Operations

11/3/2016
10:00 AM
Sean Martin
Sean Martin
Slideshows
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

8 Hot Skills Sought By IT Security Departments

No company wants to leak customer data, have intellectual property stolen, or experience business services taken offline. Those that recognize these risks are thus scrambling to hire the right people to fill their information security roles.
Previous
1 of 9
Next

When it comes to picking the top skills needed to fill the massive number of open positions in the information security industry, Wils Bell, security recruiter at SecurityHeadhunter.com, says: 

"All cybersecurity appears hot, and no one area is hotter than others. But if I had to pick one, application security (AppSec) is up there."

According to Bell, organizations face two key challenges when hiring for all cybersecurity positions:

  1. Organizations are not willing to pay the going rate for experienced talent.
  2. Many candidates are not nearly as good as they think; they have successfully entered the field of cybersecurity, but are not strong in terms of skills.

Here's a list of five hot skills in cybersecurity as curated from a collection of talent and security service firms. In addition to the hands-on skills, Bell reminds employers that leadership also is a critical skill.

(Note: Job search results referenced on slides were collected from Indeed.com on Oct. 26.) 

 

 

Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP with articles published globally covering security management, cloud computing, enterprise mobility, governance, risk, and compliance—with a focus on specialized industries such as ... View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Benefiter
50%
50%
Benefiter,
User Rank: Apprentice
11/12/2016 | 10:08:30 AM
Re:
It was a very good post indeed. I thoroughly enjoyed reading it in my lunch time. Will surely come and visit this blog more often. Thanks for sharing
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:10:13 AM
prayer times

It is difficult to say exactly what the author tried to say, but i liked it. Good post! But if u want more information read another one

Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Risk, Privacy, and Information Security Officer, AvePoint, Inc.,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15607
PUBLISHED: 2018-08-21
In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote atta...
CVE-2018-14795
PUBLISHED: 2018-08-21
DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable due to improper path validation which may allow an attacker to replace executable files.
CVE-2018-6692
PUBLISHED: 2018-08-21
Stack-based Buffer Overflow vulnerability in libUPnPHndlr.so in Belkin Wemo Insight Smart Plug allows remote attackers to bypass local security protection via a crafted HTTP post packet.
CVE-2018-14793
PUBLISHED: 2018-08-21
DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable to a buffer overflow exploit through an open communication port to allow arbitrary code execution.
CVE-2017-17305
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a Bleichenbacher Oracle vulnerability in the IPSEC IKEv1 implementations. Remote attackers can decrypt IPSEC tunnel ciphertext data by leveraging a Bleichenbacher R...