8 Hot Skills Sought By IT Security Departments8 Hot Skills Sought By IT Security Departments
No company wants to leak customer data, have intellectual property stolen, or experience business services taken offline. Those that recognize these risks are thus scrambling to hire the right people to fill their information security roles.
November 3, 2016
When it comes to picking the top skills needed to fill the massive number of open positions in the information security industry, Wils Bell, security recruiter at SecurityHeadhunter.com, says:
"All cybersecurity appears hot, and no one area is hotter than others. But if I had to pick one, application security (AppSec) is up there."
According to Bell, organizations face two key challenges when hiring for all cybersecurity positions:
Organizations are not willing to pay the going rate for experienced talent.
Many candidates are not nearly as good as they think; they have successfully entered the field of cybersecurity, but are not strong in terms of skills.
Here's a list of five hot skills in cybersecurity as curated from a collection of talent and security service firms. In addition to the hands-on skills, Bell reminds employers that leadership also is a critical skill.
(Note: Job search results referenced on slides were collected from Indeed.com on Oct. 26.)
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks