Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/16/2016
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New report: 12 hot markets for cybersecurity jobs

Randstad Technologies Announces 12 Markets with High Demand for Cybersecurity Talent

Atlanta – Sept. 14, 2016 – Randstad Technologies, a leading technology talent and solutions provider in the U.S., today released its “Cybersecurity Workforce Report” that reveals 12 markets with high demand for cybersecurity talent, featuring data from partner WANTED Analytics. The report reveals 12 key markets nationwide with strong demand for top-tier, enterprise-level cybersecurity talent. The demand in these markets was determined based on a combination of employers competing for talent and number of open job listings.

View the report: Randstad Technologies’ Cybersecurity Workforce Report - 12 Markets with High Demand for Top Talent.

Randstad Technologies found correlations between regions where it has talent-placement operations nationwide and proprietary data from its partner WANTED Analytics to identify the following markets where cybersecurity talent is in high demand:

·         Atlanta

·         Austin

·         Boston

·         Chicago

·         Dallas

·         Los Angeles

·         Minneapolis

·         New York

·         Phoenix

·         San Francisco

·         Seattle

·         Washington, D.C.

 

Cybersecurity talent in industries such as healthcare, retail and finance has been highly sought after over the last several years. Randstad Technologies has seen a surge in demand nationally for cybersecurity job orders from its clients, with a year-over-year increase of 35 percent from June 2014 to June 2016. As demand has increased in these top markets, more and more companies are moving operations to emerging markets like St. Louis, Charlotte, Richmond, Nashville, Orlando and others to find top talent. 

“This data is not surprising, given that nearly every industry in today’s enterprise ecosystem could fall victim to a security breach of their IT systems,” said Dino Grigorakakis, Vice President of Recruiting at Randstad Technologies. “We are working with CIOs who now rank security and cybersecurity expertise as one of the most essential needs for their IT departments, and we are helping them attract willing and highly-qualified candidates from their own back yard.”

Randstad Technologies has seen an increase in demand consistent with a recent industry survey that found a sharp uptick in CIOs’ attention to security management. According to CIO’s 15th annual State of the CIO Survey, 46 percent of IT executives cite security management as a focus for the upcoming year, up from 31 percent in 2015, suggesting that security ranks as the top technology initiative driving IT investment.

“Securing skilled workers, particularly in IT, is getting more complex and challenging, and many decision-makers see it as one of the largest internal threats to meeting business performance targets,” said Grigorakakis. “The introduction of emerging technologies and innovations, and the threats that come with them, means the demand for technology workers with specialized skills such as security will only continue to grow.”

Randstad Technologies is one of the major players seeking and placing cybersecurity talent for companies nationwide.

Methodology: Randstad Technologies’ Cybersecurity Workforce Report - 12 Markets in High Demand for Top Talent

Randstad Technologies’ report of 12 markets with high demand for cybersecurity talent is derived from an analysis of proprietary data from Randstad Technologies and industry partner WANTED Analytics. Randstad Technologies maintains offices in Atlanta, Austin, Chicago, Dallas, Los Angeles, Phoenix, San Francisco, Seattle, Boston, New York, Minneapolis, Washington, D.C. and elsewhere around the country.

 

About Randstad Technologies

Randstad Technologies has been connecting top companies around the globe with the expert technology talent and solutions that drive their success since 1984. Their deep industry expertise and full-service capabilities—Recruitment, Consulting, Projects and Outsourcing—enable organizations to be agile, productive and ahead in the field with our wide network of specialists and flexible solutions. For more information, visit www.randstadtechnologies.com.

 


 

About Randstad US

Randstad US is a wholly owned subsidiary of Randstad Holding nv, a $22.9 billion global provider of HR services. As the third largest staffing organization in the United States, Randstad provides temporary, temporary-to-hire and permanent placement services each week to over 100,000 people through its network of more than 900 branches and client-dedicated locations. Employing over 5,300 recruiting experts, the company is a top provider of outsourcing, staffing, consulting and projects and workforce solutions within the areas of Engineering, Finance and Accounting, Healthcare, Human Resources, IT, Legal, Manufacturing & Logistics, Office & Administration, Pharma and Sales & Marketing.

 

Learn more at www.randstadusa.com and access Randstad’s panoramic U.S. thought leadership knowledge center through its Workforce360 site that offers valuable insight into the latest economic indicators and HR trends shaping the world of work.

 

###

 

Note to editors: Trademarks and registered trademarks remain the property of their respective owners.

 

Media Contacts:

Kathy Van Pelt, Vice President of Strategic Marketing 

(404) 418-4141

[email protected]

 

Jeremy Bartram

Raffetto Herman Strategic Communications

(206) 854-3281

[email protected]

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17185
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-12424
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-18380
PUBLISHED: 2019-12-09
Symantec Industrial Control System Protection (ICSP), versions 6.x.x, may be susceptible to an unauthorized access issue that could potentially allow a threat actor to create or modify application user accounts without proper authentication.
CVE-2019-19687
PUBLISHED: 2019-12-09
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, whic...
CVE-2019-19682
PUBLISHED: 2019-12-09
nopCommerce through 4.20 allows XSS in the SaveStoreMappings of the components \Presentation\Nop.Web\Areas\Admin\Controllers\NewsController.cs and \Presentation\Nop.Web\Areas\Admin\Controllers\BlogController.cs via Body or Full to Admin/News/NewsItemEdit/[id] Admin/Blog/BlogPostEdit/[id]. NOTE: the ...