Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

04:35 PM
Connect Directly

Cybersecurity's 'Broken' Hiring Process

New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

[UPDATED 10/12/2017 with link to the report, now published]

A soon-to-be published study shows how the traditional corporate human resources operation actually hampers cybersecurity hiring against a backdrop of the industry's well-documented talent gap.

The Jane Bond Project report, commissioned by security talent recruiting firm CyberSN, found that in addition to the lack of available talent for those positions, respondents say their HR generalists are not equipped to recruit and hire cybersecurity talent, and that flawed salary data complicates their ability to issue the best job offers.

More than 80% of the 83 cybersecurity positions studied in the report ended up with compensation offers higher than the salary caps stated in the original job descriptions. Half of the 52 organizations participating in the study say they had to up the compensation offers to seal the deal. The positions in the study include security engineers, product sales engineers, incident response analysts, SOC analysts, and product security experts.

Meanwhile, the typical cybersecurity job sits unfilled for an average of six months, the report shows. "It boggles my mind" that some jobs sit vacant up to nine months, says Chenxi Wang, founder of The Jane Bond Project.

Most respondents said recruiting for cybersecurity positions was "difficult" or "very difficult," and especially challenging for the more experienced positions.

Wang, who headed up the study, titled "The Cyber Security Hiring Crisis," says one CISO she interviewed lamented that HR was "looking in all the wrong places" for cybersecurity talent. The CISO has filled positions by recruiting from veteran databases, where he's found candidates with some military training that he was able to tap and then train for cybersecurity, he told Wang.

In addition to more accurate and updated IT security salary information, Wang says, the industry needs HR specialists focused on security talent who have an understanding of the industry.

"I had a CISO tell me [in the study] he had a recruiter turn away a really good hacker because he 'didn't look into your eyes' when he talked to you. The HR recruiter turned him away as 'not a good fit,'" she says. "But the security team knew he was a good hacker and wanted him. The criteria in which HR generalists [vet candidates] does not work" in all cases for cybersecurity, she notes.

Most hiring managers in the survey say they rely more on their own personal networks of contacts and LinkedIn – not HR – for their recruiting efforts.

Deidre Diamond, founder and CEO of CyberSN, says HR really shouldn't be expected to recruit and hire cybersecurity talent. "It's really unfair to even suggest that the HR department has the department to support the recruiting efforts of a cybersecurity position," she says. "It's so niche, there's no common language there … I feel badly for HR."

Many HR teams end up cut-and-pasting cybersecurity job descriptions that don't accurately reflect the actual day-to-day responsibilities of the opening. Companies also end up starting way too low with their offers, sometimes $10,000 to $20,000 under the appropriate salary range for a security job, she says, often because HR doesn't have the proper budget approval for a competitive offer.

Meanwhile, two of out five organizations review or adjust salary offers every six months, and three out of five do so annually.

Diversity Deficit

While the study did not look at diversity, it did find that only eight percent of the cybersecurity positions in the report were filled by female candidates. And of those women, none had negotiated a salary higher than the job offer.

"I had five organizations [in the study] that talked about their hiring practices and what they see. A few of them said 'women don't negotiate,'" Wang notes. "But a lot of men don't, either."

CyberSN's Diamond says the gender salary gap should improve when the Equal Pay Act kicks in next year. "Now, women often make less money, so their offers" are for less, she says.

"But that's only going to change if women push for it" and learn to negotiate for equal salaries in cybersecurity, she says.

Diamond says her firm plans to release a free tool for cybersecurity job candidates to create strong profiles that are attractive to prospective employers. 

A recent ISC(2) study shows organizations aren't tapping in-house talent as a way to fill security slots, either. More than 60% of respondents in the ISC(2) report say their organizations are short on staff, but just 34% say their companies cover the cost of security training.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Strategist
10/13/2017 | 12:36:33 PM
about The Report
Great to get the actual report.

As per my previous post, the premise is sound (IMEEHDPO).  However, from an analytical perspective, it seems to be a bit small sample.  This can and should be updated, perhaps with partnering with am Infosec organization, like ISC2, ISSA and/or ISACA.  Any of these could provide a wide and large set of security professions to interview. And ISC2 does an annual salary survey.
User Rank: Author
10/12/2017 | 5:04:51 PM
Expanding to other teams
While hiring security professionals in a better and more diverse way is indeed critical, IMO the true key to scaling security is empowering the non security team to embrace security practices, building security in
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
10/12/2017 | 9:49:02 AM
Re: "Broken Hiring Process"? what process?
Great insight, @InfoSecurityMaster. I especially appreciate "The Girl with the Dragon Tatoo" reference. =) 

The disconnect between traditional HR recruitment and hiring and recruitment and hiring for cybersecurity was something that was apparent in job descriptions, but to hear more about the recruitment and interviewing challenges was eye-opening. Some of these orgs are basically working around HR to find people. Really interesting stuff.
User Rank: Strategist
10/12/2017 | 9:13:35 AM
"Broken Hiring Process"? what process?
The article's title presumes that there is a process.  Most recruiting, from the candidate's viewpoint, it haphazard at best.

HR generalists and recruiters are mostly not competent (not equipped, to be nice) to recruit security professionals. 

Another major problem is that positions are not properly and consistently categorized.  I can see two positions with near IDENTICAL veribiage, and when I inquire on compensation, there can be a $10k, $20k, $30k or more difference.  The detail here is that HR doesn't have context to know if they are filling a firewall admin or security/SOC analyst v filling an ISSO or Security Engineer or Security Architect (or CISO). When they realize they really want an ISSO or Security Engineer, they are going to have to up their game $25k or so. 

Part of this stems from Infosec not defining the differences between technical security (e.g. firewall) and infosec management (e.g. ISSO, CISO).  DoD has a policy defining these (by associated certifications), but I dont think that is widely known. 

My attempt to train the recuiter-seekers is to re-work my resume to list the Roles I fulfill, Qualifications and certifications, Goals and Skills. The lastly, Experience/Job list.  Word search only will get then so far; they are going to have to read my story before they get to review former employers.  You would be amazed how many interviews are not interviews - only review of former employment. Ridiculous waste of my time.  Listen to what I am telling you (I AM the Expert, after all).

Oh, and how did that HR miss the clues of "'didn't look into your eyes'" as a possible indicator of extreme competence?  Just read "Girl with the Dragon Tattoo" to gain some insight. 

I can only hope this gets cross-posted to some HR/Recruiting sites.....
<<   <   Page 2 / 2
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (&acirc;&euro;&oelig;command injection&acirc;&euro;&#65533;) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...