Operations // Careers & People
5/15/2014
03:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

InformationWeek Radio: State of Information Security Salaries & Careers

InformationWeek Radio: The IW Salary Survey shows that security pros have high salaries and great job security ... but how long will it last?

Security pros are in high demand, and if the 621 security staffers and managers who took part in InformationWeek’s 2014 IT Salary Survey are any indication, they also earn much more than the average IT pro and enjoy more job security.

But how long will that last?

According to Mark Aiello, president of Boston-based cyber-security professional services and staffing firm Cyber 360 Solutions, hiring managers today are struggling to find candidates for security positions because they're looking in the wrong places and asking for the wrong credentials. They might be desperately emptying their pockets for security pros now, but eventually they'll wise up. How long will that take and how will it change the average security pro's paycheck?

Join me Tuesday, May 20, at 2:00 p.m. ET for a live online radio interview with Aiello to review the results of the InformationWeek IT Salary Survey, discuss what a career in security is like now, and imagine what it might be like in a few years.

Register now for this episode of the InformationWeek Salary & Careers radio series, powered by Dark Reading. Don't forget to bring along your burning questions for Mark on Tuesday, because he'll be answering some questions from the audience during the broadcast. Anything in particular you'd like me to ask him? Let me know in the comments below.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joyce23501
50%
50%
Joyce23501,
User Rank: Apprentice
5/20/2014 | 10:00:51 AM
salaries are likely to rise
I worked in my company's IT Security department for many years.  The required skills are primarily those of network engineering: knowledge of Radius (authentication) servers,  enterprise firewall devices, IP routing, enterprise VPN servers, and intrusion detection devices.    These are all highly specialized areas that are very difficult to learn. 

By comparison, Web development skills are (by comparison) relatively easy to learn.  There is a huge number of people who know how to develop Websites.  This is why salaries for Web development are likely to decline, while salaries for security specialists are likely to keep rising.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
5/16/2014 | 1:19:03 PM
Re: salary bubble?
Is automation the wild card? If the really smart security people build tools that are usable by less skilled people to test for 75% +/- of potential problems, then you free skilled manhours in the same way that hiring LPNs and CNAs fre up RNs for more skilled work. 
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
5/16/2014 | 11:59:56 AM
Re: salary bubble?
I believe the talent pool has remained small due to the skills required for information security.  For example, web application penetration testing requires in depth knowledge of HTML, HTTP, SQL, XML, LDAP, IMAP, SMTP, shell coding, and the knowledge of how to apply it.  Those skills span many different IT disciplines and it takes someone dedicated to be able to learn it.  Unlike other areas of IT you cannot give someone a step by step tutorial on information security, every situation is unique.

I don't see the required skillset of a qualified information security professional becomming easy to obtain in the near future.  As a result, I don't see a large talent pool either.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/16/2014 | 9:10:09 AM
salary bubble?
Interesting question. The infosec community has enjoyed healthy salaries due to high demand and a smaller talent pool. But if indeed the search widens to other more available skillsets, could that burst the high-dollar salary bubble?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?