Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Connect Directly

Indeed.com: Slight Dip in Clicks on US Cybersecurity Job Listings

Meanwhile, most of the highest-paying positions pay more than $100K, according to new analysis from the job posting site.

While the number of US cybersecurity job postings on Indeed.com increased by 7% between 2017 and 2018, clicks on those listings dropped by 1.3%.

Meantime, the employment website's first-ever analysis of trends in cybersecurity listings worldwide shows that most of the top 10 highest-paying job titles in the US come with salaries of more than $100,000. The security positions with the top salaries are application security engineer ($128,128), director of information security ($127,855), senior security consultant ($126,628), and cloud engineer ($126,365). Penetrations testing positions command an average salary of $114,431.

Raj Mukherjee, senior vice president of product at Indeed, says the dip in job-seeker traffic to cybersecurity positions may be another sign of the lack of qualified candidates to fill the positions. The demand for these positions, however, will continue to rise worldwide, he says. "This may be cause for concern for employers looking to find workers with cybersecurity skill sets, as it is likely that there will be more competition for these highly skilled workers," Mukherjee says.

Business analytics and information systems firm Catapult Consultant posted the most jobs in the US in 2018, followed by Wells Fargo, according to Indeed.com's data.

A recent study by industry association ISACA found that finding and hiring qualified security professionals takes an average of three to six months, and only half of or fewer applicants actually meet a position's qualifications. And 80% of IT security pros recently surveyed by Tripwire say it's getting harder to find skilled people to fill their open job positions.

     Top-Paying Cybersecurity Positions in the US

Application security engineer                 $128,128

Director of information security             $127,855

Senior security consultant                      $126,628

Cloud engineer                                         $126,365

Software architect                                   $117,633

Penetration tester                                    $114,431

Risk manager                                            $108,465

Chief information officer                          $103,690

Security engineer                                     $101,808

                          Source: Indeed.com

Other nations had major increases in job postings between 2017 and 2018: The number of cybersecurity job positions in India, for example, increased 39%, with the most postings from consulting and IT services firm Wipro, which reportedly suffered a major cyberattack recently. Ireland posted 18% more jobs, mostly from Apple, Amazon, and Facebook.

Indeed.com tracked how job seekers find US cybersecurity positions online by studying search terms they used. The top terms, in order of ranking, were information technology, Amazon, and engineer. Search term trends can help employers better target their listings, Mukherjee says.

"By understanding what searches are leading to job-seeker clicks on cybersecurity job postings, employers can adapt their recruitment targeting techniques," he says. "For example, the search terms indicate there are many curious prospective candidates for cybersecurity roles who could be recruited into this high-demand field, so employers should consider a broad targeting approach."

Mukherjee also says employers should be more "creative" in their job postings to expand their applicant pool. That includes attracting candidates with nontraditional cybersecurity backgrounds who can be trained on the job - a concept that security industry experts say is one key to closing the so-called talent gap.

"One way they can do this is through assessments, which allow job seekers and employers to understand [whether] a candidate's skills match the needs of the open role," he says. This allows candidates to demonstrate their skills that may not fit their work history or backgrounds, he says.

"As every company becomes a software company and the need for cybersecurity and other tech roles continues to grow, it will be even more crucial for companies of all sizes to look to solutions that will help them hire quality candidates and to close the talent gaps in tech," he says.

Related Content:





Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
4/25/2019 | 10:39:59 AM
Base problem is still.....
Lack of respect for IT as a career choice.  Management still outsources, IBM and other firms still hire and fire and others just fire for no good reason at all.  Hence college age grads or young who choose to enter this general field have little faith in long term career potential.  I was outsourced out of a job years ago with 140 others and the decision proved, of course, horrific for my employer.  (My first checks post-fire were from senior executives who STILL wanted me to work on their machines!!!   BEST revenge ever).   But once in IT itself, cyber security is the ONLY secure field - they could outsource that, some do but the risk-reward ratio is a bad thing.  Forget programming, server support, data center - all good to know but not career INTO ..... but there you go, few go INTO the main door for InfoTech at the Great Career Casino.  Why crap out?   
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-24
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
PUBLISHED: 2020-11-24
An ACL bypass flaw was found in pacemaker before 1.1.24-rc1 and 2.0.5-rc2. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went throu...
PUBLISHED: 2020-11-24
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s):,,,
PUBLISHED: 2020-11-24
HRSALE 2.0.0 allows XSS via the admin/project/projects_calendar set_date parameter.
PUBLISHED: 2020-11-24
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.