Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Connect Directly

Indeed.com: Slight Dip in Clicks on US Cybersecurity Job Listings

Meanwhile, most of the highest-paying positions pay more than $100K, according to new analysis from the job posting site.

While the number of US cybersecurity job postings on Indeed.com increased by 7% between 2017 and 2018, clicks on those listings dropped by 1.3%.

Meantime, the employment website's first-ever analysis of trends in cybersecurity listings worldwide shows that most of the top 10 highest-paying job titles in the US come with salaries of more than $100,000. The security positions with the top salaries are application security engineer ($128,128), director of information security ($127,855), senior security consultant ($126,628), and cloud engineer ($126,365). Penetrations testing positions command an average salary of $114,431.

Raj Mukherjee, senior vice president of product at Indeed, says the dip in job-seeker traffic to cybersecurity positions may be another sign of the lack of qualified candidates to fill the positions. The demand for these positions, however, will continue to rise worldwide, he says. "This may be cause for concern for employers looking to find workers with cybersecurity skill sets, as it is likely that there will be more competition for these highly skilled workers," Mukherjee says.

Business analytics and information systems firm Catapult Consultant posted the most jobs in the US in 2018, followed by Wells Fargo, according to Indeed.com's data.

A recent study by industry association ISACA found that finding and hiring qualified security professionals takes an average of three to six months, and only half of or fewer applicants actually meet a position's qualifications. And 80% of IT security pros recently surveyed by Tripwire say it's getting harder to find skilled people to fill their open job positions.

     Top-Paying Cybersecurity Positions in the US

Application security engineer                 $128,128

Director of information security             $127,855

Senior security consultant                      $126,628

Cloud engineer                                         $126,365

Software architect                                   $117,633

Penetration tester                                    $114,431

Risk manager                                            $108,465

Chief information officer                          $103,690

Security engineer                                     $101,808

                          Source: Indeed.com

Other nations had major increases in job postings between 2017 and 2018: The number of cybersecurity job positions in India, for example, increased 39%, with the most postings from consulting and IT services firm Wipro, which reportedly suffered a major cyberattack recently. Ireland posted 18% more jobs, mostly from Apple, Amazon, and Facebook.

Indeed.com tracked how job seekers find US cybersecurity positions online by studying search terms they used. The top terms, in order of ranking, were information technology, Amazon, and engineer. Search term trends can help employers better target their listings, Mukherjee says.

"By understanding what searches are leading to job-seeker clicks on cybersecurity job postings, employers can adapt their recruitment targeting techniques," he says. "For example, the search terms indicate there are many curious prospective candidates for cybersecurity roles who could be recruited into this high-demand field, so employers should consider a broad targeting approach."

Mukherjee also says employers should be more "creative" in their job postings to expand their applicant pool. That includes attracting candidates with nontraditional cybersecurity backgrounds who can be trained on the job - a concept that security industry experts say is one key to closing the so-called talent gap.

"One way they can do this is through assessments, which allow job seekers and employers to understand [whether] a candidate's skills match the needs of the open role," he says. This allows candidates to demonstrate their skills that may not fit their work history or backgrounds, he says.

"As every company becomes a software company and the need for cybersecurity and other tech roles continues to grow, it will be even more crucial for companies of all sizes to look to solutions that will help them hire quality candidates and to close the talent gaps in tech," he says.

Related Content:





Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
4/25/2019 | 10:39:59 AM
Base problem is still.....
Lack of respect for IT as a career choice.  Management still outsources, IBM and other firms still hire and fire and others just fire for no good reason at all.  Hence college age grads or young who choose to enter this general field have little faith in long term career potential.  I was outsourced out of a job years ago with 140 others and the decision proved, of course, horrific for my employer.  (My first checks post-fire were from senior executives who STILL wanted me to work on their machines!!!   BEST revenge ever).   But once in IT itself, cyber security is the ONLY secure field - they could outsource that, some do but the risk-reward ratio is a bad thing.  Forget programming, server support, data center - all good to know but not career INTO ..... but there you go, few go INTO the main door for InfoTech at the Great Career Casino.  Why crap out?   
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.