May 22, 2017 By Christophe Veltsos 4 min read

“There are over 5 million jobs open in this country. The reason they are not filled is skills.” — Ginni Rometty, IBM CEO, speaking to Fox Business about new collar jobs.

Organizations are suffering from an inability to fill vacant technology and cybersecurity positions. A four-year wait for students to complete their curricula is an eternity for the technology sector given the rapid pace of innovation and change in the field. And since most organizations today cannot run without technology and an appropriate level of cybersecurity, this skills gap really extends to entire countries. A March 2017 report by Frost and Sullivan predicted that the number of global unfilled positions will reach 1.8 million by 2022.

Closing this gap in qualified workers requires innovative thinking, and security leaders must reach out to new pools of talent. In this new era of cybersecurity talent acquisition, potential recruits don’t need to have advanced degrees. This is neither a blue-collar nor a white-collar job; today, according to Rometty, “we have a new collar.”

What Are New Collar Jobs?

According to the recent report by the IBM Institute for Business Value (IBV), “It’s Not Where You Start — It’s How You Finish: Addressing the Cybersecurity Skills Gap With a New Collar Approach,” new collar is a term that refers to “professionals who may not have a traditional college degree but do have the needed technical skills and aptitudes.” The report stated that “a new collar approach focuses on skills — not degrees earned — as a prerequisite to find and attract nontraditional candidates with diverse backgrounds and skill sets. Once hired, these new employees are expected to strive for continuous learning and professional growth.”

Monster offered five examples of new collar jobs that people can go after without a four-year degree. Here are three relevant to cybersecurity:

  • Cloud administrator — someone who develops, deploys and maintains cloud-based services. Many such folks are self-taught or have completed relevant certifications, and are proficient in scripting languages such as Perl, Ruby and Python.
  • Service delivery analyst — someone who relies on software to review how services are provided to end users and seeks to improve those processes.
  • Cybersecurity architect — someone who can design, implement and test the security of an organization’s networks and computers, including running vulnerability assessment software.

Read the complete report: Addressing the Skills Gap with a New Collar Approach

IBM Takes the Lead

Rometty is not only credited with having coined the term new collar, but she is also leading the charge and taking bold steps to challenge the way governments, academia and various industries approach talent acquisition.

In her November 2016 open letter to the then President-elect, Rometty wrote, “What matters most is relevant skills, sometimes obtained through vocational training.” She went on to share IBM’s success in championing a new educational model for the U.S. by creating “six-year public high schools that combine traditional education with the best of community colleges, mentoring and real-world job experience.” IBM supported the opening of the first such school in New York five years ago and hired some of the first graduates, Rometty explained, adding that there would soon be 100 of these schools across the country.

With the letter, Rometty challenged the government to create “a national corps of skilled workers” to address the thousands of IT jobs that would otherwise go unfilled.

Closing the Skills Gap

The IBV report outlined three ways to address a talent shortage:

  1. Change the way work is done (e.g., automation, outsourcing).
  2. Change the environment (e.g., change culture, benefits or compensation to attract more talent).
  3. Change who the organization pursues.

The final option means reviewing input filters, casting a wider net and seeking to recognize talent in the early stages. According to the report: “There is a growing realization that new roles focused on emerging technologies require specific skills and knowledge to perform, but do not necessarily require a university degree. The approach also involves restructuring work around specific skill sets to create new roles.”

Organizations should look at how they assess and develop core attributes and skills. IBV defined core attributes as “a general disposition beneficial to security professionals — a set of common personality traits and learned behaviors.” Skills can include both technical and workplace-related abilities. The figure below shows how core attributes and skills can be mapped along different characteristics.

The IBV report highlighted a whole suite of steps that organizations can take to solve the talent shortage. The steps include the following:

  1. Re-examine your workforce strategy. Look at redefining or re-aligning various roles to ensure that they represent different levels of skill mastery, including an entry-level category that might not require a four-year degree. The report presented several examples of roles for each main cybersecurity category: builders, operators and communicators.
  2. Improve your engagement and outreach. Expand your recruiting grounds and interact with instructors, classes and, ultimately, students.
  3. Build a local cybersecurity ecosystem. Foster innovation and collaboration by engaging with regional workforce organizations and academic institutions, including secondary schools. The report also mentioned the benefits of providing externships for instructors to stay current in the field and ensure that students get fresh and relevant information.
  4. Provide a robust support program for new hires. After all, their success will be your success.

The figure below highlights various activities that organizations should consider to close the skills gap.

The talent shortage is likely to continue, but adopting a new collar approach can definitely ease the pressure that chief information security officers (CISOs) and organizations are facing today.

Read the full report: Addressing the Skills Gap with a New Collar Approach

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today