leaders and employees. Leaders must promote a healthy work/life balance, and cybersecurity professionals must live by it. In order to have a long and prosperous career in cybersecurity, you must have this healthy balance in mind.



What Should I Do Next?

Choosing a career is a major decision that can have a significant impact on your life. It's not something that should be taken lightly, and it's important to take the time to consider your interests, values, and goals before making a choice. Here are a few tips to help you choose a career that's right for you:

  1. Reflect on your interests and passions: What do you enjoy doing in your free time? What topics or subjects do you find interesting and engaging? Your career should be something that you find fulfilling and meaningful, so it's important to consider what you enjoy and what energizes you.
  2. Consider your values and goals: What is important to you in your personal and professional life? Do you value stability and security, or are you willing to take on a higher level of risk in exchange for potential rewards? What are your long-term goals? Thinking about your values and goals can help you narrow down your career options and choose a path that aligns with your priorities.
  3. Research potential careers: Once you have a sense of your interests and values, start researching different careers to see which ones align with your goals. Look into the education and training requirements, job duties, and potential salaries for different careers. Consider reaching out to professionals in your field of interest to get a better understanding of what the job is really like.
  4. Explore your options: Don't be afraid to try out different career paths. This could mean taking on internships, volunteering, or part-time jobs to gain hands-on experience and see what you like and don't like. You may find that your interests and goals change over time, and that's okay. It's important to keep an open mind and be willing to explore different options before making a final decision.
  5. Seek guidance: Don't be afraid to seek guidance from trusted friends, family, or professionals. Career counselors, for example, can help you assess your strengths and weaknesses, and provide valuable insights and advice as you explore different career options.

Choosing a career is a personal decision, and there's no one-size-fits-all solution. By taking the time to reflect on your interests, values, and goals, and by exploring different options, you can make an informed decision and choose a career that's right for you. So, it's important to be patient and persistent in this process. But let's face it, you are here because you are considering, or already embarked on, a career in cybersecurity. The next steps are critical to your journey, but straightforward nonetheless:
Understand the market: research the cybersecurity job market in your country/area, including the supply/demand gap and cybersecurity jobs and job requirements
Develop yourself: acquire the necessary knowledge and skills required, including college degrees, practical experience, and industry certifications.

Here are some cybersecurity job titles and popular certifications to get you started:

Top Cybersecurity Job Titles
  • Cybersecurity Analyst
  • Software Developer
  • Cybersecurity Consultant
  • Penetration & Vulnerability Tester
  • Cybersecurity Manager
  • Network Engineer
  • Systems Engineer
  • Senior Software Developer
  • Systems Administrator

Job Openings Requesting Certifications*

*Based on the CyberSeek Cybersecurity USA Heat Map from May 2021 through April 2022

CISSP
137,140
CompTIA Security+
94,175
CISA
80,685
GIAC
59,326
CISM
55,561
CIPP
5,513

Cybersecurity Certifications in Detail »

#cybersecurity #careers #securityanalyst #job #jobmarket
Ads by Google
NIST NICE Framework

The National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. The framework provides a foundation for learners including students, job seekers, and employees. The main building blocks of the NICE Framework are Tasks, Knowledge, and Skills (TKS) statements. Tasks describe the work (The "work" is what an organization needs to achieve cybersecurity risk management objectives). Knowledge and Skill statements describe the learner (The "learner" is the person who has knowledge and skills).

Cybersecurity Careers Tasks

A Task is an activity that is directed toward the achievement of organizational objectives. Example: Troubleshoot system hardware and software.

Knowledge

Knowledge is a retrievable set of concepts. Example: Knowledge of cyberspace threats and vulnerabilities.

Skills*

A Skill represents the capacity to perform an observable action. Example: Skill in recognizing the alerts of an Intrusion Detection System.

Competencies

Competencies provide a mechanism for organizations to assess learners. Competencies offer flexibility by allowing organizations to group together various TKS statements into an overarching category that defines a broad need.

*Ability statements from previous versions of the framework have been refactored into Skill statements
#cybersecurity #careers #securityanalyst
2022 Cybersecurity Jobs

Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

#Job Openings
221,103

Sample Tasks
  • Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
  • Apply security policies to meet security objectives of the system.
  • Apply service-oriented security architecture principles to meet organization's confidentiality, integrity, and availability requirements.
Sample Knowledge
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Sample Skills
  • Skill in designing the integration of hardware and software solutions.
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.

Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

#Job Openings
122,859

Sample Tasks
  • Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
  • Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.
  • Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).
Sample Knowledge
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Sample Skills
  • Skill in applying and incorporating information technologies into proposed solutions.
  • Skill in designing countermeasures to identified security risks.
  • Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).

Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.

#Job Openings
65,716

Sample Tasks
  • Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
  • Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
  • Assess the effectiveness of cybersecurity measures utilized by system(s).
Sample Knowledge
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Sample Skills
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Skill in designing countermeasures to identified security risks.
  • Skill in designing security controls based on cybersecurity principles and tenets.

Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

#Job Openings
153,523

Sample Tasks
  • Conduct functional and connectivity testing to ensure continuing operability.
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
  • Develop and document systems administration standard operating procedures.
Sample Knowledge
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Sample Skills
  • Skill in configuring and optimizing software.
  • Skill in diagnosing connectivity problems.
  • Ability to accurately define incidents, problems, and events in the trouble ticketing system.
Ads by Google
© Samer Aoudi 2005-2024