In the 1860s, Horace Greeley, founder and editor of The New York Tribune, inspired a generation of young Americans by popularizing the phrase, “Go West, young man, and grow up with the country.”

In the 1960s, the Oscar-winning movie “The Graduate” offered some tongue-in-cheek inspiration of its own when an older man takes aside recent college graduate Benjamin Braddock and says, “I just want to say one word to you. Just one word. Are you listening? Plastics.”

In the 2010s, the vocational advice for young professionals could very well be, “Consider a career in cybersecurity.” The following are six reasons why.

1. High Demand

According to Bloomberg Businessweek, the U.S. Department of Defense and the FBI alone would like to recruit 6,000 people with cybersecurity skills by the end of 2016. The technology tsunamis that are transforming society in so many positive ways are also making it more vulnerable to attacks on the privacy of data, the integrity of payment systems and the availability of critical infrastructure. Technology alone is not enough to prevent, detect, respond to and recover from cybersecurity incidents; there is also a critical need for skilled people. Depending on the source, the unemployment rate for cybersecurity professionals is currently near or below zero. The point is, demand is high and exceeds supply.

2. High Pay

High demand does not always mean high pay (e.g., teachers), and high pay does not always mean plentiful opportunities (e.g., Major League shortstops). However, in the case of cybersecurity, both demand and compensation are up, as the average income reported by cybersecurity professionals in the United States is three times the national median for full-time workers. Money is not always at the top of the list for why people are motivated to go to work every day, but it’s usually up there, and higher pay doesn’t hurt.

3. Highly Skilled

When something is so easy that anyone can do it, one can’t expect high demand and high pay to be sustained; however, this is not the case for cybersecurity professionals. In 2012, an article in the Harvard Business Review referred to data scientists — that is, the people who can coax valuable insights out of a messy, complex collection of data — as “The Sexiest Job of the 21st Century.” Technical skills can be taught, but a natural capacity for conceptualizing, synthesizing and solving problems is unique and special — and apparently sexy, for some people. Cybersecurity is interesting, challenging, technology-focused work.

4. Highly Dynamic

Because information technology is in a constant state of change — thank you, Moore’s Law — so is cybersecurity. The latest college graduates may have grown up as “digital natives,” but keep in mind that at the time they were preparing to graduate from high school, no one had iPads. The fascinating battle between the technology makers and the technology breakers goes back hundreds of years, but the faster technology changes, the faster attackers can exploit it. From denial-of-service attacks, point-of-sale intrusions, attacks on Web apps and abuse by insiders to ransomware, cyber-extortion, malicious QR codes and malevolent fonts, if you’re looking for work that is repetitive and boring, a career in cybersecurity is certainly not for you.

5. Highly Transferable

Many jobs are tied to specific locations, but a career in cybersecurity is highly portable — after all, we are in an information economy. Data from the U.S. Bureau of Labor Statistics shows that these jobs are located in virtually every geography, and it goes without saying that these types of jobs can be located virtually anywhere. In other words, wherever there is a network connection, you can be on the job (though there’s both an upside and a downside to that).

6. Higher Purpose

As a rule, cybersecurity professionals are not likely to be famous. On the contrary, they quietly provide committed, faithful and honorable service to their organizations, countries and society as a whole. What’s under constant attack is more than just our networks, devices, servers, applications and data; it’s also our mobile, flexible, connected way of life. Very much like the thin blue line of law enforcement or the thin red line of firefighters, the thin digital line of cybersecurity professionals will increasingly be recognized and appreciated as an important and meaningful vocation.

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…