skip to main content
10.1145/2751957.2751967acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
research-article

What Skills do you Need to Work in Cyber Security?: A Look at the Australian Market

Published:04 June 2015Publication History

ABSTRACT

The demand for cyber security professionals is rising as the incidence of cyber crime and security breaches increases, leading to suggestions of a skills shortage in the technology industry. While supply and demand are factors in the recruitment process for any position, in order to secure the best people in the security field we need to know what skills are required to be a security professional in the current cyber security environment. This paper seeks to explore this question by looking at the current state of the Australian Industry. Recent job listings in the cyber security area were analysed, and current security professionals in industry were asked for their opinion as to what skills were required in this profession. It was found that each security professional role has its own set of skill requirements, however there is significant overlap between the roles for many soft skills, including analysis, consulting and process skills, leadership, and relationship management. Both communication and presentation skills were valued. A set of "hard" skills emerged as common across all categories: experience, qualifications and certifications, and technical expertise. These appear to represent the need for a firm background in the security area as represented by formal study and industry certifications, and supported by solid experience in the industry. Specific technical skills are also required, although the exact nature of these will vary according to the requirements of each role.

References

  1. Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5--10.Google ScholarGoogle Scholar
  2. Casper, W. D., & Papa, S. M. (2012). A Multi-Disciplined Security Engineering Education Approach. In SAM 2012 (pp. 243--248).Google ScholarGoogle Scholar
  3. Cyber Security Operations Centre. (2014). The Cyber Security Picture 2013. Canberra, ACT.Google ScholarGoogle Scholar
  4. CySCA. (2014). Cyber Security Career Opportunities.Google ScholarGoogle Scholar
  5. FBI. (2014). Most Wanted Talent: FBI Seeking Tech Experts to Become Cyber Special Agents. Retrieved December 31, 2014, from http://www.fbi.gov/news/stories/2014/december/fbi-seeking-tech-experts-to-become-cyber-special-agentsGoogle ScholarGoogle Scholar
  6. Palmer, I. (2012). How to become a network security engineer. Infosec Institute. Retrieved from http://resources.infosecinstitute.com/network-security-engineer/Google ScholarGoogle Scholar
  7. Potter, L. E. C., von Hellens, L. A., & Nielsen, S. H. (2009). Childhood interest in IT and the choice of IT as a career. In Proceedings of the special interest group on management information system's 47th annual conference on Computer personnel research - SIGMIS-CPR '09 (p. 33). New York, New York, USA: ACM Press. doi:10.1145/1542130.1542138 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Symantec. (2014). 2013 Norton Report (p. 28).Google ScholarGoogle Scholar
  9. University of Phoenix, & (ISC)2 Foundation. (2014). Cybersecurity Workforce Competencies: Preparing tomorrow's risk-ready professionals (p. 16).Google ScholarGoogle Scholar

Index Terms

  1. What Skills do you Need to Work in Cyber Security?: A Look at the Australian Market

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
      June 2015
      176 pages
      ISBN:9781450335577
      DOI:10.1145/2751957

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 June 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGMIS-CPR '15 Paper Acceptance Rate26of47submissions,55%Overall Acceptance Rate300of480submissions,63%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader