Threat Intelligence
10/11/2017
04:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Cybersecurity's 'Broken' Hiring Process

New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

[UPDATED 10/12/2017 with link to the report, now published]

A soon-to-be published study shows how the traditional corporate human resources operation actually hampers cybersecurity hiring against a backdrop of the industry's well-documented talent gap.

The Jane Bond Project report, commissioned by security talent recruiting firm CyberSN, found that in addition to the lack of available talent for those positions, respondents say their HR generalists are not equipped to recruit and hire cybersecurity talent, and that flawed salary data complicates their ability to issue the best job offers.

More than 80% of the 83 cybersecurity positions studied in the report ended up with compensation offers higher than the salary caps stated in the original job descriptions. Half of the 52 organizations participating in the study say they had to up the compensation offers to seal the deal. The positions in the study include security engineers, product sales engineers, incident response analysts, SOC analysts, and product security experts.

Meanwhile, the typical cybersecurity job sits unfilled for an average of six months, the report shows. "It boggles my mind" that some jobs sit vacant up to nine months, says Chenxi Wang, founder of The Jane Bond Project.

Most respondents said recruiting for cybersecurity positions was "difficult" or "very difficult," and especially challenging for the more experienced positions.

Wang, who headed up the study, titled "The Cyber Security Hiring Crisis," says one CISO she interviewed lamented that HR was "looking in all the wrong places" for cybersecurity talent. The CISO has filled positions by recruiting from veteran databases, where he's found candidates with some military training that he was able to tap and then train for cybersecurity, he told Wang.

In addition to more accurate and updated IT security salary information, Wang says, the industry needs HR specialists focused on security talent who have an understanding of the industry.

"I had a CISO tell me [in the study] he had a recruiter turn away a really good hacker because he 'didn't look into your eyes' when he talked to you. The HR recruiter turned him away as 'not a good fit,'" she says. "But the security team knew he was a good hacker and wanted him. The criteria in which HR generalists [vet candidates] does not work" in all cases for cybersecurity, she notes.

Most hiring managers in the survey say they rely more on their own personal networks of contacts and LinkedIn – not HR – for their recruiting efforts.

Deidre Diamond, founder and CEO of CyberSN, says HR really shouldn't be expected to recruit and hire cybersecurity talent. "It's really unfair to even suggest that the HR department has the department to support the recruiting efforts of a cybersecurity position," she says. "It's so niche, there's no common language there … I feel badly for HR."

Many HR teams end up cut-and-pasting cybersecurity job descriptions that don't accurately reflect the actual day-to-day responsibilities of the opening. Companies also end up starting way too low with their offers, sometimes $10,000 to $20,000 under the appropriate salary range for a security job, she says, often because HR doesn't have the proper budget approval for a competitive offer.

Meanwhile, two of out five organizations review or adjust salary offers every six months, and three out of five do so annually.

Diversity Deficit

While the study did not look at diversity, it did find that only eight percent of the cybersecurity positions in the report were filled by female candidates. And of those women, none had negotiated a salary higher than the job offer.

"I had five organizations [in the study] that talked about their hiring practices and what they see. A few of them said 'women don't negotiate,'" Wang notes. "But a lot of men don't, either."

CyberSN's Diamond says the gender salary gap should improve when the Equal Pay Act kicks in next year. "Now, women often make less money, so their offers" are for less, she says.

"But that's only going to change if women push for it" and learn to negotiate for equal salaries in cybersecurity, she says.

Diamond says her firm plans to release a free tool for cybersecurity job candidates to create strong profiles that are attractive to prospective employers. 

A recent ISC(2) study shows organizations aren't tapping in-house talent as a way to fill security slots, either. More than 60% of respondents in the ISC(2) report say their organizations are short on staff, but just 34% say their companies cover the cost of security training.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
10/12/2017 | 9:49:02 AM
Re: "Broken Hiring Process"? what process?
Great insight, @InfoSecurityMaster. I especially appreciate "The Girl with the Dragon Tatoo" reference. =) 

The disconnect between traditional HR recruitment and hiring and recruitment and hiring for cybersecurity was something that was apparent in job descriptions, but to hear more about the recruitment and interviewing challenges was eye-opening. Some of these orgs are basically working around HR to find people. Really interesting stuff.
InfoSecurityMaster
100%
0%
InfoSecurityMaster,
User Rank: Strategist
10/12/2017 | 9:13:35 AM
"Broken Hiring Process"? what process?
The article's title presumes that there is a process.  Most recruiting, from the candidate's viewpoint, it haphazard at best.

HR generalists and recruiters are mostly not competent (not equipped, to be nice) to recruit security professionals. 

Another major problem is that positions are not properly and consistently categorized.  I can see two positions with near IDENTICAL veribiage, and when I inquire on compensation, there can be a $10k, $20k, $30k or more difference.  The detail here is that HR doesn't have context to know if they are filling a firewall admin or security/SOC analyst v filling an ISSO or Security Engineer or Security Architect (or CISO). When they realize they really want an ISSO or Security Engineer, they are going to have to up their game $25k or so. 

Part of this stems from Infosec not defining the differences between technical security (e.g. firewall) and infosec management (e.g. ISSO, CISO).  DoD has a policy defining these (by associated certifications), but I dont think that is widely known. 

My attempt to train the recuiter-seekers is to re-work my resume to list the Roles I fulfill, Qualifications and certifications, Goals and Skills. The lastly, Experience/Job list.  Word search only will get then so far; they are going to have to read my story before they get to review former employers.  You would be amazed how many interviews are not interviews - only review of former employment. Ridiculous waste of my time.  Listen to what I am telling you (I AM the Expert, after all).

Oh, and how did that HR miss the clues of "'didn't look into your eyes'" as a possible indicator of extreme competence?  Just read "Girl with the Dragon Tattoo" to gain some insight. 

I can only hope this gets cross-posted to some HR/Recruiting sites.....
<<   <   Page 2 / 2
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.