June 23, 2017 By Scott Koegler 2 min read

With global cybersecurity job openings and security threats at all-time highs, enterprises are struggling to fill positions with qualified staff. But while the problem threatens to plague the IT industry for years to come, security leaders and hiring managers can take proactive measures to attract and retain top talent for their organizations.

Five Tips to Close the Cybersecurity Skills Gap

They key is to think outside the box, communicate with others in the industry and commit to professional development. Below are five tricks companies can employ to fill unoccupied roles and reduce the cybersecurity skills gap.

1. Stop Looking for Obvious Candidates

Campus recruiting efforts may categorize applications by specialized degrees and internship experience, but final-term students may not have fully developed goals beyond what they know from their classes and placement assistance. Security leaders should look for technical aptitude and hands-on experience that may have little to do with degrees. For example, resumes may not list activities such as hackathons, which produce indirect if informal experience that could jump-start a cybersecurity career.

Read the IBM Executive report: Addressing the Skills Gap with a New Collar Approach

2. Identify Internal Talent

Keep an eye on existing IT employees and look for those who have been doing great work on complex projects. Job skills can translate from one technical specialty to another if the person is motivated and interested in changing. Be sure you have resources in place to help them transition. These could include funds for education assistance or mentoring opportunities with existing staff.

3. Consult With Vendors

Security product vendors know the landscape and the companies they work with. It’s unreasonable to expect them to assist you in recruiting talent away from another company, but they may have advance knowledge of someone leaving an existing position. Keep an open dialogue with vendor representatives about the job market in general and solicit their impressions regarding what kinds of employees are most likely to be successful in the positions you’re trying to fill.

4. Prioritize Ability Over Experience

When there are few experienced candidates for an open cybersecurity position, consider those who may have applied for other technical roles. The qualifications that make for skilled security professionals are similar in many ways to those of programmers and data analysts. An interest in learning, technical aptitude, attention to detail and side-by-side collaboration with other security staff is likely to produce a better-qualified employee in less time than it would take to find someone with experience.

5. Train Your Own Potential Hires

The cybersecurity skills shortage will not be resolved any time soon, so companies are in for a long period of waiting for someone to solve the crisis. Companies that train their own potential hires are much more likely to fill positions and retain talent.

Opportunities range from co-sponsoring cybersecurity certification programs to offering employees paid time to teach at educational institutions. This enables enthusiastic students to form bonds with their teachers and gain positive impressions of the companies that may be in line to hire them.

Think Outside the Box

It’ll take an industrywide culture shift to close the cybersecurity skills gap for good, but individual organizations can mitigate the effects of the talent shortage with a long-term and wide-ranging approach to recruiting. Every enterprise is looking to fill these gaps, but companies that think beyond traditional recruiting practices will have a clear edge.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today