How to Retain your Security Analyst

We’ve covered the cybersecurity hiring shortage previously. We’ve warned against taking this path before. But, if you’ve decided to ignore us, let’s talk about what happens if you are lucky enough to hire a qualified analyst. 

In short: you’ll need to pull out all the stops if you want to keep them.

Why You Might Consider Hiring a Security Analyst

Hiring a security analyst often seems like the logical “next step” once your small-to-medium sized business has its antivirus and firewall up and running.

You want visibility. Visibility requires tooling. Tooling requires trained operators.

For instance, you might want an intrusion prevention system (IPS) to detect and prevent vulnerability exploits on your network. Or maybe you’d like more security information and event management (SIEM) to provide real-time analysis of security alerts. In either case, running these tools is a full-time job. Sticking with the DIY path, instead of going with a managed security service provider (MSSP) or a managed detection and response (MDR) solution, means you’ll need someone in house.

Hiring top tech talent is always HARD, and this task is exacerbated by cybersecurity talent shortage. At IntelliGO, our process routinely takes about 3 months, 100 applicants, and 80 person-hours plus recruiter, background check, and other fees to successfully hire a single highly-qualified analyst. Each hire, though, has a crisp ROI; we understand the value an individual must provide to our organization and that understanding means we can specifically target candidates who will excel in the job that benefits us most.

With cyberattacks growing in frequency and intensity every year, boards and executives have realized cybersecurity is a business issue. As a result, competition for talent is fierce. Some estimates peg the global shortage of talent at 3.5 million unfilled cybersecurity jobs by 2021. That’s a 350 percent (Read more...)

*** This is a Security Bloggers Network syndicated blog from IntelliGO MDR Blog authored by Jerry Heinz. Read the original post at: