5 soft skills you need to be a successful security pro

Introduction

The pace of new cybersecurity professionals entering the field is not keeping up with the demand, and the talent gap has been growing wider in the last few years. Considering the dire need, you may think that a job in cybersecurity is guaranteed. But employers aren’t just looking for trained candidates with specialized technical skills — they want to see people skills, excellent communication and other “soft” skills.

Many cybersecurity education or training programs don’t teach soft skills, focusing instead on technical competence and proficiency. That means that if you want to succeed in this career, you may need to find ways to develop soft skills on your own and seek out opportunities that give you a more rounded experience.

The cybersecurity labor market

Currently estimated at nearly three million globally, the cybersecurity talent shortage is the highest in North America (at nearly 500,000 workers) according to the (ISC)2 annual Cybersecurity Workforce Study. In the United States, cybersecurity also has a much smaller supply of workers compared to other sectors. CyberSeek, an initiative funded by the private sector and the National Initiative for Cybersecurity Education (NICE), estimates the average supply-to-demand ratio in the industry at 2.3, compared to 5.8 for all jobs.

Cybersecurity workers are not only in high demand, they’re also paid well. A 2016 McAfee-sponsored report by the Center for Strategic and International Studies (CSIC) found that U.S. cybersecurity jobs paid $6,500 more than IT jobs in general, which comes to a 9.5 percent premium.

While the majority of organizations struggle to fill their cybersecurity openings, they increasingly want employees who have soft skills. In a 2017 survey by Tripwire, all 315 IT professionals said soft skills were important when they hired for their security teams, and 72 percent said the (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Rodika Tollefson. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/y34r-2ez2pw/