Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

04:35 PM
Connect Directly

Cybersecurity's 'Broken' Hiring Process

New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

[UPDATED 10/12/2017 with link to the report, now published]

A soon-to-be published study shows how the traditional corporate human resources operation actually hampers cybersecurity hiring against a backdrop of the industry's well-documented talent gap.

The Jane Bond Project report, commissioned by security talent recruiting firm CyberSN, found that in addition to the lack of available talent for those positions, respondents say their HR generalists are not equipped to recruit and hire cybersecurity talent, and that flawed salary data complicates their ability to issue the best job offers.

More than 80% of the 83 cybersecurity positions studied in the report ended up with compensation offers higher than the salary caps stated in the original job descriptions. Half of the 52 organizations participating in the study say they had to up the compensation offers to seal the deal. The positions in the study include security engineers, product sales engineers, incident response analysts, SOC analysts, and product security experts.

Meanwhile, the typical cybersecurity job sits unfilled for an average of six months, the report shows. "It boggles my mind" that some jobs sit vacant up to nine months, says Chenxi Wang, founder of The Jane Bond Project.

Most respondents said recruiting for cybersecurity positions was "difficult" or "very difficult," and especially challenging for the more experienced positions.

Wang, who headed up the study, titled "The Cyber Security Hiring Crisis," says one CISO she interviewed lamented that HR was "looking in all the wrong places" for cybersecurity talent. The CISO has filled positions by recruiting from veteran databases, where he's found candidates with some military training that he was able to tap and then train for cybersecurity, he told Wang.

In addition to more accurate and updated IT security salary information, Wang says, the industry needs HR specialists focused on security talent who have an understanding of the industry.

"I had a CISO tell me [in the study] he had a recruiter turn away a really good hacker because he 'didn't look into your eyes' when he talked to you. The HR recruiter turned him away as 'not a good fit,'" she says. "But the security team knew he was a good hacker and wanted him. The criteria in which HR generalists [vet candidates] does not work" in all cases for cybersecurity, she notes.

Most hiring managers in the survey say they rely more on their own personal networks of contacts and LinkedIn – not HR – for their recruiting efforts.

Deidre Diamond, founder and CEO of CyberSN, says HR really shouldn't be expected to recruit and hire cybersecurity talent. "It's really unfair to even suggest that the HR department has the department to support the recruiting efforts of a cybersecurity position," she says. "It's so niche, there's no common language there … I feel badly for HR."

Many HR teams end up cut-and-pasting cybersecurity job descriptions that don't accurately reflect the actual day-to-day responsibilities of the opening. Companies also end up starting way too low with their offers, sometimes $10,000 to $20,000 under the appropriate salary range for a security job, she says, often because HR doesn't have the proper budget approval for a competitive offer.

Meanwhile, two of out five organizations review or adjust salary offers every six months, and three out of five do so annually.

Diversity Deficit

While the study did not look at diversity, it did find that only eight percent of the cybersecurity positions in the report were filled by female candidates. And of those women, none had negotiated a salary higher than the job offer.

"I had five organizations [in the study] that talked about their hiring practices and what they see. A few of them said 'women don't negotiate,'" Wang notes. "But a lot of men don't, either."

CyberSN's Diamond says the gender salary gap should improve when the Equal Pay Act kicks in next year. "Now, women often make less money, so their offers" are for less, she says.

"But that's only going to change if women push for it" and learn to negotiate for equal salaries in cybersecurity, she says.

Diamond says her firm plans to release a free tool for cybersecurity job candidates to create strong profiles that are attractive to prospective employers. 

A recent ISC(2) study shows organizations aren't tapping in-house talent as a way to fill security slots, either. More than 60% of respondents in the ISC(2) report say their organizations are short on staff, but just 34% say their companies cover the cost of security training.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Strategist
10/13/2017 | 12:36:33 PM
about The Report
Great to get the actual report.

As per my previous post, the premise is sound (IMEEHDPO).  However, from an analytical perspective, it seems to be a bit small sample.  This can and should be updated, perhaps with partnering with am Infosec organization, like ISC2, ISSA and/or ISACA.  Any of these could provide a wide and large set of security professions to interview. And ISC2 does an annual salary survey.
User Rank: Author
10/12/2017 | 5:04:51 PM
Expanding to other teams
While hiring security professionals in a better and more diverse way is indeed critical, IMO the true key to scaling security is empowering the non security team to embrace security practices, building security in
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
10/12/2017 | 9:49:02 AM
Re: "Broken Hiring Process"? what process?
Great insight, @InfoSecurityMaster. I especially appreciate "The Girl with the Dragon Tatoo" reference. =) 

The disconnect between traditional HR recruitment and hiring and recruitment and hiring for cybersecurity was something that was apparent in job descriptions, but to hear more about the recruitment and interviewing challenges was eye-opening. Some of these orgs are basically working around HR to find people. Really interesting stuff.
User Rank: Strategist
10/12/2017 | 9:13:35 AM
"Broken Hiring Process"? what process?
The article's title presumes that there is a process.  Most recruiting, from the candidate's viewpoint, it haphazard at best.

HR generalists and recruiters are mostly not competent (not equipped, to be nice) to recruit security professionals. 

Another major problem is that positions are not properly and consistently categorized.  I can see two positions with near IDENTICAL veribiage, and when I inquire on compensation, there can be a $10k, $20k, $30k or more difference.  The detail here is that HR doesn't have context to know if they are filling a firewall admin or security/SOC analyst v filling an ISSO or Security Engineer or Security Architect (or CISO). When they realize they really want an ISSO or Security Engineer, they are going to have to up their game $25k or so. 

Part of this stems from Infosec not defining the differences between technical security (e.g. firewall) and infosec management (e.g. ISSO, CISO).  DoD has a policy defining these (by associated certifications), but I dont think that is widely known. 

My attempt to train the recuiter-seekers is to re-work my resume to list the Roles I fulfill, Qualifications and certifications, Goals and Skills. The lastly, Experience/Job list.  Word search only will get then so far; they are going to have to read my story before they get to review former employers.  You would be amazed how many interviews are not interviews - only review of former employment. Ridiculous waste of my time.  Listen to what I am telling you (I AM the Expert, after all).

Oh, and how did that HR miss the clues of "'didn't look into your eyes'" as a possible indicator of extreme competence?  Just read "Girl with the Dragon Tattoo" to gain some insight. 

I can only hope this gets cross-posted to some HR/Recruiting sites.....
<<   <   Page 2 / 2
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default &quot;remember me&quot; configuration, cookies could be susceptible to a padding attack.
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
PUBLISHED: 2019-11-18
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
PUBLISHED: 2019-11-18
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.