Career Analysis into Cyber Security: New & Evolving Occupations

Size: px
Start display at page:

Download "Career Analysis into Cyber Security: New & Evolving Occupations"

Transcription

1 Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations

2 e-skills UK is the Sector Skills Council for Business and Information Technology; an employer led organisation rated as outstanding in the re-licensing of the Sector Skills Councils. e-skills UK s mission is to ensure the UK has the technology skills it needs to compete in the global economy, working on behalf of employers to develop the software, internet, computer gaming, IT services and business change expertise necessary to thrive. Focused on making the biggest contribution to enterprise, jobs and growth across the economy, e-skills UK s three strategic objectives are to: inspire future talent, support IT professionals, increase digital capability. Delivery on these strategic objectives is underpinned by employer engagement across the sector, authoritative research, a continually developing sector qualifications and learning strategy and effective strategic partnerships Reserved, e-skills UK All rights reserved. No part of this material protected by this copyright may be reproduced or utilised in any form, or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without prior authorisation and credit to e-skills UK. An e-skills UK publication, supported by Alderbridge Consulting Ltd. For further information please contact: e-skills UK 1 Castle Lane London SW1E 6DR Tel: Fax: info@e-skills.com Proprietor: e-skills UK Sector Skills Council Ltd Registered in England no The National Skills Academy for IT 1 Castle Lane London SW1E 6DR Tel: info@itskillsacademy.ac.uk The National Skills Academy for IT Registered in England no Registered office: Victoria House, 39 Winchester Street, Basingstoke, Hampshire RG21 7EQ The National Skills Academy for IT is wholly owned by e-skills UK Copyright e-skills UK Sector Skills Council Ltd

3 Contents Executive Summary... 1 Summary of Findings... 1 Introduction... 3 Scope... 3 Scope Limitations... 4 Section 1 Overview Pathways to Target Job Roles Non-Commercial roles Commercial roles Qualifications Demographic Profiles Section 2 Pathways to Target Job Roles Manager Consultant IT Security Consultant Account Manager Pathways to Other Roles Section 3 Qualifications and Degrees by Job Role Qualifications Degrees Section 4 Demographic Profiles by Job Role Location Age Distribution Gender Summary of Key Findings Summary of Section 1 Overview Summary of Section 2 Pathways to Target Job Roles Summary of Section 3 Qualifications and Degrees by Job Role Summary of Section 4 - Demographic Profiles by Job Role Copyright e-skills UK Sector Skills Council Ltd

4 Copyright e-skills UK Sector Skills Council Ltd

5 Executive Summa ry Executive Summary e-skills UK engaged Alderbridge Consulting Ltd, specialists in recruitment and consultancy, to undertake an analysis of their intelligence covering the current recruitment landscape within Cyber Security. This analysis contributed to the e-skills UK s Cyber Security Learning Pathways Programme. This report documents the output of this analysis and seeks to draw conclusions surrounding the demographic and academic profile of the UK Cyber Security sector, as well as highlighting potential educational and professional pathways to target job roles. The analysis, data and results are presented in this document within the following key reporting areas for Cyber Security in the UK: Age profiles Gender profiles Geographic profiles Job Title progressions Qualifications - learning & training pathways Pathways to target Job Title by Education, Qualifications & Experience Data is presented in tables, charts and graphical representations together with Alderbridge s summary analysis. Summary of Findings The most common pathway to non-commercial Cyber Security roles has been via other roles within IT. 46% of all professionals currently in non-commercial Cyber Security entered the profession in this way from their 3 rd previous role of their career history. As the overall body of professionals has grown, data collected over a period of 10 years suggests that now only 28% can enter the profession from a more general role in IT and 4% from a role outside of IT. Current non-commercial Cyber Security roles are being filled by seasoned and highly qualified professionals who are progressing within this relatively new profession. The most popular specialised routes within the profession are as an Consultant, IT Security Consultant and Manager. The two most common pathways into commercial/sales roles within Cyber Security are via non-it or general IT sales roles. 42% of professionals currently in Cyber Security sales began in more general IT roles and 21% started out in other industries. Overall, CISSP (Certified Information Systems Security Professional) is the most common professional certification, held by 54% of those in non-commercial roles. Around half of Cyber Security professionals have an undergraduate degree, with more of these being in non-commercial roles than commercial positions. The most common degree type is IT. The majority (over 6) of Cyber Security professionals across all job roles are located in the South East. The age profile across most roles was widespread, though for commercial roles it was slightly younger than for non-commercial roles. The gender profile was shown to be predominantly male across all job roles with a slightly higher proportion of females in the commercial roles compared to the other positions (19% compared to 1). Copyright e-skills UK Sector Skills Council Ltd

6 2 Copyright e-skills UK Sector Skills Council Ltd

7 Introduction Introduction On completion of Cyber Security recruitment data analysis conducted for e-skills UK, Alderbridge Consulting Ltd ( Alderbridge ) is pleased to present the findings in this report, which draws conclusions surrounding the demographic and academic profile of the UK Cyber Security sector, and to highlight potential educational and professional pathways to target job roles. Scope The scope of the work was to analyse Alderbridge s Cyber Security recruitment industry knowledge to produce data in three main areas:- Pathways to target job roles Professional qualifications Demographic information: o Geographic profiles o Age profiles o Gender profiles CYBER SECURITY ROLE Demographics Role History Qualifications Education Copyright e-skills UK Sector Skills Council Ltd

8 Demographics Education Qualifications Job History Age Location Gender Higher Education Information Qualifications - Current and Historic Job Title - Current Job Title - Historic Pathways to specific target jobs Cyber Security Role The analysis focused on the following 28 target job roles within Cyber Security:- Analyst Manager Consultant Officer IT Security Analyst IT Security Manager IT Security Consultant IT Security Officer Engineer Consultant Analyst Security Engineer Security Administrator CISO/Chief Officer/Head of Security Architect (variants of) Security Auditor PCI Consultant/QSA Consultants Computer/Digital Forensics Analyst/Investigator (variants of) Penetration Tester/Pen Tester Application Security Specialist (variants of) Sales Engineer Pre-sales Consultant Technical Account Manager Account Manager (with security) Business Development Manager (with security) Sales Executive (with security) Sales Manager (with security) Sales Director (with security) Scope Limitations The geographical scope of the analysis was across the whole of the UK. In order to present current information, only data produced from 1 st January 2007 onwards was used in all analysis except pathways to target job roles, for which data from 1 st January 2002 onwards was used when analysing previous roles. This amounted to 1750 data samples. Across these data samples, not all categories of data were available for analysis in some reports. 4 Copyright e-skills UK Sector Skills Council Ltd

9 Section 1 Overv iew Section 1 Overview 1.1 Pathways to Target Job Roles The target job roles can be categorised into two main areas: Non-commercial roles Analyst Manager Consultant Officer IT Security Analyst IT Security Manager IT Security Consultant IT Security Officer Engineer Consultant Analyst Security Engineer Security Administrator CISO/Chief Officer/Head of Security Architect (variants of) Security Auditor PCI Consultant/QSA Consultants Computer/Digital Forensics Analyst/Investigator (variants of) Penetration Tester/Pen Tester Application Security Specialist (variants of) Commercial (sales roles) Sales Engineer Pre-sales Consultant Technical Account Manager Account Manager (with security) Business Development Manager (with security) Sales Executive (with security) Sales Manager (with security) Sales Director (with security) The pathways to roles were determined by analysing the job history of Cyber Security Professionals whose current job titles are in the above list. The last three roles prior to the current role were noted to build up a picture of the most common pathways to roles within Cyber Security. Two additional occupations and Non-IT were also added to account for roles outside of the Cyber Security industry. The next section discusses the aggregated pathways across all roles within the noncommercial and commercial categories. Copyright e-skills UK Sector Skills Council Ltd

10 1.2 Non-Commercial Roles As can be seen from Figure 1, 46% of all professionals currently in non-commercial Cyber Security entered the profession in their 3 rd previous role from other general roles in IT. This figure reduces to 39% across all 2 nd previous roles. Figure 1 Aggregated pathways across all Non-Commercial roles 3rd Previous Role 2nd Previous Role 1st Previous Role 46% 39% 28% Consultant 7% Consultant 9% Consultant 13% IT Security Consultant IT Security Consultant IT Security Consultant 6% 5% 7% Manager 5% Manager 3% Manager 6% IT Security Analyst IT Security Analyst IT Security Analyst 4% 6% 5% Non-IT Non-IT Non-IT 9% 8% 4% Security Architect Security Architect Security Architect (variants of: 3% (variants of: 4% (variants of: 4% Security Engineer Security Engineer Security Engineer 3% 3% 4% Analyst 3% Analyst 2% Analyst 4% Engineer 2% Engineer 2% Engineer 3% IT Security Manager IT Security Manager IT Security Manager 2% 3% 3% Penetration Tester/Pen Penetration Tester/Pen Penetration Tester/Pen Tester 1% Tester 1% Tester 3% Officer 1% Officer 2% Officer 3% Consultant 1% Consultant 1% Consultant 2% Computer/Digital Computer/Digital Computer/Digital Forensics 1% Forensics 1% Forensics 2% Security Administrator Security Administrator Security Administrator 1% 3% 2% CISO/Head of CISO/Head of CISO/Head of 1% 1% 2% Analyst 1% Analyst 2% Analyst 2% Security Auditor Security Auditor Security Auditor 1% 2% 1% PCI Consultant (variants PCI Consultant (variants PCI Consultant (variants of)/qsa Consultants 1% of)/qsa Consultants 1% of)/qsa Consultants 1% IT Security Officer IT Security Officer IT Security Officer 1% 1% Application / Systems Application / Systems Application / Systems Security Specialist 1% Security Specialist 1% Security Specialist 01 January August 2012 As the overall body of professionals has grown, this data illustrates that now only 28% can enter the profession from a more general role in IT and 4% from a role outside of IT. Current non-commercial Cyber Security roles are being filled by experienced professionals who are progressing and moving roles within the profession. 6 Copyright e-skills UK Sector Skills Council Ltd

11 Figure 2 Chart illustrating the split of the top three categories of roles that lead to a non-commercial role in Cyber Security, displayed in 3 rd previous, 2 nd previous and 1 st previous (most recent) position 45% 53% 68% Specialist within Cyber Security 9% 8% Non-IT 46% 39% 4% 28% 3rd Previous Role 2nd Previous Role 1st Previous Role The most popular specialised routes are as an Consultant, IT Security Consultant and Manager. The pathways to these roles are explained in more detail in section 2 of this report. Copyright e-skills UK Sector Skills Council Ltd

12 1.3 Commercial Roles The two most common pathways into commercial/sales roles within Cyber Security are via non-it or general IT sales roles. 42% of professionals currently in Cyber Security Sales began in more general IT roles and 21% started out in other industries. Many commercial Cyber Security professionals progress through Account Management into their current roles. The pathway to an Account Manager role is discussed further in Section 2. A relatively small number of professionals progress to commercial roles via technical routes such as Security Engineer and IT Security Consultant. Figure 3 Aggregated pathways across all Commercial roles Non-IT 3rd Previous Role 2nd Previous Role 1st Previous Role 42% 21% Account Manager (with security) 11% Sales Executive (with security) 7% Sales Manager (with security) 5% Business Development 5% Sales Director (with security) 2% Sales Engineer Security Engineer 2% 2% Pre-sales Consultant 1% Technical Account Manager 1% IT Security Consultant 1% Security Architect (variants of) Non-IT 38% 18% Account Manager (with security) 13% Sales Executive (with security) 5% Sales Manager (with security) 6% Business Development 6% Sales Director (with security) 3% Sales Engineer Security Engineer 1% 2% Pre-sales Consultant 3% Technical Account Manager 2% IT Security Consultant 2% Security Architect (variants of) 1% Non-IT 32% 12% Account Manager (with security) 16% Sales Executive (with security) 7% Sales Manager (with security) 7% Business Development 8% Sales Director (with security) 5% Sales Engineer Security Engineer 1% 3% Pre-sales Consultant 6% Technical Account Manager 2% IT Security Consultant 1% Security Architect (variants of) 01 January August Copyright e-skills UK Sector Skills Council Ltd

13 Figure 4 - Chart illustrating the split of the categories of roles that lead to a Commercial role in Cyber Security, displayed as 3 rd previous, 2 nd previous and 1 st previous (most recent) position 37% 21% 44% 18% 56% Within Cyber Security 12% Non-IT 42% 38% 32% 3rd Previous Role 2nd Previous Role 1st Previous Role 1.4 Qualifications Two categories of qualifications were analysed - professional qualifications and degree types. The list of professional qualifications is shown below and mostly relate to the Cyber Security industry specifically. The CCNA certification is a more general IT qualification and is included to complement the above data on pathways. This illustrates that general IT is a common pathway into a Cyber Security role. The MSc is a specialist post-graduate academic qualification for Cyber Security professionals. The MBA (Masters of Business Administration) may be of more relevance to those in commercial roles. The table below shows the percentage of professionals who have gained particular professional qualifications (NC = non-commercial roles, Com = commercial roles). Copyright e-skills UK Sector Skills Council Ltd

14 Table 1 Overall qualification data with top 10 highlighted for non-commercial roles Qualification All NC Com MSc Infosec 5% 9% MBA 4% 4% 5% CISSP 34% 54% 5% CISA 9% 15% 1% CISM 9% 15% QSA 4% 6% 1% CLAS 4% 6% 1% GIAC 3% 5% CEH 9% 14% 1% CREST 1% 2% 1% CHECK 1% 2% Tiger 1% LPT 1% CCNA 21% 31% 6% ISO LA 4% 7% CompTIA Security+ 3% 4% 1% It is interesting to note that 54% of non-commercial Cyber Security professionals hold a CISSP certification. The CISSP is a general certification covering a broad range of topics and it is widely accepted as the leading specialist cyber security qualification. The charts below highlight some other areas of interest within this data. 10 Copyright e-skills UK Sector Skills Council Ltd

15 MSc Infosec MBA CISSP CISA CISM QSA CLAS GIAC CEH CREST CHECK Tiger LPT CCNA ISO LA CompTIA Security+ MSc Infosec MBA CISSP CISA CISM QSA CLAS GIAC CEH CREST CHECK Tiger LPT CCNA ISO LA CompTIA Security+ Figure 5 Overall qualifications 35% 3 25% 2 15% 1 5% Figure 6 Qualifications breakdown in commercial and non-commercial roles Com NC Copyright e-skills UK Sector Skills Council Ltd

16 The table below illustrates the percentage of professionals who have an undergraduate degree and the type of degree: IT (including computing and computer science), Technical (including physics, mathematics and engineering) and Other (such as law, geography, social sciences etc). Almost 5 of Cyber Security professionals possess a degree and a higher proportion of noncommercial professionals have a degree compared to those in commercial roles. Perhaps unsurprisingly, the most common degree type overall and in non-commercial roles is IT, however many have entered the Cyber Security profession having studied other disciplines. Table 2 Degree types overall and by job type IT Technical Other No Degree Overall 22% 11% 15% 52% NC 29% 14% 11% 46% Com 11% 7% 21% 61% Figure 7 Comparison of degree types in commercial and non-commercial job roles % Com NC % 46% 29% 7% 21% 14% 11% IT Technical Other No Degree 12 Copyright e-skills UK Sector Skills Council Ltd

17 1.5 Demographic Profiles Demographic information was taken from a sample of the entire data. Three types of information were analysed Region (Geographical), Age and Gender, in order to produce a demographic profile of the Cyber Security profession in general and per specific job role. The following table displays the overall demographic information for the sample as a whole. These figures are broken down by job role in Section 4. Table 3 Demographic profile overall for non-commercial and commercial roles Region NW NE SW SE Mids Scot Wales N. Ire Non-Commercial 6% 8% 7% 59% 14% 2% 3% 1% Commercial 7% 11% 6% 66% 8% 1% 1% Age No Data Non-Commercial 7% 31% 21% 8% 33% Commercial 7% 34% 25% 12% 22% Gender M F No data Non-Commercial 86% 1 4% Commercial 8 19% 1% Copyright e-skills UK Sector Skills Council Ltd

18 Figure 8 Chart highlighting the geographical profile of cyber security professionals (for non-commercial roles) N. Ire Wales Scot Mids SE SW NE NW Figure 9 Chart displaying the age distribution across Cyber Security professionals (for non-commercial roles where age information was available) 35% 3 25% 2 31% 15% 21% 1 5% 7% 8% Copyright e-skills UK Sector Skills Council Ltd

19 Figure 10 Pie chart displaying the gender profile of Cyber Security professionals (for non-commercial roles) M 86% F 1 No data 4% Copyright e-skills UK Sector Skills Council Ltd

20 16 Copyright e-skills UK Sector Skills Council Ltd

21 Section 2 Pa thways to Ta rget Job Role s Section 2 Pathways to Target Job Roles As discussed in section 1.1, the most common pathways to a target non-commercial cyber security role are via a general IT route and a specialised route. The top three specialised route pathways are via roles as an Manager, Consultant or IT Security Consultant. The specific pathways to these three roles are discussed in more detail below. 2.1 Manager Figure 11 Chart displaying job history leading to a role as an Manager 3rd Previous 2nd Previous 1st Previous 8% 15% 26% Manager Manager Manager 49% 44% 24% Information Security Manager 7% 14% 22% Consultant Consultant Consultant 4% 4% 6% Analyst Analyst Analyst 3% 5% 6% Officer Officer Officer Non-IT 11% Non-IT 6% Non-IT 5% IT Security Analyst 3% IT Security Analyst IT Security Analyst 2% IT Security Consultant 5% IT Security Consultant 1% IT Security Consultant 2% IT Security Manager 5% IT Security Manager 3% IT Security Manager 1% IT Security Specialist IT Security Specialist IT Security Specialist 1% 3% 1% Consultant Consultant Consultant Security Administrator Security Administrator Security Administrator 1% Security Architect Security Architect 1% Security Architect 1% (variants of: (variants of: (variants of: Security Auditor Security Auditor 1% Security Auditor 1% Security Engineer 1% Security Engineer 1% Security Engineer 1% Application Security Application Security 4% Application Security Specialist Specialist Specialist IT Security Officer 1% IT Security Officer 1% IT Security Officer Engineer Engineer Engineer Copyright e-skills UK Sector Skills Council Ltd

22 Figure 12 Chart showing the top three roles at each stage on the path to a role as an Information Security Manager 8% 15% 26% Manager 49% 44% 24% 7% 14% 22% Consultant 3rd Previous Role 2nd Previous Role 1st Previous Role These figures illustrate that many Managers begin in other IT roles (49% in their 3 rd previous role and 44% in their 2 rd previous role). These percentages are greater than all aggregated non-commercial Cyber Security roles, demonstrating that general management skills are more in demand than specialised technical skills. Figure 13 Illustrates the most common roles that lead to a role as an Manager Manager Consultant Manager 18 Copyright e-skills UK Sector Skills Council Ltd

23 2.2 Consultant Figure 14 - Chart displaying job history leading to a role as an Consultant 3rd Previous Role 2nd Previous Role 1st Previous Role Consultant 24% Consultant 24% Consultant 41% 38% 3 18% Manager 7% Manager 1 Manager 11% IT Security Consultant 7% IT Security Consultant 5% IT Security Consultant 4% Analyst 3% Analyst 2% Analyst 4% Security Engineer 4% Security Engineer 7% Security Engineer 3% IT Security Analyst 3% IT Security Analyst 4% IT Security Analyst 3% Non-IT 3% Non-IT 5% Non-IT 3% Officer 1% Officer 5% Officer 3% IT Security Manager 1% IT Security Manager 2% IT Security Manager 3% Penetration Tester/Pen Tester 1% Penetration Tester/Pen Tester Penetration Tester/Pen Tester 2% Security Administrator Security Administrator 2% Security Administrator 2% Consultant 3% Consultant Consultant 1% Pre-sales Consultant 1% Pre-sales Consultant Pre-sales Consultant 1% Computer/Digital Forensics Computer/Digital Forensics 1% Computer/Digital Forensics 1% Security Auditor 1% Security Auditor 2% Security Auditor Security Architect (variants of) Security Architect (variants of) 1% Security Architect (variants of) Analyst 3% Analyst Analyst Information Security Consultant Copyright e-skills UK Sector Skills Council Ltd

24 Figure 15 - Chart showing the top three roles at each stage on the path to a role as an Information Security Consultant 7% 1 11% 24% 24% 41% Manager Consultant 38% 3 18% 3rd Previous Role 2nd Previous Role 1st Previous Role These figures show that many Cyber Security professionals remained as Consultants throughout the last 10 years of their career. Those who moved into the profession initially came through a general IT route or from an Manager role. It is interesting to note that the ability to move into this role from other IT roles has considerably reduced in recent years, more so than all aggregated non-commercial Cyber Security roles. Figure 16 Illustrating the most common roles that lead to a role as an Consultant Consultant Manager Consultant 20 Copyright e-skills UK Sector Skills Council Ltd

25 2.3 IT Security Consultant Figure 17 - Chart displaying job history leading to a role as an IT Security Consultant 3rd Previous Role 2nd Previous Role 1st Previous Role 44% 29% 9% Non-IT Non-IT Non-IT 16% 1 7% IT Security Analyst IT Security Analyst IT Security Analyst 12% 8% 7% IT Security Consultant 8% IT Security Consultant 14% IT Security Consultant 17% Consultant 8% Consultant 5% Consultant 4% Security Engineer 4% Security Engineer 5% Security Engineer 11% Consultant 4% Consultant 3% Consultant 9% Penetration Tester/Pen Tester 4% Penetration Tester/Pen Tester Penetration Tester/Pen Tester 7% Security Administrator Security Administrator 5% Security Administrator 2% IT Security Manager IT Security Manager 3% IT Security Manager 9% IT Security Officer IT Security Officer 3% IT Security Officer 4% Analyst Analyst 3% Analyst 2% Engineer Engineer 3% Engineer 2% Analyst Analyst 3% Analyst Pre-sales Consultant Pre-sales Consultant 3% Pre-sales Consultant Account Manager (with security) Account Manager (with security) 3% Account Manager (with security) Manager Manager Manager 4% Security Architect (variants of) Security Architect (variants of) Security Architect (variants of) 2% Security Auditor Security Auditor Security Auditor 2% PCI Consultant (variants of)/qsa PCI Consultant (variants of)/qsa PCI Consultant (variants of)/qsa 2% IT Security Consultant Copyright e-skills UK Sector Skills Council Ltd

26 Figure 18 - Chart showing the top four roles at each stage on the path to a role as an IT Security Consultant 8% 12% 16% 14% 8% 1 17% 7% IT Security Consultant IT Security Analyst 44% 29% 7% 9% Non-IT 3rd Previous Role 2nd Previous Role 1st Previous Role The most common path to a role as IT Security Consultant is through general IT roles or through other industries. Another common path is via a role as an IT Security Analyst. Figure 19 Chart showing the main three roles that lead to the position of IT Security Consultant Non-IT IT Security Analyst IT SECURITY CONSULTANT 22 Copyright e-skills UK Sector Skills Council Ltd

27 2.4 Account Manager Section 1 discussed the general pathways to commercial/sales roles within Cyber Security. The most common routes were through other industries, general IT and via a role as an Account Manager. Many of those who came up through other industries or general IT were in sales roles. Relatively few have come from non-commercial security roles. The pathways into a role as an Account Manager in Cyber Security are explained further below. Figure 20 Chart displaying job history leading to a role as an Account Manager within Cyber Security 3rd Previous 2nd Previous 1st Previous 45% 43% 37% Non-IT Non-IT Non-IT 31% 24% 16% Account Manager (with security) 8% Account Manager (with security) 15% Account Manager (with security) 24% Sales Executive (with security) 8% Sales Executive (with security) 7% Sales Executive (with security) 11% Business Development 2% Business Development 5% Business Development 7% Sales Manager (with security) 2% Sales Manager (with security) 4% Sales Manager (with security) 2% Security Engineer 1% Security Engineer Security Engineer Technical Account Manager 1% Technical Account Manager 1% Technical Account Manager 1% Analyst 1% Analyst Analyst Sales Engineer 1% Sales Engineer Sales Engineer Pre-sales Consultant Pre-sales Consultant 1% Pre-sales Consultant 2% Account Manager The figures suggest that the predominant route into an Account Manager role within Cyber Security is via roles. The general IT roles that Account Managers come from tend to be within sales, as did the non-it roles. Within Cyber Security, many progressed into the Account Manager role from the same role or from a Sales Executive position. Copyright e-skills UK Sector Skills Council Ltd

28 Figure 21 Displaying the most common four roles in the job history of Cyber Security Account Managers 5 45% 4 35% 3 25% 2 15% 1 Non-IT Account Manager (with security) Sales Executive (with security) 5% 3rd Previous 2nd Previous 1st Previous This figure illustrates that there has been an increased demand from the Cyber Security industry in recent times to hire more specialised Cyber Security experienced Account Managers. Figure 22 Displaying the most popular roles at each stage in the pathway to an Account Manager position in Cyber Security 3rd Previous Non-IT Account Manager Sales Executive 2nd Previous Non-IT Account Manager Sales Executive 1st Previous Account Manager Non-IT Sales Executive 24 Copyright e-skills UK Sector Skills Council Ltd

29 2.5 Pathways to Other Roles The charts below show the top three roles at each stage in the path towards 23 other roles. Figure 23 - Non-Commercial Roles 3rd Previous Role 2nd Previous Role 1st Previous role Current Role Non-IT Non-IT Analyst Analyst Analyst Analyst Consultant Manager Officer Manager Officer IT Security Analyst Consultant Analyst Non-IT Non-IT IT Security Analyst IT Security Analyst IT Security Analyst IT Security Analyst IT Security Consultant IT Security Manager Security Architect IT Security Analyst IT Security Officer Non-IT Non-IT IT Security Manager IT Security Manager IT Security Analyst IT Security Manager IT Security Manager IT Security Consultant IT Security Analyst IT Security Analyst Analyst Engineer Analyst Engineer IT Security Analyst Consultant Consultant Consultant Consultant Consultant IT Security Consultant IT Security Analyst Engineer Engineer Engineer Engineer Engineer Security Engineer IT Security Analyst Analyst Non-IT IT Security Analyst Security Engineer Security Engineer Security Engineer Engineer IT Security Consultant Non-IT Security Administrator Security Administrator Security Administrator Security Administrator Non-IT IT Security Analyst Security Architect Security Architect Security Architect q Consultant Security Architect IT Security Consultant IT Security Consultant IT Security Consultant Security Auditor Security Auditor Security Auditor Manager Security Auditor Analyst Analyst IT Security Officer PCI Consultant Manager PCI DSS Consultant PCI DSS Consultant/ QSA IT Security Consultant IT Security Consultant Manager Computer Forensics Specialist Computer Forensics Specialist Computer Forensics Specialist Non-IT Computer Forensics Specialist Non-IT Non-IT Other Penetration Tester Penetration Tester Penetration Tester Computer Forensics Specialist IT Security Analyst Consultant Application/ System Security Security Administrator Consultant Consultant Application/ System Security Application/ System Security IT Security Analyst IT Security Consultant Copyright e-skills UK Sector Skills Council Ltd

30 Figure 24 - Commercial Roles 3rd Previous Role 2nd Previous Role 1st Previous role Current Role Sales Engineer Sales Engineer Sales Engineer Sales Engineer Non-IT Technical Account Manager Pre-Sales Consultant Other Pre-Sales Consultant Sales Engineer Pre-Sales Consultant Pre-Sales Consultant Account Manager IT Security Consultant Security Engineer IT Security Consultant IT Security Consultant IT Security Consultant Technical Account Manager Security Engineer Security Engineer Security Engineer Non-IT Non-IT Non-IT Account Manager Business Development Manager Account Manager Non-IT Non-IT Sales Executive Sales Executive Account Manager Account Manager Non-IT Account Manager Account Manager Sales Manager Sales Manager Non-IT Non-IT Account Manager Sales Director Sales Manager Sales Manager Sales Director Sales Director Sales Director Sales Manager Business Development Manager This section of the report has illustrated that there are many routes and pathways into jobs within Cyber Security. Generally, many professionals come through general IT and even other industries to join the Cyber Security profession. 26 Copyright e-skills UK Sector Skills Council Ltd

31 Section 3 Qualifica tions and Deg rees by Job Role Section 3 Qualifications and Degrees by Job Role 3.1 Qualifications Table 4 Table showing professional qualifications per job role Role Analyst Manager Consultant Officer IT Security Analyst IT Security Manager IT Security Consultant IT Security Officer Engineer Consultant Analyst Security Engineer Security Administrator CISO Security Architect Security Auditor QSA Consultants Computer Forensics Investigator Penetration Tester/Pen Tester Application Security Specialist Sales Engineer Pre-sales Consultant Technical Account Manager Account Manager Business Development Manager Sales Executive Sales Manager Sales Director Qualifications MSc Infosec MBA CISSP CISA CISM QSA CLAS GIAC CEH CREST CHECK Tiger LPT CCNA ISO27001 Lead Auditor Comp TIA Security+ 12% 4% 48% 19% 12% 1% 1% 7% 1 25% 6% 1 11% 7% 64% 19% 33% 4% 5% 5% 7% 1% 1% 17% 13% 5% 14% 7% 62% 24% 18% 1 7% 5% 13% 3% 1% 26% 17% 5% 11% 3% 55% 24% 31% 5% 3% 3% 9% 1% 23% 8% 3% 11% 2% 42% 17% 6% 4% 4% 17% 4% 2% 3 6% 12% 2% 73% 16% 35% 4% 4% 8% 35% 8% 4% 73% 24% 16% 1 6% 12% 35% 2% 2% 4% 35% 4% 4% 8% 5 4% 17% 4% 8% 8% 17% 8% 3% 15% 3% 3% 13% 5% 74% 8% 13% 4 7% 27% 7% 7% 67% 7% 6% 44% 6% 6% 11% 6% 72% 6% 6% 5% 56% 6% 4% 2% 2% 6% 2 1% 2% 7 2% 4% 4% 18% 4% 2% 2% 4% 4% 24% 4% 6% 17% 89% 33% 22% 11% 22% 11% 6% 17% 17% 6% 7% 5% 74% 1 12% 6% 22% 4% 15% 2% 1% 21% 1 4% 71% 86% 7% 7% 7% 36% 36% 14% 7% 1 41% 15% 2 46% 5% 5% 2% 17% 7% 14% 23% 9% 14% 3% 3% 3% 3% 14% 3% 1 3% 5 3% 3% 3% 3% 1 43% 18% 33% 3% 5% 33% 3% 5% 5 5% 14% 5% 14% 9% 9% 5% 18% 5% 2% 18% 2% 2% 2% 4% 24% 4% 2% 16% 2% 2% 2% 2 25% 3% 3% 3% 9% 6% 13% 3% 6% 4% 2% 1% 3% 1 1% 4% 1% 1% 1% 4% 5% 2% 2% 4% 5% 1% 1% 1% 1% 1% 3% 2% 11% 2% 2% Copyright e-skills UK Sector Skills Council Ltd

32 The above table highlights qualifications in order of popularity for each job role. CISSP is, as discussed in Section 1, the most common qualification overall and for most of the non-commercial roles. CCNA is also prevalent, more so in highly technical roles such as Security Engineer. Often, particular qualifications are more common in one role, such as CEH for Penetration Testers and Security Analysts. This is due to the fact that certain qualifications are focused towards a particular set of specialised skills that are required only in certain positions. Of the two post-graduate qualifications analysed, the MBA is most popular throughout the more commercial roles towards the bottom of the table. The MSc is more popular in non-commercial roles. It is worthy of note that, recently, CESG (Communications Electronics Security Group the National Technical Authority for Information Assurance) has produced a certification scheme for professionals working in HMG Information Assurance. As these certifications are relatively new they have not been included in this analysis. However the more generalised CLAS credential is included. Figure 25 Chart highlighting the distribution of CISSP certified professionals across all non-commercial job roles Copyright e-skills UK Sector Skills Council Ltd

33 Figure 26 Chart comparing qualifications of four Cyber Security roles: Manager, Consultant and their IT security equivalents Manager IT Security Manager Consultant IT Security Consultant Copyright e-skills UK Sector Skills Council Ltd

34 3.2 Degrees Table 5 Table of degree types across all job roles Role IT Technical Other No Degree Analyst 32% 14% 19% 35% Manager 19% 16% 12% 53% Consultant 28% 17% 9% 46% Officer 36% 14% 12% 38% IT Security Analyst 21% 13% 11% 55% IT Security Manager 2 16% 1 54% IT Security Consultant 33% 16% 12% 39% IT Security Officer 17% 25% 4% 54% Engineer 31% 26% 3% 4 Consultant 33% 27% 4 Analyst 17% 22% 17% 44% Security Engineer 44% 9% 9% 38% Security Administrator 29% 7% 11% 53% CISO/Head of 45% 11% 44% Security Architect (variants of) 23% 14% 1 53% Security Auditor 43% 7% 5 PCI Consultant (variants of)/qsa Consultants 17% 15% 12% 56% Forensics Analyst/Investigator (variants of) 4 11% 2 29% Penetration Tester/Pen Tester 44% 5% 8% 43% Application Security Specialist (variants of) 45% 5% 18% 32% Sales Engineer 25% 8% 1 57% Pre-sales Consultant 22% 27% 12% 39% Technical Account Manager 22% 16% 62% Account Manager (with security) 9% 4% 24% 63% Business Development Manager (with security) 7% 1 15% 68% Sales Executive (with security) 16% 4% 25% 55% Sales Manager (with security) 8% 7% 26% 59% Sales Director (with security) 4% 5% 23% 68% Total 22% 11% 15% 52% In total across all roles, almost 5 of Cyber Security professionals have an undergraduate degree. In some cases, a higher proportion of those in more junior roles have a degree compared to their more senior counterparts, for example 65% of Analysts have a degree compared to 47% of Managers. Some sectors of the Cyber Security industry equally value professionals with senior military backgrounds and experience who may not be degree educated. This reflects the emphasis for managers with organisational, process and communication skills. Another consideration in these figures is that that those entering the profession more recently tend to be graduates. Some of the more specialised roles, such as Forensics Analyst and Application Security Specialist require more specific knowledge and skills that often can only be acquired via degree studies, which may explain why a higher proportion of professionals in roles such as these have a degree. 30 Copyright e-skills UK Sector Skills Council Ltd

35 Perhaps unsurprisingly, of those who have a degree, the most common category is IT. However, these figures show that many professionals enter the industry having studied other disciplines. Graduates with a degree in a non-it and non-technical subject tend to have more commercial roles that require less specific knowledge. Figure 27 Pie chart showing split of degree types across all roles IT 22% No Degree 52% Technical 11% Other 15% Figure 28 Displaying the degree categories of the four roles with the highest proportion of graduates 5 4 Analyst 3 Officer 2 1 Forensics Analyst/Investigator (variants of) IT Technical Other No Degree Application Security Specialist (variants of) Copyright e-skills UK Sector Skills Council Ltd

Tech Industry Gold Degree Apprenticeship

Tech Industry Gold Degree Apprenticeship Tech Industry Gold Degree Apprenticeship in Digital & Technology Solutions Overview This document provides an overview of the Tech Industry Gold Degree Apprenticeship in Digital & Technology Solutions

More information

Tech specialists working in London were earning the most, with reported median earnings of 43,600pa i.e. 19% above the overall UK figure.

Tech specialists working in London were earning the most, with reported median earnings of 43,600pa i.e. 19% above the overall UK figure. Introduction This data sheet provides an analysis of earnings data for tech specialists drawing upon published and bespoke data provided by the Office for National Statistics (ONS) Annual Survey of Hours

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

Employer Insights: skills survey 2015

Employer Insights: skills survey 2015 Employer Insights: skills survey 2015 The Tech Partnership is a growing network of employers, collaborating to create the skills for the digital economy. Its leadership includes the CEOs of major companies

More information

Make up of a Modern Day Coach. Skills, Experience & Motivations

Make up of a Modern Day Coach. Skills, Experience & Motivations Make up of a Modern Day Coach Skills, Experience & Motivations Introducing the research... As the world s largest training organisation for coaches, the coaching academy has developed a reputation for

More information

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Scotland s Class of 99: the early career paths of graduates who studied in Scottish higher education institutions. Summary report

Scotland s Class of 99: the early career paths of graduates who studied in Scottish higher education institutions. Summary report Scotland s Class of 99: the early career paths of graduates who studied in Scottish higher education institutions Summary report Scotland s Class of 99: the early career paths of graduates who studied

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

IBM Hosted Application Scanning

IBM Hosted Application Scanning IBM Hosted Application Scanning Service Definition IBM Hosted Application Scanning 1 1. Summary 1.1 Service Description IBM Hosted Application Security Services Production Application Scanning Service

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Pathways to Digital Employment

Pathways to Digital Employment Pathways to Digital Employment Course Outlines Network design, installation and operation Computer networks are critical to the successful running of businesses of all sizes by enabling file, hardware

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

The Recruitment Market in 2014

The Recruitment Market in 2014 Corporate Governance Recruitment Market Report 2014 Security BARCLAY SIMPSON MARKET REPORT 2014 SECURITY CONTENTS Welcome to Barclay Simpson s 2014 Security Market Report Barclay Simpson has been producing

More information

Higher Apprenticeship in Information Security - Level 4 (England)

Higher Apprenticeship in Information Security - Level 4 (England) Higher Apprenticeship in Information Security - Level 4 (England) IMPORTANT NOTIFICATION FOR ALL APPRENTICESHIP STARTS FROM 6 APRIL 2015 Modifications to SASE came into effect on 6th April 2015. These

More information

Report on District Nurse Education in England, Wales and Northern Ireland 2012/13

Report on District Nurse Education in England, Wales and Northern Ireland 2012/13 Report on District Nurse Education in England, Wales and Northern Ireland 2012/13 Introduction The QNI has become concerned at recent reports of a fall in the number of District Nurses currently in training

More information

RAPTER Rapid Automated Pen TestER for web applications (Lot 4)

RAPTER Rapid Automated Pen TestER for web applications (Lot 4) RAPTER Rapid Automated Pen TestER for web applications (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. OUR

More information

The AGR Graduate Recruitment Survey 2015

The AGR Graduate Recruitment Survey 2015 The AGR Graduate Recruitment Survey 2015 Winter Review Produced for AGR by The AGR Graduate Recruitment Survey 2015 Winter Review Association of Graduate Recruiters 6 Bath Place Rivington Street London

More information

Women in Cyber Security

Women in Cyber Security Women in Cyber Security Report July 2013 Roundtable report Women s Security Society Email: info@womenssecuritysociety.com www.womenssecuritysociety.co.uk The views expressed in this paper are the author

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

IT Division....working in partnership

IT Division....working in partnership IT Division...working in partnership 96% of customers say that they would recommend Acorn to others the Acorn Group The Acorn Group is one of the leading recruitment and training specialists in the UK.

More information

Technology. Computing. and. School of

Technology. Computing. and. School of School of Computing and Technology We offer employment-focused education and research in computing, the built environment and engineering, which gives our students industry-relevant skills and knowledge.

More information

HP Cyber Security Control Cyber Insight & Defence

HP Cyber Security Control Cyber Insight & Defence HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost

More information

Cyber Security Skills. Business perspectives and Government s next steps

Cyber Security Skills. Business perspectives and Government s next steps Cyber Security Skills Business perspectives and Government s next steps March 2014 Contents Foreword... 3 Executive Summary... 4 Chapter 1: Introduction... 8 Chapter 2: Key Findings... 11 Chapter 3: NCSP

More information

THE WOMEN IN IT SCORECARD. A definitive up to date evidence base for data and commentary on women in IT employment and education

THE WOMEN IN IT SCORECARD. A definitive up to date evidence base for data and commentary on women in IT employment and education THE WOMEN IN IT SCORECARD A definitive up to date evidence base for data and commentary on women in IT employment and education 2014 Foreword 1.0 Background 2.0 Key messages 2.1 Workforce representation

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Creative Industries: Focus on Employment. June 2014

Creative Industries: Focus on Employment. June 2014 : Focus on Employment June 2014 27/06/2014 : Focus on Employment These estimates are Official Statistics and have been produced to the standards set out in the Code of Practice for Official Statistics

More information

A survey of public attitudes towards conveyancing services, conducted on behalf of:

A survey of public attitudes towards conveyancing services, conducted on behalf of: A survey of public attitudes towards conveyancing services, conducted on behalf of: February 2009 CONTENTS Methodology 4 Executive summary 6 Part 1: your experience 8 Q1 Have you used a solicitor for conveyancing

More information

2014 Salary Guide & Survey. Sponsored By

2014 Salary Guide & Survey. Sponsored By 2014 Salary Guide & Survey Sponsored By Introduction Welcome to the 2014 Creativepool Salary Guide In partnership with our sponsors; Moo (our favorite printers) Little Black Book Agency and Cogs Agency

More information

HARNHAM DATA & ANALYTICS SALARY GUIDE 2013 The definitive source of salary information for the UK Data & Analytics market

HARNHAM DATA & ANALYTICS SALARY GUIDE 2013 The definitive source of salary information for the UK Data & Analytics market HARNHAM DATA & ANALYTICS SALARY GUIDE 2013 The definitive source of salary information for the UK Data & Analytics market HARNHAM SALARY GUIDE 2013 - PAGE 2 SEEKING ROLES THIS YEAR SALARY GUIDE INTRODUCTION

More information

International Students' Attitudes to Postgraduate Study in Australia and New Zealand Survey 2013

International Students' Attitudes to Postgraduate Study in Australia and New Zealand Survey 2013 International Students' Attitudes to Postgraduate Study in Australia and New Zealand Survey 2013 Introduction Working with StudyOptions, our survey aimed to find out potential postgraduate students' attitudes

More information

Does Your Degree Define Your Career?

Does Your Degree Define Your Career? Does Your Degree Define Your Career? Coverage: UK Date: 15 April 2013 Geographical Area: Region Theme: Labour Market Theme: Children, Education and Skills Key points Some undergraduate degrees lead to

More information

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

February 2015 Issue No: 5.2. CESG Certification for IA Professionals February 2015 Issue No: 5.2 CESG Certification for IA Professionals Issue No: 5.2 February 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or

More information

PAPER 1 THE SCHOOL COUNSELLING WORKFORCE IN NSW GOVERNMENT SCHOOLS

PAPER 1 THE SCHOOL COUNSELLING WORKFORCE IN NSW GOVERNMENT SCHOOLS PAPER 1 THE SCHOOL COUNSELLING WORKFORCE IN NSW GOVERNMENT SCHOOLS Introduction This paper describes the current school counselling service within the Department of Education and Communities (the Department)

More information

Questions and answers relating to Restricted tender procedure EMA/2012/19/IS Provision of Security Consultancy Services

Questions and answers relating to Restricted tender procedure EMA/2012/19/IS Provision of Security Consultancy Services 30 October 2012 EMA/702274/2012 Questions and answers relating to Restricted tender procedure EMA/2012/19/IS Provision of Security Consultancy Services Table of contents Questions and answers... 2 Document

More information

CESG Certified Professional

CESG Certified Professional CESG Certified Professional Verify your skills and competence in information assurance Now open to cyber security professionals working in UK industry CONTENTS 1. Introduction 2. IA in Context: Why Professionalism

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

excel MSc Financial Management Fast-track routes Bristol Business School

excel MSc Financial Management Fast-track routes Bristol Business School excel MSc Financial Management Fast-track routes Bristol Business School A choice of specialist fast-track routes MSc Financial Management fast-track A supportive and well resourced learning environment

More information

NUS/HSBC Student Experience Report: Finance and Debt

NUS/HSBC Student Experience Report: Finance and Debt NUS/HSBC Student Experience Report: Finance and Debt Funded and conducted in association with: Research conducted by: NUS/ HSBC Students Research September 2010 Date 5 Aug 2010 Contact: Jacob Barker GfK

More information

http://www.careeroverview.com/computer-sciencecareers.html Computer Science and Technology Careers and Job Highlights

http://www.careeroverview.com/computer-sciencecareers.html Computer Science and Technology Careers and Job Highlights http://www.careeroverview.com/computer-sciencecareers.html Computer Science and Technology Careers and Job Highlights * General job pre-requisites are a two-year computer science degree upwards to a graduate

More information

The value of Transnational Education to the UK

The value of Transnational Education to the UK BIS RESEARCH PAPER NUMBER 194 The value of Transnational Education to the UK NOVEMBER 2014 Prepared by the Careers Research & Advisory Centre (CRAC) Ltd About CRAC The Careers Research & Advisory Centre

More information

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016 Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard

More information

School of Computing and Technology

School of Computing and Technology School of Computing and Technology We offer employmentfocused education and research in computing, the built environment and engineering, giving our students industry-relevant skills and knowledge. Applied

More information

Masters with a purpose Taught postgraduate employability and employer engagement. Summary report

Masters with a purpose Taught postgraduate employability and employer engagement. Summary report Masters with a purpose Taught postgraduate employability and employer engagement Summary report Postgraduate employers 1 1 Contents INTRODUCTION 2 MAIN FINDINGS 3 1. POSTGRADUATE EMPLOYERS 4 What do employers

More information

e-competence in Italy Analysing Gaps and Mismatches for a Stronger ICT Profession

e-competence in Italy Analysing Gaps and Mismatches for a Stronger ICT Profession e-competence in Analysing Gaps and Mismatches for a Stronger ICT Profession About the Grand Coalition for Digital Jobs The an Commission is leading a multi-stakeholder partnership to tackle the lack of

More information

Institute of Leadership & Management. Creating a coaching culture

Institute of Leadership & Management. Creating a coaching culture Institute of Leadership & Management Creating a coaching culture Contents Introduction 01 Executive summary 02 Research findings 03 Conclusion 07 Methodology 08 Introduction The world of work is complex

More information

Faculty of Environment Institute for Transport Studies. University Academic Fellow Big Data and Transport Modelling

Faculty of Environment Institute for Transport Studies. University Academic Fellow Big Data and Transport Modelling Faculty of Environment Institute for Transport Studies University Academic Fellow Big Data and Transport Modelling With a vision and drive to develop a prestigious internationally competitive research

More information

What do Birmingham postgraduates do?

What do Birmingham postgraduates do? 1 What do Birmingham postgraduates do? College of and Physical Sciences What do Birmingham postgraduates do? School of Computer Science First destinations of postgraduates Analysis of first employment

More information

Public and Private Sector Earnings - March 2014

Public and Private Sector Earnings - March 2014 Public and Private Sector Earnings - March 2014 Coverage: UK Date: 10 March 2014 Geographical Area: Region Theme: Labour Market Theme: Government Key Points Average pay levels vary between the public and

More information

The interdisciplinary nature of the skills needed by project managers

The interdisciplinary nature of the skills needed by project managers Journal of Applied Computing and Information Technology ISSN 2230-4398, Volume 16, Issue 1, 2011-12 Incorporating the NACCQ publications: Bulletin of Applied Computing and Information Technology, ISSN

More information

Management Information

Management Information Management Information Initial Teacher Training Performance Profiles: academic year 2012 to 2013 Date 23 October 2014 Coverage England Theme Initial Teacher Training Issued by Department for Education,

More information

What Do Masters Graduates Do? 2007

What Do Masters Graduates Do? 2007 What Do Masters Graduates Do? 2007 Overview The Higher Education Careers Service Unit (HECSU) produces an annual web-based resource, looking at postgraduate destinations, What Do Postgraduates Do? The

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

HUDSON SALARY GUIDES 2015

HUDSON SALARY GUIDES 2015 UK HUDSON SALARY GUIDES 2015 ABOUT THIS PUBLICATION This Salary Guide is a compilation of salary and market information provided by Hudson consultants, clients, candidates and other sources across UK.

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

Cyber Security and Data Privacy Acumin Specialist Cloud Services

Cyber Security and Data Privacy Acumin Specialist Cloud Services Cyber Security and Data Privacy Acumin Specialist Cloud Services Cloud Security Resourcing Information Assurance and Cyber Security Governance, Risk and Compliance Traditional Security and Business Continuity

More information

2011 Project Management Salary Survey

2011 Project Management Salary Survey ASPE RESOURCE SERIES 2011 Project Management Salary Survey The skills we teach drive real project success. Table of Contents Introduction... 2 Gender... 2 Region... 3 Regions within the United States...

More information

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT Issue 1.0 Date 24/03/2011 Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration

More information

Level 3 Advanced Diploma for IT Professionals (7266-25 and 7266-29 - FL3E)

Level 3 Advanced Diploma for IT Professionals (7266-25 and 7266-29 - FL3E) Level 3 Advanced Diploma for IT Professionals (7266-25 and 7266-29 - FL3E) Qualification handbook 500/1724/X 500/3314/1 www.cityandguilds.com July 2009 Version 2.0 About City & Guilds City & Guilds is

More information

The Claude Littner Business School

The Claude Littner Business School The Claude Littner Business School A connected education: Close links with professional business bodies. The Claude Littner Business School is based in the heart of west London, at the centre of a highly

More information

Minority Degree Attainment in IT: What the National Data Show

Minority Degree Attainment in IT: What the National Data Show Minority Degree Attainment in IT: What the National Data Show Presented to League for Innovation Innovations Conference Session on Degrees Matter: Minority Attainment in Occupational Education March 17,

More information

Cyber Security skills: Business perspectives and Government s next steps. Supporting Evidence

Cyber Security skills: Business perspectives and Government s next steps. Supporting Evidence Cyber Security skills: Business perspectives and Government s next steps Supporting Evidence 1 Contents Purpose of this Document... 3 Workshops... 4 Chapter 1: Questionnaire Outputs... 5 Chapter 2: Workshop

More information

The International Institute for Business Analysis

The International Institute for Business Analysis The International Institute for Business Analysis IIBA UK Chapter Skills and Career Paths Business Analysis Conference London September 2010 Visit our chapter website at http://uk.theiiba.org Your Starting

More information

UNIVERSITY OF LINCOLN JOB DESCRIPTION. JOB NUMBER CSS016 GRADE 8 DATE May 2015 CONTEXT

UNIVERSITY OF LINCOLN JOB DESCRIPTION. JOB NUMBER CSS016 GRADE 8 DATE May 2015 CONTEXT UNIVERSITY OF LINCOLN JOB DESCRIPTION JOB TITLE DEPARTMENT LOCATION Senior Lecturer in Accountancy Lincoln Business School Brayford JOB NUMBER CSS016 GRADE 8 DATE May 2015 REPORTS TO Deputy Head of School

More information

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning SCP.05.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

The CII insurance salary and workplace survey 2014/15

The CII insurance salary and workplace survey 2014/15 The CII insurance salary and workplace survey 2014/15 Sponsored by IPS Group Conducted by DJS Research Ltd Salaries, bonuses, benefits and general work and life styles of insurance professionals in the

More information

Social work education in England 2009-2014

Social work education in England 2009-2014 Social work education in England 2009-2014 A report for the Department of Health (DH) March 2015 Produced by Skills for Care for the Department of Health Contents Introduction 3 1. Enrolments 4 Interim

More information

Pathways to Success in Engineering Degrees and Careers

Pathways to Success in Engineering Degrees and Careers Pathways to Success in Engineering Degrees and Careers A project for the Royal Academy of Engineering Tim Bullough School of Engineering, University of Liverpool and Diane Taktak EMERG, School of Engineering,

More information

Lecturer or Senior Lecturer in Cyber Security EHT0938-0515

Lecturer or Senior Lecturer in Cyber Security EHT0938-0515 It is important to note that this job description is a guide to the work you will initially be required to undertake. It may be changed from time to time to meet changing circumstances. It does not form

More information

MSc Forensic Information Technology

MSc Forensic Information Technology MSc Forensic Information Technology Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

IPL Service Definition - Data Governance

IPL Service Definition - Data Governance IPL Proposal Project: Date: 6th October 2015 Issue Number: Issue 1 Customer: Crown Commercial Service Page 1 of 8 Copyright notice This document has been prepared by IPL Information Processing Limited

More information

Fundratios 2010 Charity Fundraising Comparison

Fundratios 2010 Charity Fundraising Comparison Fundratios 2010 Charity Fundraising Comparison 1. Introduction and Overview Fundratios is designed to help all charities, both large and small, to fundraise more effectively by producing a comprehensive

More information

North East Salary Survey 2015. What are you worth?

North East Salary Survey 2015. What are you worth? North East Salary Survey 215 What are you worth? Introduction Welcome to the 215 edition of the Nigel Wright Recruitment North East Salary Survey. As a company that is at the core of recruitment in the

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

REVISED GRID FOR MICRO LEVEL APPROACH

REVISED GRID FOR MICRO LEVEL APPROACH Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer

More information

Clinical Academic Career Pathway for Nursing

Clinical Academic Career Pathway for Nursing Clinical Academic Career Pathway for Nursing Clinical Academic Role Descriptors: Research The clinical academic pathway outlined below highlights the range of typical -focused activities that a nurse on

More information

Spillemyndigheden s Certification Programme Instructions on Penetration Testing

Spillemyndigheden s Certification Programme Instructions on Penetration Testing SCP.04.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 4 2.1 Certification frequency... 4 2.1.1 Initial certification...

More information

Abuse of Vulnerable Adults in England. 2011-12, Final Report, Experimental Statistics

Abuse of Vulnerable Adults in England. 2011-12, Final Report, Experimental Statistics Abuse of Vulnerable Adults in England 2011-12, Final Report, Experimental Statistics Published: 6 March 2013 We are England s national source of health and social care information www.ic.nhs.uk enquiries@ic.nhs.uk

More information

Exploring the UK Freelance Workforce in 2015

Exploring the UK Freelance Workforce in 2015 Exploring the UK Freelance Workforce in 2015 Executive Summary John Kitching April 2016 Introduction Freelance workers are an important, but hidden, part of the small business population. United Kingdom

More information

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings Introduction to Real-Time Labor Market Information Real time labor market information is derived from online job postings. Details included in online job postings can provide information such as the type

More information

Cleveland College of Art and Design

Cleveland College of Art and Design Cleveland College of Art and Design Inspection report Provider reference 130571 Published date July 2009 Audience Post-sixteen Published date July 2009 Provider reference 130571 Inspection report: Cleveland

More information

Statistical First Release

Statistical First Release Statistical First Release Initial teacher training census for the academic year 2014 to 2015 Reference SFR 48/2014 Date 27 November 2014 Coverage England Theme Children, Education and Skills Issued by

More information

Chart 2: Types of activity currently outsourced. Main Findings

Chart 2: Types of activity currently outsourced. Main Findings Outsourcing Survey Main Findings Most UK organisations outsource some of their activities (%) and many believe that outsourcing has simply become an established way of working (39%). Organisations are

More information

TECHNOLOGY EMPLOYMENT SPOTLIGHT: NASHVILLE. Developed for the Nashville Technology Council. Brought to you by:

TECHNOLOGY EMPLOYMENT SPOTLIGHT: NASHVILLE. Developed for the Nashville Technology Council. Brought to you by: TECHNOLOGY EMPLOYMENT SPOTLIGHT: NASHVILLE Developed for the Technology Council Brought to you by: Technology Council Copyright 215 TECHNOLOGY EMPLOYMENT SPOTLIGHT: NASHVILLE AREA MESSAGE FROM THE PRESIDENT

More information

CBEST FAQ February 2015

CBEST FAQ February 2015 CBEST Frequently Asked Questions: February 2015 At this time, the UK Financial Authorities have only made CBEST available to firms and FMIs which they consider to be core to the UK financial system. Those

More information

Foundation Degrees in Computer Games Development Computer Technology Computing

Foundation Degrees in Computer Games Development Computer Technology Computing Foundation Degrees in Computer Games Development Computer Technology Computing Choose Computing... 21 million people in the UK use IT every day. It is almost impossible to imagine what our day-to-day lives

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

How To Get A Degree In Accounting At Bournemouth University

How To Get A Degree In Accounting At Bournemouth University Webinar content Bournemouth University overview Accounting, Finance & Economics Department Our course portfolio Work placements Our research Bournemouth University International College Entry requirements

More information

Insurance Broking Employee Benefits Actuarial Consulting

Insurance Broking Employee Benefits Actuarial Consulting Insurance Broking Employee Benefits Actuarial Consulting Contents Introduction to Aon 1 Insurance, Reinsurance and Risk Management 2 Actuarial Consulting General Insurance 5 Investment Consulting Pensions

More information