ABSTRACT
The demand for cyber security professionals is rising as the incidence of cyber crime and security breaches increases, leading to suggestions of a skills shortage in the technology industry. While supply and demand are factors in the recruitment process for any position, in order to secure the best people in the security field we need to know what skills are required to be a security professional in the current cyber security environment. This paper seeks to explore this question by looking at the current state of the Australian Industry. Recent job listings in the cyber security area were analysed, and current security professionals in industry were asked for their opinion as to what skills were required in this profession. It was found that each security professional role has its own set of skill requirements, however there is significant overlap between the roles for many soft skills, including analysis, consulting and process skills, leadership, and relationship management. Both communication and presentation skills were valued. A set of "hard" skills emerged as common across all categories: experience, qualifications and certifications, and technical expertise. These appear to represent the need for a firm background in the security area as represented by formal study and industry certifications, and supported by solid experience in the industry. Specific technical skills are also required, although the exact nature of these will vary according to the requirements of each role.
- Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5--10.Google Scholar
- Casper, W. D., & Papa, S. M. (2012). A Multi-Disciplined Security Engineering Education Approach. In SAM 2012 (pp. 243--248).Google Scholar
- Cyber Security Operations Centre. (2014). The Cyber Security Picture 2013. Canberra, ACT.Google Scholar
- CySCA. (2014). Cyber Security Career Opportunities.Google Scholar
- FBI. (2014). Most Wanted Talent: FBI Seeking Tech Experts to Become Cyber Special Agents. Retrieved December 31, 2014, from http://www.fbi.gov/news/stories/2014/december/fbi-seeking-tech-experts-to-become-cyber-special-agentsGoogle Scholar
- Palmer, I. (2012). How to become a network security engineer. Infosec Institute. Retrieved from http://resources.infosecinstitute.com/network-security-engineer/Google Scholar
- Potter, L. E. C., von Hellens, L. A., & Nielsen, S. H. (2009). Childhood interest in IT and the choice of IT as a career. In Proceedings of the special interest group on management information system's 47th annual conference on Computer personnel research - SIGMIS-CPR '09 (p. 33). New York, New York, USA: ACM Press. doi:10.1145/1542130.1542138 Google Scholar
Digital Library
- Symantec. (2014). 2013 Norton Report (p. 28).Google Scholar
- University of Phoenix, & (ISC)2 Foundation. (2014). Cybersecurity Workforce Competencies: Preparing tomorrow's risk-ready professionals (p. 16).Google Scholar
Index Terms
What Skills do you Need to Work in Cyber Security?: A Look at the Australian Market
Recommendations
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals
Our cybersecurity workforce needs surpass our ability to meet them. These needs could be mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities (KSAs) most important to cybersecurity jobs. To identify the KSAs ...
The role of cyber-security in information technology education
SIGITE '11: Proceedings of the 2011 conference on Information technology education30,000 qualified cyber-security specialists in the US Public Sector alone despite being one of the best financially compensated technology-related domains. Against ever evolving cyber-threats the need to graduate students skilled in the concepts and ...
The cybersecurity workforce and skills
AbstractCyber security is now an essential requirement for modern organisations, but many face a significant constraint in terms of a lack of skilled personnel to support the required roles and responsibilities. Although numerous related ...





Comments