what are the opportunities
play

What Are the Opportunities? Col Colle leen Ric Riccinto, Founder - PowerPoint PPT Presentation

Cybersecurity Careers What Are the Opportunities? Col Colle leen Ric Riccinto, Founder an and Part artner He Hector or Acosta, , Rese esearch & Poli olicy Ana naly lyst t Cyber Tale Cyb lent Sea Search Wor orkforce In


  1. Cybersecurity Careers What Are the Opportunities? Col Colle leen Ric Riccinto, Founder an and Part artner He Hector or Acosta, , Rese esearch & Poli olicy Ana naly lyst t Cyber Tale Cyb lent Sea Search Wor orkforce In Intell lligence Netw twork (W (WIN)

  2. Topics We’ll Cover • Cybersecurity and the mobile/wireless industry • Demand for security talent • Security job postings and salary data ▪ Trends, salaries, companies, skill sets ▪ U.S. and Michigan • What motivates today’s cyber warriors • Tips for getting and/or keeping a cybersecurity job

  3. A Little Bit about Colleen Bachelor of Music French horn performance Duquesne University, Pittsburgh, PA M.A. in Written Communication Eastern Michigan University Certifications • Connected Vehicle Professional I, Certified by SAE and CVTA • Certified Identity Theft Risk Management Specialist • Sales and business development • Entrepreneurship and leadership • Security awareness training • Technical writing

  4. A Little Bit about Hector B.A. - History University of Michigan, Ann Arbor Research and Policy Analyst Workforce Intelligence Network Certifications • Economic Modeling Specialists, International Analyst • State of Michigan Labor Market Intelligence

  5. How Can We Help You the Most? • People In a Security Role • People Looking to Get Into Cybersecurity • People Who Hire Security Pros

  6. Cybersecurity and the Mobile/Wireless Industry and the Demand for Security Talent

  7. $8 Billion Acquisition “Today, less than 40% of new vehicles in the U.S. market are equipped with telematics systems and the penetration in other markets is far lower. In the coming decade, Navigant Research expects that to grow to near universal installation in North America and Europe with the Asia Pacific following not far behind.” - Sam Abuelsamid, Forbes Contributor and Senior Analyst with Navigant Research

  8. Reaction to Samsung’s Acquisition of Harman “The deal – Samsung’s biggest acquisition in its history -reshapes the pecking order in the global automotive supply chain, reflecting a quickening pace of innovation and an increased role for companies with deep pockets and a keen understanding of mobile services.” “Samsung will gain insight into the changing behavior of consumers when the lines blur between the auto and mobile industries.” - Jonathan Cheng Wall Street Journal, November 14, 2016

  9. Mobile Vulnerability Trends from Internet Security Threat Report Symantec, April 2016

  10. Security A Top Concern for IoT Developers from IoT Developer Survey IEEE, April 2016

  11. “More than 209,000 cybersecurity jobs in the U.S. are unfilled , and postings are up 74 percent over the past five years, according to a Peninsula Press analysis of numbers from the Bureau of Labor Statistics.” March 31, 2015 The analysts from Frost & Sullivan forecast a shortfall of 1.5 million by 2020 . This number is compounded by 45 percent of hiring managers reporting that they are struggling to support additional hiring needs and 62 percent of respondents reporting that their organizations have too few information security professionals. Global Information Security Workforce Study, 2015

  12. Job Postings and Salary Data

  13. Where Does this Data Come From? • Leading provider of job market analytics • Southeast Michigan collaborative • Collect millions of online job postings from effort between 10 community colleges, close to 40,000 online sources 6 workforce boards and economic • Use our patented technology to mine and development partners code detailed data from each job listing • Provide current and actionable labor market intelligence • Strengthen and sustain an employer- driven talent system • Improve institutional, local, state, and federal talent development policy

  14. Let’s Define Some Terminology Burning Glass’s Classification Parameters • Cyber security-related title • Network security, information security, information assurance, and penetration tester • Require a cybersecurity certification or request cybersecurity-specific skills • Information assurance, cryptography, computer forensics, malware analysis, 800-53, and ArcSight • Job opening vs. job posting • Metropolitan Service Area (MSA)

  15. If You Think This Is Some Serious Growth . . . Increasing National Demand for Security Professionals National Cyber Security Job Postings 350,000 37% increase 300,000 from 2014 – 2015 250,000 200,000 62% increase 150,000 from 2010 – 2016 100,000 19% average yearly 50,000 increase - 2010 2011 2012 2013 2014 2015 2016 EOY Projection Data: Burning Glass Technologies, January 2010 – August 2016 2016 EOY Projection: Workforce Intelligence Network

  16. Check Out What’s Happening Cyber Security Job Postings in Detroit 75% increase 6,000 from 2014 – 2015 5,000 4,000 310% increase 3,000 from 2010 – 2016 2,000 33% average yearly 1,000 increase 0 2010 2011 2012 2013 2014 2015 2016 EOY Projection Data: Burning Glass Technologies, January 2010 – August 2016 2016 EOY Projection: Workforce Intelligence Network

  17. Increase in Cyber Security Job Postings from 2014 to 2015 59% U.S. 75% Detroit 0% 10% 20% 30% 40% 50% 60% 70% 80% Data: Burning Glass Technologies,

  18. Top 10 Cyber Security Occupations In Michigan, based on number of job postings 1 Information Security Analysts 1,289 2 Computer Systems Engineers/Architects 317 3 Software Developers, Applications 295 4 Computer Network Architects 228 5 Network and Computer Systems Administrators 219 6 Information Technology Project Managers 189 7 Computer User Support Specialists 182 8 Database Administrators 108 9 Computer Systems Analysts 101 10 Marketing Managers 68 Data: Burning Glass Technologies, January 2016 – August 2016

  19. Top IT Occupations In Michigan, based on number of job postings 11 Information Security Analysts 1,948 1 Software Developers, Applications 17,506 Computer Systems 12 Computer Programmers 1,783 2 5,622 Engineers/Architects 13 Computer Network Architects 1,559 3 Computer Systems Analysts 4,011 14 Database Architects 629 Information Technology 4 3,720 Project Managers 15 Data Warehousing Specialists 556 5 Computer User Support Specialists 3,496 Computer and Information Systems 16 523 Managers 6 Web Developers 2,619 17 Computer Occupations, All Other 455 7 Database Administrators 2,596 Computer and Information Research 18 416 Network and Computer Systems Scientists 8 2,235 Administrators 19 Computer Network Support Specialists 365 Software Quality Assurance Engineers 9 2,127 and Testers 20 Document Management Specialists 320 10 Business Intelligence Analysts 2,012 Data: Burning Glass Technologies, January 2016 – August 2016

  20. Show Me the Money Detroit salaries are 5% to 14% less than the national average for Information Security Analysts Actual Salaries of Information Security Analysts 10th Percentile 25th percentile Median 75th percentile 90th percentile $50,000 $60,000 $70,000 $80,000 $90,000 $100,000 $110,000 $120,000 $130,000 $140,000 $150,000 90th percentile 75th percentile Median 25th percentile 10th Percentile Detroit MSA $124,030 $105,290 $86,403 $61,734 $51,958 U.S. $137,093 $114,379 $91,062 $70,533 $54,579 Data: United Statues Bureau of Labor Statistics

  21. Security Jobs DO Pay More InfoSec Analysts earn 8% more than other IT jobs Median Salary of Information Security Analysts vs all IT Occupations in Detroit MSA This salary $79,976 difference over a 30 $86,403 year career is $193,000. $76,000 $78,000 $80,000 $82,000 $84,000 $86,000 $88,000 All IT occupations Information Security Analysts Data: United Statues Bureau of Labor Statistics

  22. You’ve Got Job Security Job openings vs. program completions for IT occupations • Supply-demand gap for IT occupations is real. • But, with ongoing workforce development efforts in Michigan, notable progress is being made to diminish the gap. National Openings vs. Program Completions MI Openings vs. Program Completions 250,000 8,000 200,000 6,000 150,000 4,000 100,000 2,000 50,000 0 0 National Annual Openings (2014) Program Completions (2014) Annual Openings (2014) Program Completions (2014) Annual Openings (2014) Program Completions (2014) Note: Only about 60% of completions are a Bachelor's + and not all degrees are equivalent (online offerings, for-profit colleges) Data for IT Openings: United Statues Bureau of Labor Statistics Data for Completions: Integrated Postsecondary Education Data System ( IPEDS)

  23. What about the degrees? And the women? • 80% of job ads required a Bachelor’s degree • Only 1 in 4 information security analysts are women

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend