2018 saw many jaw-dropping cybersecurity and data breaches, with major international brands like Facebook and Marriott suffering data record losses into the millions — 87 million and up to 500 million, respectively.
Just the magnitude of these cyberbreaches means unfortunate headlines for these global brands, but it also means ample opportunity for IT professionals looking to expand their employment possibilities. According to a report by the Center for Strategic and International Studies (CSIS), the number of cybersecurity job vacancies left unfilled in the United States stands at almost 314,000. This is an incredible figure, given there are only 769,000 cybersecurity professionals in today’s workforce.
The future looks equally grim for employers, with the same CSIS survey projecting the number of global vacancies to top 1.8 million by 2022. Ultimately, this has led to 71 percent of IT decision-makers reporting that this talent gap is causing direct and measurable damage to their organizations.
However, the scale of the opportunity for IT professionals has been widely known for years. This is especially true for those with the skills, experience and versatility held by cybersecurity analysts. Corporations rely on these professionals to help keep their data, employees and systems safe. In return, according to the Bureau of Labor Statistics, cybersecurity analysts can command a median salary of $99,960 a year in the United States.
Certification exam topics
As mentioned previously, the CompTIA CySA+ certification verifies that successful credential holders have the knowledge and skills to fulfill their roles. At a high level, CySA+ holders are required to configure and use threat detection tools, perform data analysis, and interpret the results in order to identify vulnerabilities and to communicate and mitigate threats and risks to an organization. Ultimately, this function serves the end goal of securing and protecting applications (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Patrick Mallory. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Zdnut1Bmdes/