November 6, 2015 By Douglas Bonderud 2 min read

There are more than 200,000 positions available for cybersecurity professionals in organizations across the country, yet many of them sit vacant for months or even years. Part of the problem is a cyber skills gap fueled by millennials’ lack of interest in cyber careers and the emergence of a gender gap, which leaves fewer women exposed to possible careers in technology and without any real access to IT mentors or programs.

According to CSO Online, however, the National Institute of Standards and Technology (NIST) is now funding the creation of a heat map that will show prospective applicants which jobs are open, where they are located and what type of qualifications are required to apply. The hope? That NIST’s map can stoke the fire of potential cyber professionals and encourage them to burn bright where they’re needed most.

Evolving Encouragement

Along with NIST, other government agencies are trying to drum up interest in cybersecurity careers. The NSA, for example, recently held its first annual Day of Cyber, which “enables students to test drive their future by living a day in the life of six NSA cyber leaders.” The idea of an interactive, self-guided experience that raises the profile of science, technology, engineering and math (STEM) careers can only benefit the industry as a whole.

As noted by Bloomberg Business, there’s a burgeoning interest among business school graduates for cyber careers, often from sources outside Silicon Valley. According to the Bloomberg piece, “A handful of B-schools in unlikely regions graduated more students into technology jobs in 2014 than into any other sector.” Why the change?

In large measure, the advancement of cloud and social networking technologies is responsible — students are no longer at a disadvantage if they can’t attend schools in California, New York, Boston or other tech hubs.

Cybersecurity Professionals Fire It Up

The NIST-funded heat map is meant to shine a light on companies across the nation that have available positions for cybersecurity professionals but simply haven’t been able to get the word out. For interested parties, the map provides much-needed choice: Do prospective IT employees prefer to work in areas of high tech concentration or opt for jobs in areas where they’re the only cybersecurity professional for miles in any direction?

The mapping tool, developed by analytics and research firm Burning Glass Technology and IT trade association CompTIA, will also let users break down specific job information to see details such as titles, necessary skills and required degrees, helping ensure they don’t waste their time applying for jobs they don’t have the qualifications to fill.

Despite cybersecurity jobs enjoying a $6,500 salary bump over other IT careers, they take 8 percent longer to fill, according to Burning Glass; companies demanding more specialized skill sets could wait months for a single qualified applicant. With the number of IT jobs doubling over the last few years and post-secondary institutions finally starting to turn out cyber-savvy graduating classes, the next logical step is linking IT pros to suitable positions.

Ideally, NIST’s career heat map should help address the burning need for cyber expertise and help fuel the fire for potential STEM graduates by giving them a sense of the market’s true depth.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today