MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

Size: px
Start display at page:

Download "MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016"

Transcription

1 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

2 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC

3 Bridging the Cybersecurity Talent Gap 2015 Burning Glass Technologies

4 Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped 38% year-over-year Demand for cybersecurity talent is soaring Cyber openings increased 91% from 2010 to 2014 But the supply of cybersecurity talent is lagging According to Cisco, there are 1 million unfilled cyber jobs worldwide 3

5 The Cybersecurity Skills Gap Persists As the economy moves faster, the skills gap is in danger of widening 4

6 Behind the Cybersecurity Skills Gap: An Information Gap Traditional data sources do not align well with the current realities of the cybersecurity labor market. Data are not packaged for employers or job seekers: They re designed for macro-economists Data are in broad categories Lots of cybersecurity jobs that matter are not tracked Skills and certifications are hardly tracked at all 5

7 Closing the Cybersecurity Information Gap with Real- Time Labor Market Data Real-time job market data offer up-to-date insights not possible through traditional sources Visit Online Job Sites Collect & Deduplicate Job Postings Read Postings to Generate Detailed Data Job Title & Occupation Employer & Industry Technical Skills Foundational Skills Certifications Educational Requirements Experience Levels 2015 Burning Glass Technologies - Proprietary and Confidential 6

8 It s Hard to Train People for a Job That s Not Defined To quantify and analyze the market for cybersecurity specific roles, Burning Glass developed a set of filters to identify those jobs that are directly related to network and information security. Jobs are flagged as a cybersecurity role if they meet one of the following criteria or job requirements: Cybersecurity-related title such as network security engineer, information security analyst or penetration tester Cybersecurity certification such as CISSP, CISA, or Security+ Cybersecurity skills such as information assurance, cryptography, computer forensics, malware analysis, , and 2015 Burning Glass Technologies - Proprietary and Confidential 7

9 Pulling Back the Curtain: What Trends Are Shaping the Cybersecurity Job Market? 8

10 What Trends are Shaping the Cybersecurity Job Market? Cybersecurity workers are in high demand The cybersecurity job market is growing in non-obvious places Certifications are in high demand, but certified workers are in short supply Cybersecurity jobs require a diverse and hard-to-find mix of skills and qualifications 9

11 Cybersecurity Demand is Large and Growing, But Supply is Struggling to Keep Pace In 2014, there were 238,158 postings for cybersecurity-related jobs nationally. Cybersecurity jobs account for 11% of all IT jobs. Cybersecurity postings have grown 91% from This growth rate is more than faster than IT jobs generally. Cybersecurity posting advertise a 9% salary premium over IT jobs overall. Cybersecurity job postings took 21% longer to fill than the average for all jobs, and 8% longer to fill than the average for IT jobs. The demand for certificated cybersecurity talent is outstripping supply. In the U.S., employers posted 49,493 jobs requesting a CISSP, recruiting from a pool of only 65,362 CISSP holders nationwide.* $6,459 *According to the International Information System Security Certification Consortium, Inc., (ISC)² membership counts as of July 14, Burning Glass Technologies 10

12 Employers Are Hiring a Diverse Set of Cybersecurity Roles The cybersecurity workforce covers a range of job types and skills. This includes advanced Engineer and Architect roles, Auditors (which are concentrated in Finance), and Specialists, which typically have lower entry-level requirements Burning Glass Technologies 11

13 What Trends are Shaping the Cybersecurity Job Market? Cybersecurity workers are in high demand The cybersecurity job market is growing in non-obvious places Certifications are in high demand, but certified workers are in short supply Cybersecurity jobs require a diverse and hard-to-find mix of skills and qualifications 12

14 Cybersecurity Demand is Spreading to New Industries That May Lack an Experienced Cyber Workforce Professional Services, Finance, and Manufacturing & Defense are the leading sectors for cybersecurity professionals. Sectors managing increasing volumes of consumer data such as Finance, Health Care, and Retail Trade have seen the fastest increases in demand for cybersecurity workers. Within these sectors, demand for cybersecurity professionals is growing rapidly in more specific industry subsectors not typically associated with cybersecurity, including Air Transportation (+221%) and Accommodation (+157%). *The Manufacturing Sector includes services divisions of a number of defense contractors (e.g. Raytheon) and computer manufacturers (e.g. Hewlett Packard). ** Industry growth rates are suppressed for the Public Administration and Other industry sectors because a significant portion of labor market demand in these industries exists offline Burning Glass Technologies 13

15 Cybersecurity Jobs Aren t Just in Tech Hubs Any More Top States by Total Postings* State Total Postings Location % Growth Quotient** ( ) 1 California 28, % 2 Virginia 20, % 3 Texas 18, % 4 New York 14, % 5 Illinois 11, % 6 Maryland 11, % Cybersecurity Job Postings in 2014 By State 7 Florida 9, % 8 Georgia 8, % 9 New Jersey 8, % Cybersecurity Location Quotient in 2014 By State 10 Massachusetts 7, % 11 Colorado 7, % 12 North Carolina 7, % 13 Ohio 6, % 14 Pennsylvania 5, % 15 Arizona 5, % *See Appendix 1 for state-level data tables on total postings and postings growth. **Location quotients show how concentrated demand is in a particular geography relative to employment in that area. National location quotient equals 1.0; an LQ of 1.2 indicates that demand is 20% more concentrated than nationally Burning Glass Technologies 14

16 What Trends are Shaping the Cybersecurity Job Market? Cybersecurity workers are in high demand The cybersecurity job market is growing in non-obvious places Certifications are in high demand, but certified workers are in short supply Cybersecurity jobs require a diverse and hard-to-find mix of skills and qualifications 15

17 Employers Look for Certified Cybersecurity Workers Cybersecurity jobs are highly certificated: More than one in three (35%) of all cybersecurity positions request at least one of the certifications listed below. Only 23% of overall advertised IT jobs request an industry certification. Certification increases salary: Security+ represents the entry-level certification for cybersecurity roles, and postings requesting it advertise an average salary of $75,484. This serves as a baseline salary for certified cybersecurity workers, and as workers obtain additional certification they can qualify for ever greater salaries. Postings requesting CISSP, for example, advertised an average salary of $93,010 a premium of $17,526 over the average salary for Security Burning Glass Technologies 16

18 Certifications: Too Many Openings Chasing Too Few Workers Employers prefer workers with cybersecurity certifications, but there can be two or more postings for every certificate holder. Considering that most of these certificate holders are already employed, the situation looks even better for workers possessing these certifications. Note: Different certifying organizations report slightly different counts of holders. For example, some may report total certifications awarded, while others may report only active certification holders Burning Glass Technologies 17

19 What Trends are Shaping the Cybersecurity Job Market? Cybersecurity workers are in high demand The cybersecurity job market is growing in non-obvious places Certifications are in high demand, but certified workers are in short supply Cybersecurity jobs require a diverse and hard-to-find mix of skills and qualifications 18

20 Cybersecurity Roles Require Significant Education and Experience That May Not Exist in the Market Some 84% of cybersecurity postings specify at least a bachelor s degree, and just as many (83%) require at least 3 years of experience, with an average of 5.4 years. High education and experience requirements make skills gaps hard to close. Because cybersecurity jobs require years of training and relevant experience, skills gaps cannot easily be resolved though short-term solutions. Employers and training providers must work together to cultivate a talent pipeline for these critical roles. Requested Education Level* Minimum Experience 2015 Burning Glass Technologies 19

21 Hybrid Jobs Combining Disparate Skills are Hardest to Fill The fastest-growing skills in cybersecurity postings include industry knowledge areas, such as HIPAA requirements in Health Care and Risk Management, and Accounting in Finance. The hardest-to-fill skills are typically related to finance, such as Information Assurance, Sarbanes-Oxley, and Accounting. Finding candidates with these unique skill sets can take roughly 17% longer to fill on average than other cybersecurity job openings. The difficulties in filling jobs that require a combination of IT security and financial skills reflects a broader trend in the market: hybrid jobs which combine skill sets that are not traditionally trained for together often suffer from the most severe skill gaps. Fastest-Growing Skills in Cybersecurity Job Postings Five-Year Growth Hardest to Fill Skills in Cybersecurity Job Postings Posting Duration Time to Fill Above Average Python 309% HIPAA 248% Risk Management 209% Internal Auditing 200% Audit Planning 170% Risk Assessment 169% ITIL 153% Management Information Systems 132% Accounting 121% Configuration Management 106% Management Information Systems 50 days +10 days Information Assurance 47 days +7 days Sarbanes-Oxley 47 days +7 days Accounting 45 days +5 days Python 45 days +5 days Dynamic Host Configuration Protocol (DHCP) 45 days +5 days Configuration Management 44 days +4 days C++ 44 days +4 days Public Accounting 43 days +3 days Internal Auditing 43 days +3 days 2015 Burning Glass Technologies 20

22 Roles Requiring Security Clearance Take Longer to Fill In 2014, 25,654 cybersecurity postings called for government Security Clearance, representing 11% of all cybersecurity postings. On average, cybersecurity postings requesting Security Clearance remained open 10% longer than cybersecurity postings overall. Posting Duration (2014) Average # of Days to Fill Online Job Postings in Burning Glass Technologies 21

23 The Road Ahead: What Are the Implications for Educators and Employers? 22

24 What Are the Implications for Educators and Employers? Communicate the Value of Careers in Cybersecurity Focus on the Credentials that Matter Looking Outside of Cyber: Understand Cybersecurity Career Pathways 23

25 Sell It! Communicating the Monetary and Non-Monetary Value of Careers in Cybersecurity Students and job seekers have choices when it comes to their careers. Articulating the value of cybersecurity jobs is essential if we are to motivate them to choose careers in cyber. On average, cybersecurity jobs advertise salaries of almost $84,000. This is 9% higher than IT jobs overall. $6,459 But cybersecurity careers don t just offer monetary benefits; they also offer exciting opportunities to protect the nation s digital infrastructure Burning Glass Technologies 24

26 What Are the Implications for Educators and Employers? Communicate the Value of Careers in Cybersecurity Focus on the Credentials that Matter Looking Outside of Cyber: Understand Cybersecurity Career Pathways 25

27 Broaden the Talent Pool by Focusing on the Credentials that Matter Some credentials are rare among cybersecurity workers and may not be necessary for onthe-job success. Separating the essential credentials from the nice-to-have credentials can broaden the pool of available talent for your cybersecurity roles. Similarly, educators and job seekers can focus on the credentials that are most-demanded and most lucrative to increase their value in the market Burning Glass Technologies 26

28 What Are the Implications for Educators and Employers? Communicate the Value of Careers in Cybersecurity Focus on the Credentials that Matter Looking Outside of Cyber: Understand Cybersecurity Career Pathways 27

29 Look Outside of Cyber to find Cyber Talent Cybersecurity Career Pathway 2015 Burning Glass Technologies 28

30 Filling Cybersecurity Jobs with Veterans: A Natural Fit Military Occupational Codes Mapping to Civilian Cybersecurity Roles MOC MOC Title Service 275 Information Systems Technician Coast Guard 6049 NALCOMIS Application Administrator/Analyst Marine Corps 9556 Security Specialist Navy 17C0 Cyberspace Operations Commander Air Force 17D(1,3,4)x Cyberspace Operations Air Force 140A Command and Control Systems Integrator Army 24A Telecommunications Systems Engineer Army 24X Designated Telecommunications Systems Engineer Army 250A Telecommunications Technician Army 254A Signal Systems Support Technician Army 255S Information Protection Technician Army 25A Signal, General Army 290A/29A Electronic Warfare Technician / Electronic Warfare Officer Army 352N Signals Intelligence Analysis Technician Army 352S Signals Collection Technician Army 2015 Burning Glass Technologies 29

31 The Bottom Line: Cybersecurity Has a Problem But Working Together We Can Solve It 30

32 Questions? 31

33 About Burning Glass Burning Glass Technologies delivers job market analytics that empower employers, workers, and educators to make datadriven decisions. Burning Glass is reshaping how the job market works, with data that identify the skill gaps that keep job seekers and employers apart and tools that enable both sides to bridge that gap and connect more easily. The company s artificial intelligence technology analyzes hundreds of millions of job postings and real-life career transitions to provide insight into labor market patterns. This real-time strategic intelligence offers crucial insights, such as which jobs are most in demand, the specific skills employers need, and the career directions that offer the highest potential for workers. Burning Glass applications drive practical solutions and are used across the job market: by educators in aligning programs with the market, by employers and recruiters in filling positions more effectively, and by policy makers in shaping strategic workforce decisions. At the same time, Burning Glass data-driven applications for workers and students help them choose career goals and build the skills they need to get ahead. Based in Boston, Burning Glass is playing a growing role in informing the global conversation on education and the workforce, and in creating a job market that works for everyone. For More Information Will Markow Senior Analyst t +1 (617) wmarkow@burning-glass.com Burning Glass Technologies 32

34 Draft Mission: About the Security Community The Security Community s mission is to create a forum for sharing knowledge, fostering innovation and positioning MA as a global leader in Security. Draft Goals: Improve connections & collaboration amongst individuals, companies, & organizations interested in security Support security workforce through professional development and networking Continuously promote Massachusetts as a leader within the security space Security Community Advisory Board (AB) Members work directly with MassTLC to identify programs: events, research, and/or other initiatives that help realize the goals of the cluster. Any MassTLC member in good standing may participate on the Security Advisory Board. Members must assist with at least one initiative per year. There will be two semi-annual planning meetings, along with other planning communications ( , conference calls, in-person meetings where necessary)

35 Co-chairs: About the Security Community Structure Gerald Beuchelt, CSO, Demandware Lee Weiner, SVP, Products & Engineering, Rapid7 Advisory Board: Knowledgeable about the industry/ issue and play an active role in its ecosystem Willing to roll up your sleeves, get active and help on one or several initiatives within the community that might include: Aggregating news on the industry (newsletter) Promoting the Community to engage the broader ecosystem Research on topics from size and scope to industry trends and forecast Identifying event ideas including speakers and format Writing or gathering blog posts that disseminate content of the broader community The benefits to you include: Having voice in cluster s direction Recognition on website/ LinkedIn profile/ resume Recognition at events as a leader at the Council Access and connections to a network of people in the industry with similar interests

36 MassTLC Clusters & Communities Cloud Security Talent Development Mobile CSO/CISO Sales & Marketing CMO & VP Mktg. Demand Gen Big Data IoT Software Development CTO & VP Eng. DevOps Healthcare Robotics CXO

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies Job Market Intelligence: Cybersecurity Jobs, 2015 Introduction: Cybersecurity and the Job Market American employers have realized the vital importance of cybersecurity but that realization has created

More information

Core Challenges in the Market for Cybersecurity Jobs

Core Challenges in the Market for Cybersecurity Jobs December 2, 2014 Core Challenges in the Market for Cybersecurity Jobs BHEF National Cybersecurity Workforce Summit Matt Sigelman, CEO Burning Glass Technologies Matching People & Jobs Reemployment & Education

More information

Job Market Intelligence:

Job Market Intelligence: March 2014 Job Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence Average #

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

BHEF s National Higher Education and Workforce Initiative

BHEF s National Higher Education and Workforce Initiative BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member

More information

Program Drill-Downs National

Program Drill-Downs National July 2014 Program Drill-Downs National Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence

More information

Program Drill-Downs Western New York

Program Drill-Downs Western New York July 2014 Program Drill-Downs Western New York Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

White Paper: Why We Need Veterans for Critical Infrastructure Security

White Paper: Why We Need Veterans for Critical Infrastructure Security White Paper: Why We Need Veterans for Critical Infrastructure Security Published By: SkillBridge, LLC November 8, 2013 Converging Factors There is a significant and growing challenge that currently faces

More information

Workforce Intelligence Network: Working at Every Level

Workforce Intelligence Network: Working at Every Level Workforce Intelligence Network: Working at Every Level Workforce Intelligence Network 440 E. Congress, 4th Floor Detroit, MI 48226 This document outlines a project proposal for the Prosperity Region 9

More information

BEYOND POINT AND CLICK THE EXPANDING DEMAND FOR CODING SKILLS BURNING GLASS TECHNOLOGIES JUNE 2016

BEYOND POINT AND CLICK THE EXPANDING DEMAND FOR CODING SKILLS BURNING GLASS TECHNOLOGIES JUNE 2016 BEYOND POINT AND CLICK THE EXPANDING DEMAND FOR CODING SKILLS BURNING GLASS TECHNOLOGIES JUNE 2016 1 EXECUTIVE SUMMARY BEYOND POINT AND CLICK BEYOND POINT AND CLICK THE EXPANDING DEMAND FOR CODING SKILLS

More information

MISSED OPPORTUNITIES? The Labor Market in Health Informatics, 2014. December 10, 2014 burning-glass.com

MISSED OPPORTUNITIES? The Labor Market in Health Informatics, 2014. December 10, 2014 burning-glass.com MISSED OPPORTUNITIES? The Labor Market in Health Informatics, 2014 December 10, 2014 burning-glass.com MISSED OPPORTUNITIES? The Labor Market in Health Informatics, 2014 Health care reform depends on the

More information

Supply & Demand Report

Supply & Demand Report Supply & Demand Report Job Title: Manufacturing Engineer Location: Phoenix, AZ (within a 50 mile radius) Timeframe: December 2012 to November 2014 Filters Applied: Occupations : Industrial Engineers, Mechanical

More information

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings Introduction to Real-Time Labor Market Information Real time labor market information is derived from online job postings. Details included in online job postings can provide information such as the type

More information

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide

More information

In order to accomplish this, Burning Glass conducted three separate analyses: 1) A scan of the existing HVACR Maintenance and Installation workforce;

In order to accomplish this, Burning Glass conducted three separate analyses: 1) A scan of the existing HVACR Maintenance and Installation workforce; July 2015 INTRODUCTION The Heating, Ventilation, Air Conditioning, and Refrigeration (HVACR) industry is the quiet gatekeeper to our personal comfort. We take for granted that we can live and work comfortably

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

GENERAL ASSEMBLY & BURNING GLASS TECHNOLOGIES BLURRING LINES BLURRING LINES

GENERAL ASSEMBLY & BURNING GLASS TECHNOLOGIES BLURRING LINES BLURRING LINES BLURRING LINES How Business and Technology Skills Are Merging to Create High Opportunity Hybrid Jobs 2 INTRODUCTION Over the last several years, new tools have made programming and data analysis accessible

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development

National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian

More information

Using Labor Market Information STEM Regional Collaboratives. February 24, 2014

Using Labor Market Information STEM Regional Collaboratives. February 24, 2014 Using Labor Market Information STEM Regional Collaboratives February 24, 2014 CREDENTIALS THAT WORK (CTW) Credentials that Work gives decision makers the information to do the practical analysis to better

More information

CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY

CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY APRIL 2015 Hire Up, in partnership with TechPoint, reviewed real-time labor market data and completed surveys with 71 Central Indiana companies to

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

NetAcad Student Talent Initiatives + Cisco Certification = Student Success!

NetAcad Student Talent Initiatives + Cisco Certification = Student Success! NetAcad Student Talent Initiatives + Cisco Certification = Student Success! John Bjerke Area Academy Manager Western US June, 2014 To Our Cisco Networking Academy Instructors Thank you for your continued

More information

Re-Imagining the Cyber Warrior of the Future

Re-Imagining the Cyber Warrior of the Future CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.

More information

Northern Virginia Workforce Area #11 2015 2017 Credential Attainment Summary and Projections

Northern Virginia Workforce Area #11 2015 2017 Credential Attainment Summary and Projections Northern Virginia Workforce Area #11 2015 2017 Credential Attainment Summary and Projections Submitted to the Secretary of Commerce & Trade Commonwealth of Virginia October 31, 2014 Introduction The Northern

More information

A GROWING JOBS SECTOR: HEALTH INFORMATICS A CREDENTIALS THAT WORK REPORT FROM BURNING GLASS TECHNOLOGIES AND JOBS FOR THE FUTURE

A GROWING JOBS SECTOR: HEALTH INFORMATICS A CREDENTIALS THAT WORK REPORT FROM BURNING GLASS TECHNOLOGIES AND JOBS FOR THE FUTURE A GROWING JOBS SECTOR: HEALTH INFORMATICS A CREDENTIALS THAT WORK REPORT FROM BURNING GLASS TECHNOLOGIES AND JOBS FOR THE FUTURE JUNE 2012 Jobs for the Future identifies, develops, and promotes education

More information

CompTIA Tools & Resources for the JD-NEG Program

CompTIA Tools & Resources for the JD-NEG Program CompTIA Tools & Resources for the JD-NEG Program Gretchen Koch Executive Director, Workforce Development Programs CompTIA Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org Today

More information

Crunched by the Numbers: THE DIGITAL SKILLS GAP IN THE WORKFORCE March 2015. Burning Glass Technologies

Crunched by the Numbers: THE DIGITAL SKILLS GAP IN THE WORKFORCE March 2015. Burning Glass Technologies Crunched by the Numbers: THE DIGITAL SKILLS GAP IN THE WORKFORCE March 2015 Burning Glass Technologies EXECUTIVE SUMMARY In the middle-skill job market, the world is increasingly divided between the jobs

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

STEM Careers in Illinois: A Report on STEM Job Openings in Illinois and the Skills Illinois Graduates Will Need to Fill Them

STEM Careers in Illinois: A Report on STEM Job Openings in Illinois and the Skills Illinois Graduates Will Need to Fill Them STEM Careers in Illinois: A Report on STEM Job Openings in Illinois and the Skills Illinois Graduates Will Need to Fill Them Prepared for Complete College America by Burning Glass Technologies Matching

More information

SO YOU WANT TO BE IN CYBER SECURITY?

SO YOU WANT TO BE IN CYBER SECURITY? SO YOU WANT TO BE IN CYBER SECURITY? A boy comes to me with a spark of interest, I feed that spark and it becomes a flame, I feed the flame and it becomes a fire, I fed the fire and it becomes a roaring

More information

CYBER SECURITY WORKFORCE

CYBER SECURITY WORKFORCE Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction

More information

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Cybersecurity Industry Brief

Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery

More information

Veterans Employment Center

Veterans Employment Center Veterans Employment Center Resources Build a Profile Publish an online profile to connect with thousands of employers looking to hire Veterans. Translate Your Skills Utilize the Department of Labor s O*NET

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Getting a Degree in Cyber Security. 8 Important Considerations

Getting a Degree in Cyber Security. 8 Important Considerations Getting a Degree in Cyber Security 8 Important Considerations Table of Contents Getting a Degree in Cyber Security: 8 Important Considerations Introduction 3 Job Outlook 5 Salaries and Career Opportunities

More information

Cybersecurity. Employment Landscape. 2016 Fortify Experts. All Rights Reserved.

Cybersecurity. Employment Landscape. 2016 Fortify Experts. All Rights Reserved. Cybersecurity Employment Landscape Tim Howard Founder of Energy Sourcing Energy Technology Consulting & Staffing Founder of Vortecy & GRIDRx Utilities Analytics and Transformer Monitoring Founder of Fortify

More information

Why Certify? Why IT? Brian Matzelle

Why Certify? Why IT? Brian Matzelle Why Certify? Why IT? Brian Matzelle CompTIA Academy Team Alan Rowland Business Development Director Brian Matzelle Education Sales Senior Manager Jill Thielmann Manager, Inside Sales Kirk Smallwood Senior

More information

2014 CYBER INDUSTRY SURVEY

2014 CYBER INDUSTRY SURVEY Maryland s Cyber Industry Maryland s dynamic community of cybersecurity entrepreneurs, academia, federal agencies, investors, technologists and seasoned industry leaders makes it the nation s epicenter

More information

Recruitment Process Outsourcing:

Recruitment Process Outsourcing: Recruitment Process Outsourcing: What You Should Look for in an RPO Provider James F. McCoy Vice President & RPO Practice Lead It used to be that companies looked exclusively at cost and process to identify

More information

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye

More information

H U M A N R E S O U R C E S

H U M A N R E S O U R C E S Introduction I n a knowledge-based economy, the educational attainment and technology savvy of the workforce are strong contributors to a region s overall economic prosperity. This section benchmarks Ohio

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

How to profit from the growing shortage of IT professionals jobs

How to profit from the growing shortage of IT professionals jobs How to profit from the growing shortage of IT professionals jobs It s no secret that IT is one of the fastest growing fields in the U.S. What s less well known is that there are so many career opportunities

More information

Preliminary Case Study 3: Health, Science, and Medical Technology Real Time Labor Data. Career Ladders Project

Preliminary Case Study 3: Health, Science, and Medical Technology Real Time Labor Data. Career Ladders Project Preliminary Case Study 3: Health, Science, and Medical Technology Real Time Labor Data Executive Summary Career Ladders Project In this case study, we conducted research to find out what a real time labor

More information

Operations Excellence in Professional Services Firms

Operations Excellence in Professional Services Firms Operations Excellence in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction... 3 Market Challenges

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Getting in Front of the Cybersecurity Talent Crisis

Getting in Front of the Cybersecurity Talent Crisis CYBERSECURITY WORKFORCE Getting in Front of the Cybersecurity Talent Crisis http://boozallen.tumblr.com/post/120784624298/ how-to-build-a-cyber-dream-team-when-it-comes-to CONTENTS INTRODUCTION Introduction...

More information

Putting Business Capabilities to Work

Putting Business Capabilities to Work Putting Capabilities to Work Jeff Scott VP/ & Technology Strategy OMG Webinar January 15, 2014 Who is Accelare? Innovative Process Thought Leadership Powerful Technology Experts in strategy execution and

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

Military Recruiting Consulting & Training Services Proposal

Military Recruiting Consulting & Training Services Proposal In Partnership with Military Recruiting Consulting & Training Services Proposal Prepared For: March 9, 2015 Our Understanding of Your Needs XYZ is a rapidly growing organization with... An evolving military

More information

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said.

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said. Up-to-Date: Earning the Certs the Market Demands by Eric Vanderburg Certification is an excellent way to enhance your skills and employability, but although everyone wants to move ahead, many lack direction.

More information

lectronic shopping & mail-order houses IT & MEDIA cluster workforce analysis

lectronic shopping & mail-order houses IT & MEDIA cluster workforce analysis software publishing telecommunications motion picture & video data processing lectronic shopping & mail-order houses IT & MEDIA cluster workforce analysis January 2013 January, 2013 Dear Colleagues: Thank

More information

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education

More information

Executive Summary. Principal Findings

Executive Summary. Principal Findings On May 30, 2012, Governor Deval Patrick launched the Massachusetts Big Data Initiative, to leverage and expand the Commonwealth s position as a global leader in the rapidly growing big data sector. The

More information

2013 ClearanceJobs COMPENSATION SURVEY

2013 ClearanceJobs COMPENSATION SURVEY 2013 ClearanceJobs COMPENSATION SURVEY THE GREAT REBALANCE A comprehensive earnings survey of security-cleared professionals, with 16,300 respondents from October 2012 to January 2013 provided by ClearanceJobs.

More information

NAS Insights Knowledge times 7

NAS Insights Knowledge times 7 Table of Contents Introduction to NAS Insights: Knowledge times 7 #1 Hiring Supply & Demand Intelligence #2 Workforce Demographics & Market Intelligence #3 Salary & Cost-of-Living Reports #4 Diversity,

More information

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South

More information

RVA Workforce Issues

RVA Workforce Issues Community College RVA Workforce Study Report August 2015 Southeastern Institute of Research, Inc. 1 Table of Contents Background, Objectives, and Methodology Respondent and Organization Profile Seven Key

More information

2012 ClearanceJobs Compensation Survey

2012 ClearanceJobs Compensation Survey 2012 ClearanceJobs Survey Earnings are up for security-cleared professionals, but so are career concerns A comprehensive earnings survey of security-cleared professionals, with 11,436 respondents from

More information

Fayetteville Technical Community College Military Programs Update

Fayetteville Technical Community College Military Programs Update Fayetteville Technical Community College Military Programs Update Awarding Credit Where Credit is Due April 1, 2015 The FTCC Commitment Serve the active, retired, or transitioning military and their family

More information

WHITE PAPER. Top Nurse Salaries by State

WHITE PAPER. Top Nurse Salaries by State WHITE PAPER Top Nurse Salaries by State Top Nurse Salaries by State Registered nurses (RNs) experience fast-paced, challenging work and some have the opportunity to earn very attractive salaries. The strong

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

Pathways to Empowered Security Leadership

Pathways to Empowered Security Leadership Pathways to Empowered Security Leadership Meet BusinessX Major Retailer BusinessX doesn t have a CISO They just experienced a massive breach that cost millions and put the company in the public eye for

More information

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow (ISC) 2 2012 Career Impact Survey Executive Summary The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow Skilled security professionals enjoy job stability and mobility,

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

IT Workforce snapshot

IT Workforce snapshot 2013 IT Workforce snapshot TEKsystems IT Workforce Snapshot is designed to provide a high-level view of trends impacting IT spending, IT employment, workforce supply and demand, compensation and geographical

More information

IT Workforce snapshot

IT Workforce snapshot 2013 IT Workforce snapshot The energy sector is being impacted by changes that will continue to challenge this sector into the foreseeable future. Technology is an essential player driving and supporting

More information

Dimensionalizing Big Data. WA State vs. peers. Building on strengths CONTENTS. McKinsey & Company 1

Dimensionalizing Big Data. WA State vs. peers. Building on strengths CONTENTS. McKinsey & Company 1 CONTENTS Building on strengths 1 Printed 2/26/2015 12:55 PM Pacific Standard Time WA State vs. peers Last Modified 3/2/2015 10:17 AM Pacific Standard Time Dimensionalizing Big Data Big Data: big and getting

More information

Preparing North Carolina Workforce for Star Quality Jobs

Preparing North Carolina Workforce for Star Quality Jobs NCWorks Career Pathways Conference Preparing North Carolina Workforce for Star Quality Jobs Meihui Bodane Labor & Economic Analysis Division North Carolina Department of Commerce nc Demand-Driven & Data-Informed

More information

Connecticut s Insurance Industry: Economic Impacts & Contributions

Connecticut s Insurance Industry: Economic Impacts & Contributions Connecticut s Insurance Industry: Economic Impacts & Contributions Prepared by: Connecticut Economic Resource Center, Inc. December 2006 2006 Insure Connecticut s Future, Connecticut Insurance and Financial

More information

Virginia s Cybersecurity Industry

Virginia s Cybersecurity Industry Cybersecurity Virginia IT companies, from startups to large systems integrators, are leaders in the development of cyber security solutions for industry and government. Currently 67,850 people work in

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Finding the middle: How businesses can manage the talent pipeline to close the middle-skills employment gap

Finding the middle: How businesses can manage the talent pipeline to close the middle-skills employment gap Finding the middle: How businesses can manage the talent pipeline to close the middle-skills employment gap By Ravi Chanmugam, David Smith and Laila Worrell Almost half of all job openings involve middleskills

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

June 15, 2015. Dear Administrator Gagliardi:

June 15, 2015. Dear Administrator Gagliardi: June 15, 2015 Adele Gagliardi Administrator Office of Policy Development and Research U.S. Department of Labor 200 Constitution Avenue, NW Room N 5641 Washington, DC 20210 Re: RIN 1205-AB74: Department

More information

Real-Time Data Analytics into Action

Real-Time Data Analytics into Action Real-Time Data Analytics into Action Centers of Excellence (COE) Lori Sanchez Director, Desert/Inland Empire Region Evgeniya Zhenya Lindstrom Director, San Diego-Imperial Region California Community College

More information

Attachment B. New York City LWIB Regional Plan PROGRAM YEAR 2013

Attachment B. New York City LWIB Regional Plan PROGRAM YEAR 2013 New York City LWIB Regional Plan PROGRAM YEAR 2013 Narrative 1. Describe the progress that has been made on the action steps you outlined in support of REDC strategic goals and priorities in your 2012

More information

How to Close the Manufacturing Skills Gap

How to Close the Manufacturing Skills Gap SHRM Foundation Executive Briefing Current Issues in HR Closing the Manufacturing Skills Gap Sponsored by Manpower The Skills Gap Defined Despite high levels of unemployment in the U.S., many employers

More information

IT and Cybersecurity. Workforce Development with CompTIA Certification

IT and Cybersecurity. Workforce Development with CompTIA Certification IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Integrated Risk Management. Balancing Risk and Budget

Integrated Risk Management. Balancing Risk and Budget Integrated Risk Management The Current Risk Landscape Organizations which depend upon information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems.

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

DEFENSE ACQUISITION WORKFORCE

DEFENSE ACQUISITION WORKFORCE United States Government Accountability Office Report to Congressional Committees December 2015 DEFENSE ACQUISITION WORKFORCE Actions Needed to Guide Planning Efforts and Improve Workforce Capability GAO-16-80

More information

Cisco Networking Academy: Delaware Profile

Cisco Networking Academy: Delaware Profile Cisco Networking Academy: Delaware Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with

More information

Developing Market-Relevant Curricula and Credentials: Employer Engagement for Community Colleges in Partnerships

Developing Market-Relevant Curricula and Credentials: Employer Engagement for Community Colleges in Partnerships For more information please contact: Holly Parker VP, Economic Opportunity hparker@skilledwork.org 734.769.2900 x219 Developing Market-Relevant Curricula and Credentials: Employer Engagement for Community

More information

GAO FEDERAL EMERGENCY MANAGEMENT AGENCY. Workforce Planning and Training Could Be Enhanced by Incorporating Strategic Management Principles

GAO FEDERAL EMERGENCY MANAGEMENT AGENCY. Workforce Planning and Training Could Be Enhanced by Incorporating Strategic Management Principles GAO United States Government Accountability Office Report to Congressional Requesters April 2012 FEDERAL EMERGENCY MANAGEMENT AGENCY Workforce Planning and Training Could Be Enhanced by Incorporating Strategic

More information

Jobs In Maine. Online Job Postings by Industry, Occupation, Skills, and Education

Jobs In Maine. Online Job Postings by Industry, Occupation, Skills, and Education Jobs In Maine Online Job Postings by Industry, Occupation, Skills, and Education third quarter 2013 December 2013 Online Job Postings by Industry, Occupation, Skills, and Education third quarter 2013

More information