Cybersecurity Industry Brief

Size: px
Start display at page:

Download "Cybersecurity Industry Brief"

Transcription

1 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief

2 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery County Investment Board e mission of the Montgomery Workforce Investment Board (WIB) is to help businesses succeed through workforce services. e WIB is a public-private partnership that assists the County in connecting business with job seekers. e WIB oversees MontgomeryWorks and provides liaison to the County Executive and Council. e 30-member board is appointed by the County Executive in accordance with the Workforce Investment Act (WIA) of 1998 and Montgomery County Executive Order No e members are specified in law and by an executive order are largely business owners, community based organizations, educational institutions, labor unions, and others. MontgomeryWorks served over 12,000 adult and youth residents in FY12. Montgomery- Works provides core services, intensive counseling services and occupational skills training to both businesses and individuals. Business services include: Assistance in recruitment including specialized recruitments, job fairs and access to local candidates through unlimited job postings using the Maryland Workforce Exchange Interview and recruitment event space Local labor market information and research Active jobb openings in a searchable statewide database Assistance in identifying trainers and expert speakers e WIB s Strategic Plan calls for aligning all service delivery to industry needs. e Workforce Investment Board has selected three industry sectors, of which Cybersecurity is one, in support of the Strategic Plan. e industries were selected based on the following criteria: Industries that were either high growth and high demand or high wage. Examined initial industry sectors for alignment with Economic Development targets. Examined policy implications for vendor selection process; for diversity of occupations. Details are available at the MontgomeryWorks website

3 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 2 Cybersecurity Industry Brief Key Findings Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. It is a branch of computer technology known as information security as applied to computers and networks. Cybersecurity is a county and state priority. ere are close to 38,000 cybersecurty jobs in Montgomery County. Cybersecurity sub-sector makes up 5.87% of total employment in Montgomery County. For comparison, in Maryland the percentage of cybersecurity jobs in the state economy is 3.9%; in Howard County, 6.8%; and in Frederick County, 3.7%. ere are over 70 employers, some of which are the largest employers in the county, with operations related to cybersecurity. Cybersecurity sub-sector has outperformed the overall economy in terms of historic job growth over the past five years. Seven out of eleven occupations in the subsector have grown at 1%-12% rate. Location Quotients, which describe the concentration of jobs in a particular industry or occupation relative to the national average, for all occupations in the sub-sector are above the national average. Projected employment growth over the next ten years is positive for all, but two occupations. In 2012 there were approximately 1200 openings in the sub-sector from entry level jobs that require an associate s to high level jobs requiring bachelors s and above. e median hourly earnings for employees in the Cybersecurity sub-sector is $41, while the overall median hourly earnings are $26. What is Cyber Security Industry? Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. It is a branch of computer technology known as information security as applied to computers and networks. Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include: Application security - encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system vulnerabilities through flaws in the design, development, deployment, upgrade, or maintenance of the application. Information security - (sometimes shortened to InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc.) Network security - provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Disaster recovery / business continuity planning - Disaster recovery (DR) is the process, policies and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster.[1] Disaster recovery is a subset of business continuity.[2] While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions End-user education - e integrity of company's critical resources and confidential data can be significantly affected by end-users. Educating them about the signs of malware and phishing attacks can increase overall security and make employees a vital part of a successful defense strategy. County Priority e National Institute of Standards and Technology (NIST) located in Gaithersburg announced a new partnership to establish the National Cybersecurity Center of Excellence, a public-private collaboration for accelerating the widespread Page 2

4 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 3 adoption of integrated cybersecurity tools and technologies. e State of Maryland and Montgomery County, Md., are co-sponsoring the center with NIST, which will work to strengthen U.S. economic growth by supporting automated and trustworthy e-government and e-commerce. NIST s fiscal year 2012 appropriations provided $10 million to establish the public-private partnership to operate the center. It will provide a state-of-the-art computing facility near NIST s Gaithersburg, Md., campus, where researchers from NIST will work collaboratively with both the users and vendors of cybersecurity products and services. e center will host multi-institutional, collaborative efforts that build on expertise from industry and government. Federal and State Activity Maryland has a critical mass of federal agencies and information technology companies that place it as a national epicenter of federal cybersecurity activities. Federal cybersecurity facilities include NSA, Defense Information Systems Agency (DISA), Intelligence Advanced Research Projects Activity, the National Institute of Standards and Technology, and 12 major military installations (including Fort Meade in Anne Arundel County which is home to the U.S. Cyber Command). e State of Maryland has been very active in cybersecurity including a cybersecurity summit in Current Employment in Major Industry Sectors Cybersecurity is part of the Professional, Scientific, and Technical Services sector. Overall number of jobs in the Professional, Scientific, and Technical Services sector is over 98,000. Cybersecurity related jobs constitute estimated 40% of the sector. Distribution of Employment by Industry Sector e Pathways to Cybersecurity Careers Consortium received a $4.9 million grant over three years from the U.S. Department of Labor to increase the pipeline of skilled cybersecurity professionals with appropriate industry certifications. Consortium members include workforce agencies, community colleges, businesses, industry experts, government agencies, educational institutions, and community organizations. Figure 1. Source: EMSI Complete Employment. Page 3

5 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 4 Employment in Cybersecurity Sub-Sector Cyber security specialists may be described as workers who protect the data and systems in networks that are connected to the Internet. Main occupational categories for cyber security specialists are: Computer Programmers Computer Support Specialists Computer and Information Scientists Computer Software Engineers Computer Systems Analysts Database Administrators Network and Computer Systems Administrators Network Systems and Data Analysts. Overview Jobs (2013) % Change ( ) Median Earnings 38, % $41.06/hr County Location Quotient: 2.23 Nation: 3.8% Nation: $35.89/hr Maryland Location Quotient: 1.51 Maryland: 7.9% Maryland: $38.83/hr Occupation Details SOC Description 2007 Jobs 2012 Jobs Change % Change Location Quotient 2013 Annual Openings Median Hourly Earnings Avg. Hourly Earnings Computer and Information Systems Managers 2,615 2, % $62.95 $ Management Analysts 11,310 12, % $37.41 $38.62 Computer and Information Research Scientists % $55.16 $52.19 Education Level or higher, plus work experience or higher, plus work experience Doctoral Computer Programmers 2,542 2,316 (226) (9%) $37.39 $ Software Developers, Applications 4,057 4, % $45.18 $ Software Developers, Systems Software 3,648 3, % $44.88 $ Database Administrators % $44.31 $ Network and Computer Systems Administrators 2,553 2,500 (53) (2%) $40.44 $ Computer Support Specialists 4,368 4,349 (19) 0% $28.14 $30.22 Associate's Information Security Analysts, Web Developers, and Computer Network Architects 3,392 3, % $40.40 $40.90 Computer Hardware Engineers 1, (20) (2%) $49.22 $49.68 Total 37,087 38, % 1,171 $41.06 $42.22 Source: EMSI EMSI's proprietary employment data, combined with occupation-specific percentages from the U.S. Bureau of Labor Statistics Employment Projections program. Page 4

6 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 5 Distribution of Employment by Occupation Montgomery County, Source: EMSI EMSI's proprietary employment data, combined with occupation-specific percentages from the U.S. Bureau of Labor Statistics Employment Projections program. Here Annual Openings is an estimated employment change and turnover for an occupation for a given year. is is EMSI's estimate of labor market demand for an occupation, and when combined with Related Completions (see Table 6) gives a picture of the supply and demand of the occupation in the region. e majority of openings (948) require Bachelor s or higher, plus work experience, 55 openings require Doctoral and 23 openings require Associate s. Page 5

7 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 6 Company Name Employers Employment 2012 NAICS NAICS Lockheed Martin-Information Systems & Global Services (IS&GS) International Business Machines (IBM) Research and Developmetn in the Physical, Engineering, and Life Sceinces (except Biotechnology) Computer and Computer Peripheral Equipment and Software Merchant Wholesalers Booz Allen Hamilton, Inc Administrative Management and General Management Consulting Services Terrapin Systems, Inc Administrative Management and General Management Consulting Services Research and Development in the Physical, Engineering, BAE Systems Support Solutions 400 and Life Sciences (except Biotechnology) URS Corporation Engineering Services Energy Enterprise Solutions LLC Computer Systems Design Services Opnet Technologies, Inc Custom Computer Programming Services EMC Corporation-Rockville Computer Systems Design Services DRS Signal Solutions Inc Other Communications Equipment Manufacturing Client Network Services Inc Computer Systems Design Services Hewlett Packard 200 Computer and Computer Peripheral Equipment and Software Merchant Wholesalers Digital Management, Inc Computer Systems Design Services Dataprise Inc Computer Systems Design Services ViaSat Administrative Management and General Management Consulting Services Infozen, Inc Computer Systems Design Services Comtech Mobile Datacom Corporation Custom Computer Programming Services Infozen, Inc Computer Systems Design Services Catapult Technology, Ltd Computer Systems Design Services Abacus Technologies Corporation Computer Systems Design Services 3eTi Technologies Wireless Telecommunications Carriers (except Satel- FCN Technology Solutions 60 Not available Page 6

8 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 7 Employers Company Name Communications Supply Corporation Employment 2012 NAICS NAICS Wireless Telecommunications Carriers (except Satellite) Digital Infuzion, Inc Custom Computer Programming Services TISTA Science and Technology Corporation Computer Systems Design Services Attronica Computers, Inc Computer and Computer Peripheral Equipment and Software Merchant Corporate Network Services, Inc Computer Systems Design Services DRS Defense Solutions Headquarters Other Communications Equipment Manufacturing Fidelis Security Systems, Inc Software Publishers GMV Space Systems, Inc Other Scientific and Technical Consulting Services JackBe Corporation Custom Computer Programming Services Systalex Corporation Computer Systems Design Services Ipx International Systems, Inc. 30 Not available Not available KoolSpan 20 Computer and Computer Peripheral Equipment and Software Merchant Sonatype, Inc. 10 Not available Caelum Research Corporation Custom Computer Programming Services Fedstore Corporation 10 Computer and Computer Peripheral Equipment and Software Merchant SafeNet 10 Not available VariQ Other Computer Related Services Alion Science and Technologly Corp Other Computer Related Services Arxan Technologies Other Computer Related Services Banyan Technology Solutions, In Computer Systems Design Services Advanced Digital Forensic Software Publishers Federal IT Consultants (FEDITC) Computer Systems Design Services Longview International Technology Solutions, Inc. 1 Not available Page 7

9 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 8 Employers Company Name Employment 2012 NAICS NAICS LORE Systems Wired Telecommunications Carriers Aster Engineering, Inc Computer Systems Design Services Triumfant, Inc. 1 Not available Westerly Enterprises Onmicrosoft Computer Systems Design Services Montgomery County Growth Projected Employment Growth 2012 Jobs 38, Jobs 39,767 Change ( ) 1,708 % Change ( ) 4.5% Jobs (2013) 31,851 National Location Quotient: 2.23 % Change ( ) 4.5 Nation: 7.9% Median Earnings $41.06/hr. Nation: $35.89/hr. Page 8

10 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 9 Occupation 2012 Jobs 2015 Jobs Change % Change Computer and Information Systems 2,649 2, % Managers ( ) Management Analysts ( ) 12,030 13,337 1,307 11% Computer and Information Research % Scientists ( ) Computer Programmers ( ) 2,316 2, % Software Developers, Applications ( ) 4,155 4, % Software Developers, Systems Software (15-3,906 4, % 1133) Database Administrators ( % 1141) Network and Computer Systems Administrators 2,500 2, % ( ) Computer Support Specialists ( ) 4,349 4, % Information Security Analysts, Web Developers, and 3,416 3, % Computer Network Architects ( ) Computer Hardware Engineers ( ) % Page 9

11 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 10 Educational programs Four institutions in Montgomery County offer programs for occupations in cybersecurity CIP Code Institution Title Award Level American Career Institute- Wheaton System, Networking, and LAN/WAN Management/Manager 2011 Completions Award of less than 1 academic year DeVry University-Maryland Computer Systems Networking and Telecommunications Masters 1 Management Information Systems, General Masters Montgomery College Computer and Information Sciences, General Associates 33 Computer Programming/Programmer, General Web Page, Digital/Multimedia and Information Resources Design Award of at least 1 but less than 2 academic years 11 Award of at least 1 but less than 2 academic years 2 Web Page, Digital/Multimedia and Information Resources Design Associates 15 Computer Systems Networking and Telecommunications Computer and Information Systems Security/Information Award of at least 1 but less than 2 academic years Assurance Associates 6 Washington Adventist Information University Science/Studies Bachelors Computer Science Bachelors 3 Source: EMSI Workforce Module. ere are 51 institutions in Maryland, 13 institutions in the District of Columbia and 17 institutions of higher education in Northern Virginia that offer cybersecurity related training programs. Page 10

12 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:50 AM Page 11

BHEF s National Higher Education and Workforce Initiative

BHEF s National Higher Education and Workforce Initiative BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member

More information

Welcome to the NCCoE

Welcome to the NCCoE 1 Welcome to the NCCoE Utilities Telecom Council February 2013! NCCoE! Strategic Plan! Foundations! Partnership! Goals! Business Model! 1! Strategic Plan! Welcome February 2013!!"#$%&'($)*#+*,-.$/0$ 1#/2,3$4.$5"0/3,00$

More information

Virginia s Cybersecurity Industry

Virginia s Cybersecurity Industry Cybersecurity Virginia IT companies, from startups to large systems integrators, are leaders in the development of cyber security solutions for industry and government. Currently 67,850 people work in

More information

Computer Science. Education Report CIP 11.0701. 11,078 9.0% $33.92/hr

Computer Science. Education Report CIP 11.0701. 11,078 9.0% $33.92/hr Science Science Education Report CIP 11.71 Cochise, Pima, SC CIP 21: A program that focuses on computer theory, computing problems and solut, and the design of computer systems and user interfaces from

More information

Program Overview. Computer Programming in Los Angeles County, CA. EMSI Q2 2015 Data Set. October 2015

Program Overview. Computer Programming in Los Angeles County, CA. EMSI Q2 2015 Data Set. October 2015 Program Overview Computer Programming in Los Angeles County, CA EMSI Q2 2015 Data Set October 2015 1900 Pico Blvd. Santa Monica, California 90405 310.434.4040 EMSI Q2 2015 Data Set www.economicmodeling.com

More information

Computer Science. Occupation Report CIP 11.0701

Computer Science. Occupation Report CIP 11.0701 Computer Science Computer Science Occupation Report CIP 11.0701 Cochise, Pima, SC CIP 2010: A program that focuses on computer theory, computing problems and solutions, and the design of computer systems

More information

Program Overview Information Technology in Los Angeles County, CA

Program Overview Information Technology in Los Angeles County, CA Labor Market Information Program Overview Information Technology in Los Angeles County, CA Computer Information Systems TOP Code: 0702.00 CIP Code: 11.0103 1900 Pico Blvd. Santa Monica, California 90405

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Cedar Valley Region Labor Market Profile for Information Technology

Cedar Valley Region Labor Market Profile for Information Technology Cedar Valley Labor Market Profile for Information Technology May 2014 A Skills Ready Report from Cedar Valley al Partnership 10 West Fourth Street, Suite 310 Waterloo, IA 50701 319-232-1156 877-773-9959

More information

Computer Programming Occupation Report CIP 11.0201

Computer Programming Occupation Report CIP 11.0201 Computer Programming Occupation Report CIP 11.0201 Computer Programming/Programmer, General CIP 2010: A program that focuses on the general writing and implementation of generic and customized programs

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Broward County. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics

Broward County. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics L a b o r M a r k e t I n d u s t r y P r o f i l e Broward County Information Technology Industry 2015 Edition Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics Florida

More information

Information Technology Labor Market Profile for the Cedar Valley Region A Skills Ready Report from

Information Technology Labor Market Profile for the Cedar Valley Region A Skills Ready Report from Information Technology Labor Market Profile for the A Skills Ready Report from P.O. Box 65751 West Des Moines, Iowa 50265 515.224.2033 info@smartsolutionsgroup.net - Information Technology Labor Market

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

National Business Park: Economic Development Case Study. Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661

National Business Park: Economic Development Case Study. Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661 National Business Park: Economic Development Case Study Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661 May 18 th, 2015 Background and History As the United States

More information

Cybersecurity Occupation Report CIP 11.1003

Cybersecurity Occupation Report CIP 11.1003 Cybersecurity Occupation Report CIP 11.1003 Pima, SC Computer and Information Systems Security/Information Assurance CIP 2010: A program that prepares individuals to assess the security needs of computer

More information

INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY

INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY The work of the Talent Pipeline Task Force was inspired by our community s existing assets in the areas of education and workforce. Members

More information

Web Developer Education Report CIP 11.1004. 1,020 14.9% $30.37/hr

Web Developer Education Report CIP 11.1004. 1,020 14.9% $30.37/hr Web Developer Education Report CIP 11.14 Cochise, Pima, SC Web/Multimedia Management and Webmaster CIP 21: A program that prepares individuals to develop and maintain web servers and the hosted web pages

More information

Computer Programming Education Report CIP 11.0201. 9,333 9.7% $31.75/hr

Computer Programming Education Report CIP 11.0201. 9,333 9.7% $31.75/hr Programming Education Report CIP 11.21 Cochise, Santa Cruz, Pima Programming/Programmer, CIP 21: A program that focuses on the general writing and implementation of generic and customized programs to drive

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

Cisco and Linux Networking/Network Technology Occupation Report

Cisco and Linux Networking/Network Technology Occupation Report Cisco and Linux Networking/Network Technology Occupation Report CIP 11.0901 Pima, Computer Systems Networking and Telecommunications CIP 2010: A program that focuses on the design, implementation, and

More information

Computer Information Systems Education Report CIP 11.0401. 3,929 6.8% $42.50/hr

Computer Information Systems Education Report CIP 11.0401. 3,929 6.8% $42.50/hr Information Science/Studies Information Systems Education Report CIP 11.41 Cochise, Santa Cruz, Pima CIP 21: A program that focuses on the theory, organization, and process of information collection, transmission,

More information

How To Defend Yourself Against Cyber Attacks

How To Defend Yourself Against Cyber Attacks Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,

More information

Cyber Security Solutions Integrated. Proactive. Resilient.

Cyber Security Solutions Integrated. Proactive. Resilient. Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions

More information

Core Challenges in the Market for Cybersecurity Jobs

Core Challenges in the Market for Cybersecurity Jobs December 2, 2014 Core Challenges in the Market for Cybersecurity Jobs BHEF National Cybersecurity Workforce Summit Matt Sigelman, CEO Burning Glass Technologies Matching People & Jobs Reemployment & Education

More information

CYBER SECURITY WORKFORCE

CYBER SECURITY WORKFORCE Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

University of Maryland University College 2013 Spring Job Fair & Career Expo

University of Maryland University College 2013 Spring Job Fair & Career Expo Aflac University of Maryland University College Address: 152 Rollins Avenue Suite 210 Rockville, Maryland 20852 Website: www.aflac.com Position(s): Sales and Marketing Associate, Human Resources and Corporate

More information

Cybersecurity Education Report CIP 11.1003. 5,261 10.6% $25.05/hr

Cybersecurity Education Report CIP 11.1003. 5,261 10.6% $25.05/hr Cybersecurity Education Report CIP 11.13 Cochise, Pima, SC CIP 21: A program that prepares individuals to assess the security needs of computer and network systems, recommend safeguard solut, and manage

More information

Linux System Administrator Education Report CIP 11.1001. 6,085 10.2% $28.61/hr

Linux System Administrator Education Report CIP 11.1001. 6,085 10.2% $28.61/hr Linux System Administrator Education Report CIP 11.11 Cochise, Pima, SC CIP 21: A program that prepares individuals to manage the computer operat and control the system configurat emanating from a specific

More information

Program Overview Computer Systems Networking and Telecommunications in Los Angeles County, CA

Program Overview Computer Systems Networking and Telecommunications in Los Angeles County, CA Labor Market Information Program Overview Computer Systems Networking and Telecommunications in Los Angeles County, CA Computer Networking TOP Code: 0708.10 CIP Code: 11.0901 1900 Pico Blvd. Santa Monica,

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Computer Information Systems Occupation Report CIP 11.0401

Computer Information Systems Occupation Report CIP 11.0401 Information Science/Studies Computer Information Systems Occupation Report CIP 11.0401 Santa Cruz, Pima CIP 2010: A program that focuses on the theory, organization, and process of information collection,

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

Top 20 Occupations, Defense & Security Sector, Metro Denver

Top 20 Occupations, Defense & Security Sector, Metro Denver Top 20 Occupations, Defense & Security Sector, Metro Denver Applicants 10th 25th 75th 90th SOC 2012 Available Annual Median Average Description per Job Percentile Percentile Percentile Percentile Jobs

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Oklahoma Department of Career and Technology Education

Oklahoma Department of Career and Technology Education Oklahoma Department of Career and Technology Education Innovative Programs, Research and Development May 2013 Meridian Technology Center Information Technology Career Cluster Report Economic Modeling Specialists,

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Linux System Administrator Occupation Report CIP 11.1001

Linux System Administrator Occupation Report CIP 11.1001 Linux System Administrator Occupation Report CIP 11.1001 Pima, Network and System Administration/Administrator CIP 2010: A program that prepares individuals to manage the computer operations and control

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

University of Central Florida Class Specification Administrative and Professional. IT ERP Business Analyst Senior

University of Central Florida Class Specification Administrative and Professional. IT ERP Business Analyst Senior IT ERP Business Analyst Senior Job Code: 2563 Effective Date: 02/20/09 Serve as functional technical lead for modifications and upgrades to multiple enterprise modules. Provide technical guidance and oversight

More information

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Section 1A Overview RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Hiring Process Overview. This instruction establishes procedures for filling cyber security workforce

More information

Sources of Occupational Employment Statistics

Sources of Occupational Employment Statistics Western Technical College 400 Seventh Street La Crosse, Wisconsin 54601 608.785.9200 IT-Network Systems Administration Program Occupation Report June 2014 Western Technical College District Economic Modeling

More information

How To Become A Cybersecurity Consultant

How To Become A Cybersecurity Consultant Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

State of IT Skills Gap

State of IT Skills Gap State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:

More information

#HOCOGOESCYBER: A STUDY ON CYBERSECURITY COMPANIES IN HOWARD COUNTY, MARYLAND

#HOCOGOESCYBER: A STUDY ON CYBERSECURITY COMPANIES IN HOWARD COUNTY, MARYLAND ABSTRACT #HOCOGOESCYBER: A STUDY ON CYBERSECURITY COMPANIES IN HOWARD COUNTY, MARYLAND The geographic location of a cybersecurity company may play an important role in its success. The objective of this

More information

Information and Communications Technology

Information and Communications Technology workforce & economic DEVELOPMENT SANTA MONICA COLLEGE > Supply and Demand for ICT Occupations Information and Communications Technology SANTA MONICA COLLEGE 2014 Contents 1 Executive Summary 2 Introduction

More information

Careers in Management Information Systems

Careers in Management Information Systems Careers in Management Information Systems In today s high-tech and globally competitive world, effective information systems management plays an important role in business success. However, a critical

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

Redesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC

Redesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC Redesigning Data System Technology Curricula in the Big Data World IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC Presentation Outline Challenges Phase

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Walden University s Guide for Information Systems and

Walden University s Guide for Information Systems and Walden University s Guide for Information Systems and Technology Careers Discover Career Opportunities in the Growing Fields of Information Systems and Information Technology Rapid advances in technology

More information

SUMMARY MEETING NOTES July 31, 2013

SUMMARY MEETING NOTES July 31, 2013 SUMMARY MEETING NOTES July 31, 2013 To the Montgomery County Cybersecurity Industry Alliance and The Montgomery County Workforce Investment Board Program Planning Committee Facilitated and Prepared by:

More information

Web Developer Occupation Report CIP 11.1004

Web Developer Occupation Report CIP 11.1004 Web Developer Occupation Report CIP 11.1004 Cochise, Pima, SC Web/Multimedia Management and Webmaster CIP 2010: A program that prepares individuals to develop and maintain web servers and the hosted web

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

THE EVOLUTION OF CYBERSECURITY

THE EVOLUTION OF CYBERSECURITY THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when

More information

Medical Occupation Report - Biology Biomagnetic biomass

Medical Occupation Report - Biology Biomagnetic biomass Biology Occupation Report CIP 26.0101 Biology/Biological Sciences, General CIP 2010: A general program of biology at the introductory, basic level or a program in biology or the biological sciences that

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011 100304 INFO SYS TECH:SIMULATION & DIGITAL ENTER Hagerstown Community College Lower Division Certificate 100304 COMPUTER GAMING AND SIMULATION Montgomery College-All Campuses Associate Degree 100304 Count

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

San Mateo County Community College District College of San Mateo

San Mateo County Community College District College of San Mateo San Mateo County Community College District College of San Mateo 1700 W. Hillsdale Blvd. San Mateo, California 94402 Occupation Report: Digital Media (DGME) Eight-County San Francisco Bay Area Economic

More information

Florida. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics

Florida. Information Technology Industry. 2015 Edition. Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics L a b o r M a r k e t I n d u s t r y P r o f i l e Florida Information Technology Industry 2015 Edition Source: Florida Department of Economic Opportunity, Bureau of Labor Market Statistics Florida Information

More information

Computer Support Specialists and Systems Administrators

Computer Support Specialists and Systems Administrators http://www.bls.gov/oco/ocos268.htm Computer Support Specialists and Systems Administrators * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections

More information

What is Management Responsible For?

What is Management Responsible For? What is Management Responsible For? Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf & Company, P.C Regional

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8. Concept of Work

Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8. Concept of Work Information Technology Specialists #39110 Page 1 of 16 Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8 Concept of Work This Career Group provides

More information

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

POSITION QUALIFICATIONS. Minimum Experience (Yrs) POSITION QUALIFICATIONS Core Labor Category Skill Minimum Education Minimum Experience (Yrs) Labor Category Description Technical Manager, Principal Bachelors Degree 12 Technical Manager, Senior Bachelors

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Professional and Business Services Employment Trends in the Richmond MSA

Professional and Business Services Employment Trends in the Richmond MSA Professional and Business Services Trends in the Richmond MSA Prepared for Resource Greater Richmond, Virginia Professional and Business Services Trends in the Richmond MSA Key Findings The Professional

More information

Engineering Technology Occupation Report CIP 14.4201

Engineering Technology Occupation Report CIP 14.4201 Engineering Technology Occupation Report CIP 14.4201 Pima, Mechatronics, Robotics, and Automation Engineering CIP 2010: A program that prepares individuals to apply mathematical and scientific principles

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Strategic Possibility Report Los Angeles County. Accounting. Center of Excellence for Los Angeles

Strategic Possibility Report Los Angeles County. Accounting. Center of Excellence for Los Angeles Strategic Possibility Report Los Angeles County Accounting Center of Excellence for Los Angeles Hosted at the Los Angeles Community College District September 2007 Strategic Possibility Summary for Los

More information

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY

More information

NW Systems, Inc. Corporate Overview. 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com

NW Systems, Inc. Corporate Overview. 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com NW Systems, Inc. Corporate Overview 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com SUMMARY Founded in 1996 ; Professional Services Firm Supporting US Government and Commercial Clients

More information

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble POSITION SPECIFICATION President Northern Virginia Community College Preamble The Virginia Community College System provides programs and courses of instruction, through the associate degree level, encompassing

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Game Design. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc.

Game Design. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc. Game Design Regional Program Demand Report Santa Monica College, LA MSA Economic Modeling Specialists Inc. Introduction and Contents Contents Executive Summary Job Outlook Summary Inverse Staffing Patterns

More information

http://www.bls.gov/oco/ocos267.htm Computer Software Engineers

http://www.bls.gov/oco/ocos267.htm Computer Software Engineers http://www.bls.gov/oco/ocos267.htm Computer Software Engineers * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data

More information

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014 Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber

More information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

IT - Computer Support Specialist

IT - Computer Support Specialist IT - Computer Support Specialist Five Year Trend Five Year Enrollment Change 43.9% FY 2008 FTEs 37.90 Five Year FTEs Change 34.1% FY 2009 FTEs 29.73 Five Year Graduate Change 20.0% FY 2010 FTEs 46.47 FY

More information

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA Summary In FY2014-15, goals for the CIO areas were aligned around two areas: the Cornerstone Plan (particularly Pillar V, Organizational Excellence, and Pillar II, Research Infrastructure and Services)

More information

Employment Data For the United States of America

Employment Data For the United States of America Entrepreneurship/Small Business Management Occupation Report CIP 52.1801 Sales, Distribution, and Marketing Operations, General CIP 2010: A program that focuses on the general process and techniques of

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

Why Certify? Why IT? Brian Matzelle

Why Certify? Why IT? Brian Matzelle Why Certify? Why IT? Brian Matzelle CompTIA Academy Team Alan Rowland Business Development Director Brian Matzelle Education Sales Senior Manager Jill Thielmann Manager, Inside Sales Kirk Smallwood Senior

More information

Florida. Information Technology Industry. Source: Florida Agency for Workforce Innovation, Bureau of Labor Market Statistics Center

Florida. Information Technology Industry. Source: Florida Agency for Workforce Innovation, Bureau of Labor Market Statistics Center L a b o r M a r k e t I n d u s t r y P r o f i l e Florida Information Technology Industry Source: Florida Agency for Workforce Innovation, Bureau of Labor Market Statistics Center Florida Information

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Computer Science. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc.

Computer Science. Regional Program Demand Report. Santa Monica College, LA MSA. Economic Modeling Specialists Inc. Computer Science Regional Program Demand Report Santa Monica College, LA MSA Economic Modeling Specialists Inc. Introduction and Contents Contents Executive Summary Job Outlook Summary Inverse Staffing

More information

Cisco and Linux Networking/Network Technology Education Report. 5,789 11.6% $27.14/hr

Cisco and Linux Networking/Network Technology Education Report. 5,789 11.6% $27.14/hr Cisco and Linux Networking/Network Technology Education Report CIP 11.91 Cochise, Pima, SC CIP 21: A program that focuses on the design, implementation, and management of linked systems of computers, peripherals,

More information

Cybersecurity for Medical Devices

Cybersecurity for Medical Devices Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick

More information

Cisco Networking Academy: Alabama Profile

Cisco Networking Academy: Alabama Profile Cisco Networking Academy: Alabama Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with

More information