{"id":2285,"date":"2013-05-25T00:00:00","date_gmt":"2013-05-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/25\/hottest-job-on-market-cybersecurity-professionals\/"},"modified":"2021-12-30T11:40:59","modified_gmt":"2021-12-30T11:40:59","slug":"hottest-job-on-market-cybersecurity-professionals","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/25\/hottest-job-on-market-cybersecurity-professionals\/","title":{"rendered":"Hottest job on market: Cybersecurity professionals"},"content":{"rendered":"<p style=\"margin: 0px;\">&#8220;We&#8217;re the largest provider of cybersecurity solutions to the federal government, so we know that we&#8217;ve got to help build that talent pipeline,&#8221; said Diane Miller, Northrop&#8217;s program director for the CyberPatriot contest, on the sidelines of the March event.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Walters, who says he has 22 years of experience in the field, helped prepare 48 students from Marshall Academy in Falls Church, Va., who competed in the CyberPatriot contest this year.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Listings for cybersecurity positions rose 73 percent in the five years through 2012, 3.5 times faster than postings for computer jobs as a whole, according to Boston-based Burning Glass, a labor market analytics firm that collects data from more than 22,000 online jobs sites.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Just more than a month after graduating in December from Carnegie Mellon University in Pittsburgh with a master&#8217;s degree in information security technology and management, he started working at defense contractor Raytheon Co.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">&#8220;Cybersecurity is a good field these days to get into \u2014 there are a lot of people out there looking for talent,&#8221; said the 24-year-old, who got offers from all six of the potential employers he interviewed with.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">To prepare the next generation of specialists, the federal government&#8217;s National Security Agency is working to strengthen college-level education through its National Centers of Academic Excellence in Cyber Operations program, which gives a designation to universities that meet curriculum and other criteria.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Companies and government agencies are finding many candidates exiting college programs inadequately prepared for high-skill jobs crucial to cybersecurity, said Frank Reeder, co- founder of the Center for Internet Security in East Greenbush, N.Y., and former senior official at the U.S.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">A spate of recent disclosures by corporations about security breaches include social network Facebook, which said it was targeted in a &#8220;sophisticated attack&#8221; by hackers in January who installed malware on laptops used by company employees.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">U.S. companies and public sector organizations will raise outlays on computer security to an estimated $89.1 billion in the fiscal year ending October 2013, more than double the 2006 level, according to data collected by the Ponemon Institute. and analyzed for Bloomberg.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Each year JPMorgan Chase &#8220;spends approximately $200 million to protect ourselves from cyberwarfare and to make sure our data are safe and secure,&#8221; with 600 people dedicated to it, Chief Executive Officer Jamie Dimon wrote last month in a letter to shareholders.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">&#8220;There&#8217;s a lot of really talented hackers or people with cybersecurity skills \u2014 it&#8217;s finding those folks who want to use their skills for good, not evil.&#8221;<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">A participant in last year&#8217;s CyberPatriot contest earned certifications and went from high-school to a job paying $62,000, said Bernie Skoch, the commissioner for the competition at the Air Force Association, a nonprofit, independent group that supports the service through educational and promotional programs.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.dailyherald.com\/article\/20130525\/business\/705259991\/\">http:\/\/www.dailyherald.com\/article\/20130525\/business\/705259991\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2285","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2285"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2285\/revisions"}],"predecessor-version":[{"id":4772,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2285\/revisions\/4772"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}