That’s the bottom line when it comes to open positions in the world of cyber security. There are more than four million jobs posted worldwide, begging talented and experienced professionals to help organizations across the globe secure ideas, plans and identities. Even the Canadian government is advertising “exciting” careers in cyber security.
We’re seeing a distinct increase in the speed of incoming requests for cyber security staffing. The build-up is domain agnostic, covering every aspect of the technology category. This caused us to sit down and do a bit of research.
We also detail the top ten most sought-after positions, based on inbound queries to our S.i.Systems offices. Here is a quick overview of the Top Ten Positions to Watch:
1. Cyber Security Architect: YOY Demand: ▲18%
What this tells us: Trusted networks are a thing of the past. As we head toward a Zero-Trust environment, every connection is considered untrusted until verified. Hiring an IT architect provides the vision and consistency to create an appropriate strategy, to reflect organizational policies and industry standards in this intricate role.
2. Cloud Security Architect YOY Demand: ▲22%
What this tells us: It’s all about the cloud. Cloud security architects promote business continuity through carefully crafted cyber security tech stacks built around platforms (Azure, AWS, GCP, etc.) and point solutions (SalesForce, SAP, etc.).
What this tells us: It’s a fast-paced environment. When demand goes up 26% in a year, you know that the number of complex, mission-essential initiatives being undertaken is skyrocketing. The cyber security project manager helps keep work progressing on track, on budget, and with corporate goals in mind.
What this tells us: there’s an escalating trend. Companies are outsourcing Level 1 roles but building in-house expertise or relying on outside consultants for more advanced tasks and analytics. As response escalates to higher levels for investigation, forensics, and remediation, the role becomes more offense than defense, requiring more expertise.
What this tells us: being more proactive is more important than ever. Ethical hacking (or penetration testing) unlocks a wealth of information with compounding value. This role is particularly sought after in highly regulated industries where attacks can spiral out of control quickly, as well as in sectors where maintaining customer trust is paramount.
6. Cyber GRC/Compliance and Policy Specialist YOY Demand: ▲ 2%
What this tells us: policy specialists are a balancing point. Organizational governance, risk and compliance specialists don’t just work at financial institutions. Any organization in any sector that deals in secure customer or partner data should examine its GRC strategy.
7. Cyber Security IAM Specialist YOY Demand: ▲ 5%
What this tells us: The industry is finally moving beyond passwords. Identity and Access Management (IAM) covers the who, where, what, when, and how end users can access your systems. IAM specialists leverage analytics to achieve visibility into a range of access data, looking to curb policy violations before the breach.
8. Cyber Security Business Analyst YOY Demand: ▲ 3%
What this tells us: There’s a growing need for advocacy for business priorities. Typically, a cyber business analyst is a liaison between project managers, technical developers, and business stakeholders. Any misalignment between the business and IT may expose an organization to greater cyber security risk.
9. Cyber Security Engineer YOY Demand: ▲ 18%
What this tells us: Canadians are building trusted systems from the ground up. Cyber security engineers serve on the front lines of defense, developing, strengthening, and supervising systems to prevent breaches. It’s highly sought-after expertise. We’ve discovered that these roles are often integrated into other functional areas of the IT department, a direct result of the resource shortage.
10. Network Security Specialist YOY Demand: ▲ 4%
What this tells us: constant vigilance is required. Network security specialists balance the demand for constant connectivity with robust protection. Tactical responsibilities may include installation of security software; audits of protocols and practices; and basic troubleshooting and reporting. It’s a gateway position to more advanced security roles.
These insights are only one section of this eBook. We also address cost and wages, how to attract and retain talent in a competitive market, and provide some insights into how you might choose the right staffing resource mix.
If you’re in charge of assuring the security of your organization, you should use every tool available to you. We’re offering you this one.