Cyber Security Jobs Report

Size: px
Start display at page:

Download "Cyber Security Jobs Report"

Transcription

1 Cyber Security Jobs Report Release Date January 8, 2013 Report Sponsors This report was made possible through the generous support of the Abell Foundation, an organization dedicated to the enhancement of the quality of life in the city of Baltimore and across the state of Maryland. You can learn more about the Abell Foundation at their website, CyberPoint International, CyberMaryland, Welz & Weisel Communications, and their collective community partners provided additional support. About the Authors Organized through the Baltimore Cyber Technology & Innovation Center (CTIC), this report is the result of a collaborative effort between CyberPoint International, CyberMaryland, Welz & Weisel Communications, and their collective community partners The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 1

2 Table of Contents Mission 3 Scope the Project 4 Methodology 7 Highlights: Cyber Jobs 13 Highlights: Education and Training 21 Summary 43 Appendix A: Cyber Security Taxonomy 44 Appendix B: The Cyber Jobs Survey 45 Appendix C: Survey Job Targets The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 2

3 Mission With the dramatic proliferation of computing and communications technologies across the globe, the cyber security industry has experienced unprecedented growth particularly in the Baltimore metropolitan region. This growth has created an urgent need for qualified individuals to fill current job openings and to develop the skilled workforce necessary to address the expected dramatic job growth in the future. While there has been a great deal of talk about job growth in the media as well as in industry and government circles, there are only generalized estimates as to the true number of available cyber security jobs. There is also a lack of consolidated information on the training and educational requirements for obtaining those jobs. The purpose of this project is to shed some light on both of these issues. Our goal for this report was to generate awareness of cyber security jobs in Maryland, including the educational requirements for eligibility (i.e. certifications, two- or four-year degrees, etc.) and the programs available within Maryland to help individuals meet these requirements. While this effort will stand alone as a snapshot in time, we intend to identify a repeatable process such that the results can be updated regularly and periodically and will lead to an on-going cyber security job index based on emerging initiatives and activities The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 3

4 Scoping the Project Cyber vs. Cyber Security The term cyber has been applied broadly throughout industry and has evolved to have almost no real meaning. In order to deliver valuable results, it was important to bound this study and define the scope of our project. This starts with defining what the terms cyber and cyber security mean to us in the context of jobs. Most professionals in the security industry use the term cyber as a short form of cyber security. When using the term cyber, they are not generally referring to Information Technology (IT) or referring more specifically to systems administration, network management, or network administration. Rather, they are referring to the technologies, people, and procedures influencing the protection of information and information systems. However, those not in the cyber security industry often adopt the term, cyber, much more loosely to involve most anything related to IT, software, or any technology or capability that uses 1s and 0s. For the purposes of our study, we specifically considered Maryland programs and positions that support science, technology, engineering, and mathematics (STEM) disciplines in the cyber security industry. This includes positions available in both commercial sectors and government agencies and at all levels of education and training. A main objective of this study was to produce results such that a candidate interested in a certification program or degree program at one of the institutions within Maryland could see how many jobs they will be exposed to after completing such a program. For example, candidate X will know that when he/she completes their cyber security program at Y institution, they will have Z number of jobs for which they qualify to apply. We attempted to identify the numbers and levels of jobs offered throughout the state of Maryland and tie them to the qualifications required. Additionally, the results could be beneficial to job creators, industry and economic leaders, as well as investors and other key cyber stakeholders. The Cyber Security Jobs Report is tailored to job titles and/or roles that support the mission or purpose of protecting data, systems, and infrastructure from unauthorized access, theft, manipulation, or destruction, while maintaining access for authorized users and the effective functioning of essential services. We concede that almost any IT job could serve as a stepping-stone to a cyber security job, just as it could be assumed that any job requiring a security clearance, could serve as a stepping-stone to a cyber security job at one of the federal Intel agencies. However, we based this study on opportunities that serve as a direct path to a cyber security job where purpose determines the role. Additionally, we did not include jobs that are outside a technical STEM field but support the mission of cyber security. We acknowledge positions such as linguist, intelligence analyst, policy maker, and others are abundant in our region and are extremely valuable pursuits in support of the cyber security mission. However, for the purposes of this study, our focus was on STEMbased cyber security positions The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 4

5 Assumptions In our efforts to determine Maryland s true differentiation, if any, with regards to cyber security jobs, there are a few assumptions upon which we relied. IT positions were not considered cyber security opportunities, unless their job roles specifically address security concerns and/or responsibilities, which often was the case in many job listings. It is understood that many small/mid-size businesses often mix roles of IT personnel but larger companies have security teams separate from IT staff. Therefore, we may have discounted some small/mid-size companies that exist in every state that hire one or two system administrators to serve as security personnel. While these jobs exist, they exist everywhere throughout the United States and at a fairly even distribution. Again, it was our goal to highlight what is unique about Maryland as it relates to cyber security. The organizations targeted for this study included public and private companies, large systems integrators, government agencies, and job placement companies, etc. In scoping this study, we had to consider that many of these organizations might be reluctant to share too much detailed information. It was also necessary to be respectful of their time in order to encourage participation. Therefore, it was important to keep data collection simple and at a fairly high-level in order to yield the best opportunity for the greatest participation. In order to make the numbers as accurate as possible, we also moved away from an initial strategy of allowing target organizations to speculate on future job numbers. An ongoing Cyber Jobs Report will better serve understanding growth in the cyber security job market, and the reality of projections. Cyber Security Roles In the area of cyber security, we see the following categories of opportunities within STEM disciplines: Analysts Architects Developers Engineers Executives Instructors Interns Operators Programmers Researchers Sales Engineers Each of these roles have various educational, certification, and/or level of experience requirements. We considered all levels of roles from chief information security officers (CISOs) to interns; from network security analysts to software security programmers; from security researchers to security software sales engineers. Our objective was to identify and create awareness of all possible avenues into the cyber security field for professionals, practitioners, and entry levels alike The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 5

6 Cyber Security Educational Requirements In addition to considering the opportunities available and offered in the state of Maryland, we explored the educational, training, and certification programs throughout the nation. The categories we set out to consider are as follows: Work Study Programs Internships Technology Certification Programs (e.g. ITT Institute) Community College Degree Programs 4-Year Degree Programs Graduate Degree Programs Post-Graduate or Doctoral Programs Professional Certification Programs (e.g. CISSP) Other (Specialized Training) Cyber Security Jobs Reporting The results of our report were released in two phases. First, a presentation entitled the Cyber Security Jobs Report was delivered at the 2012 CyberMaryland conference. At the conference, the initial findings were shared and the presentation was followed by a question and answer session with expert panelists. The second phase is this report, where our methods and findings are fully documented. Cyber Security Taxonomy As the cyber security market evolves, the technology classifications and taxonomies that describe the industry are evolving as well. Based on industry experience and analysis of the marketplace, we made the decision to adopt taxonomy used by the CyberMaryland Map. While opinions can differ greatly on how best to describe the cyber security marketplace, we believe this taxonomy accurately reflects the key product and service classifications existing in all sectors of today s cyber security industry. At the highest level, we describe industry sectors and then categorize the functions to support each sector. This taxonomy formed the basis of the industry sectors and functions we considered within the jobs search. Below is a list of the high-level industry sectors. The next level including product types is included as Appendix A of this report. Critical Infrastructure Protection Cyber Intelligence Cyber Situational Awareness Data Protection Enterprise Security Management Infrastructure Investigative Analysis Managed Services Unified Threat Intelligence Wireless 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 6

7 Methodology Research, Analysis, and Synthesis After defining the scope of our project we set out to test our assumptions and taxonomy. This involved a multi-faceted approach where we would research, analyze, and synthesize in an iterative fashion samplings from both online job boards as well as corporate and government websites. During the first phase of this project, we evaluated sample job requisitions for position and education/training requirements, identified related articles on career and education opportunities, investigated relevant studies, and began to consider the technology community that was most prominent in the Maryland region. We used these initial findings to inform our process for creating a survey and to establish a targeted set of corporations and organizations that had a significant presence in Maryland in which to distribute. Creating the Survey Armed with the information from our research, we set out to answer the following questions: How many cyber security job opportunities exist in Maryland? More specifically, in the Baltimore area? Who is hiring and what types of positions are they looking to fill? What education and training qualifications are required to meet these positions? Are there opportunities available for those interested in the field right out of high school? What resources (Universities, Community Colleges, Institutes, Certification Programs, etc.) exist in Maryland to support these needs? And what programs do they offer? How does Maryland compare to other states? We created a fairly complex 24-question survey to address the entirety of these questions that is included as Appendix B of this report. Our goal was to identify concrete numbers, which involved detailed questions. We attempted to make this survey as simple as possible and prepared to offer it online through Survey Monkey as well as to deliver it over the phone to targeted constituents. Our next step was to determine the appropriate target audience that would provide us with the results necessary to get a feel for the majority of jobs offered in the region The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 7

8 Defining the Target Audience In order to obtain a representative sampling of the cyber security jobs offered by the major employers in the region we targeted three primary sectors: Government Agencies, the Defense Industrial Base, and Maryland cyber security technology companies. Government Agencies The list of major government agencies with a mission focus on cyber security with a heavy presence in Maryland includes the Department of Homeland Security (DHS), Department of Justice (DoJ), Federal Bureau of Investigation (FBI), National Aeronautics and Space Administration (NASA), and the National Security Agency (NSA). These agencies actively recruit for cyber security professionals throughout the nation and are widely known. Additionally, most local universities have some form of a relationship with one or more of these agencies including those universities that have achieved the status of Certified Academic Center of Excellence in Information Assurance by NSA. Defense Industrial Base Due to the high concentration of systems integrators and government contractors that make up the region s Defense Industrial Base (DIB), we set out to identify and include the major defense contractors. Through our research, we identified a Baltimore Business Journal source that ranked the top 25 defense contractors in Maryland based on contract size - Proctor, C. (2011, October 28). Top of the List: Maryland s Defense and Federal Contractors, Baltimore Business Journal 1. Starting with this list, we pared down and excluded those that were not focused on the cyber security industry. The resulting list of 17 included: AAI Corp, Arinc, BAE Systems, Boeing, Booz Allen Hamilton, CSC, General Dynamics, Hewlett-Packard, IBM, Johns Hopkins University/APL, L-3 Communications, Lockheed Martin, MITRE, Raytheon, Northrop Grumman, SAIC and SRA. Maryland Cyber Security Companies Of course, in Maryland, there are many more high-technology companies with a focus in cyber security beyond the government and DIB. We set out to identify as many Maryland cyber security companies as possible. This effort led us to use three distinct sources to identify the companies we wished to target: first, because of our relationship with CyberMaryland, we were fortunate to gain access to over 70 companies registered within the CyberMaryland Map whose primary focus is cyber security as we defined it reference Appendix A and the Scoping the Project section of this report; second, through our relationships with the Emerging Technology Center (ETC), UMBC@bwtech Cyber Incubator, Northrop Grumman Cync and CyberHive programs, Chesapeake Innovation Center (CIC), and other incubators and investors, we have first-hand knowledge of most, if not all, of the early stage cyber security companies in the region; and third, we used a recent report published in Inc Magazine identifying the largest cyber security companies in 1 of- the- list- marylands- federal.html?page= The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 8

9 Maryland Top Companies in Maryland on the 2011 Inc5000, Inc Magazine 2. The complete pared down list of targeted agencies and companies is included as Appendix C of this report. Execution Next, we leveraged the CyberMap contacts list, dug through our resources and researched online sources to identify HR contacts for each of these organizations. As we began to reach out to these targets, we immediately found a few issues that would have a definite impact on the reliability and accuracy of the survey results. While most of the people to whom we spoke were very supportive and willing to complete the survey, an overwhelming majority wanted to remain anonymous. Additionally, it was clear that the information we requested, which was so relevant to our study results, was just not readily available. Remember, we are conducting this study precisely because organizations do not typically classify their job openings by cyber security so it is not evident how many of these positions are being advertised at any given time. Our initial discussions indicated that it would take months if not an entire calendar year for many of the larger organizations to capture and roll up all of the cyber security job requisitions they had outstanding. We ultimately concluded that the data provided by these candidates would be an estimate and could be misleading. This result was simply not acceptable to us. Our objective was to get away from the estimates that were bantered about in the industry and leverage actual job requisitions to analyze and support our study. We went back to the brute force tactic of searching job boards and company websites like was done in our initial research phases to assist with defining the cyber security jobs taxonomy. This led us to identify a research partner that would facilitate our searches and resulting tabulations and would provide the scale necessary to produce valuable and reliable results. Applying STEM to the Study Our research partner is the chosen job search provider for LinkedIn, MySpace, Plaxo, BusinessWeek, CNNMoney.com, The Washington Post, Mashable, GigaOm, All Things Digital, and thousands of other sites. Rather than tackle this problem with analysts and spreadsheets, we decided to actually apply STEM to our problem. Leveraging their job search engine, we were able to implement our taxonomy into an algorithm that would allow us to get real-time data on actual job requisitions that were currently being offered. This tool allowed us to not only search on cyber security jobs in Maryland, but narrow the search to the Baltimore and surrounding region and compare against the other cyber security hotbeds throughout the nation like Austin, Boston, Palo Alta, San Antonio, and others. This search engine and relationship enabled us to capture data from postings at job boards and company websites across the Internet while implementing an algorithm to ensure multiple listings of the same requisition were only captured and represented once. We would be able to capture metrics based on our searches to include total number of listings, top companies represented and total number of companies providing listings, major job roles, education and training requirements, experience levels, and types of positions (full-time vs. part-time) all broken down by region The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 9

10 These outcomes were more in line with the goals we set out to accomplish. Real data supported by actual postings rather than assumptions and estimates. Refining the Taxonomy and Expanding the Search The initial results and energy that went into creating and initiating our survey proved extremely valuable to the process of implementing the taxonomy into a Boolean logic query algorithm. We established a baseline search for cyber security jobs in Maryland using a combination of forward leaning cyber security keywords such as cyber intelligence, cyber situational awareness, malware, and many others. This baseline search resulted in identifying over 3,000 cyber security jobs representing more than 1,800 employers throughout Maryland. We used this same query to make comparisons across the US, but the numbers seemed disproportional to what we knew about these other cyber security hotbeds. Because these results were not adding up, we took a subset of the jobs postings from each region and dug a little deeper. During this analysis we found that leaving out more traditional network security terms such as information assurance, network security, and others in combination with technology device keywords was to the detriment of these regions results. Upon expanding the search to include these terms, the job numbers in these competing hotbeds were magnified exponentially and seemed to even the playing field. With this expanded algorithm in place, our sample set grew to over 340,000 jobs across the nation and almost 20,000 jobs in the Maryland region alone, which made for a better comparison. Analysis Once we had a strong baseline of cyber security jobs, we set out to answer the questions cast by our mission. In the survey, we created questions that would lead us to actual data. Within our search results, we had the data we needed at our fingertips; it was just a matter of creating queries to formulate our results. We first established queries that would provide insights into what the industry were looking for in candidates, what qualifications were required, and what positions were sought. While this information was invaluable, making the connection from the Internet world to the physical world was just as important when considering this data. A regional view is important. With access to the jobs search engine, we had the ability to apply our queries across the 340,000 cyber security jobs across the nation and associate them to cities and states in which they were being offered. This capability allowed us to determine how many jobs were located within Maryland and which ones were within close proximity to Baltimore. We also associated postings in other regions thought to be strong in cyber security to make comparisons to Maryland. Analyzing and understanding this data at the highest level was critical to answer the questions Where are the jobs? and just as importantly Who is offering these jobs? We designed a query that identified each company and/or government organization that had a posting within our dataset. This yielded over 18,000 companies posting cyber security positions throughout the nation and over 1,800 companies in Maryland alone. The results were representative of just about all of the companies we originally set out to target (Reference Appendix C) and many more The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 10

11 After compiling the base data set, we conducted deeper analysis of the data to learn what specific job demographics and trends we could highlight. We implemented a query that identified all position titles within each posting and set up a running tally so we could determine the most popular positions. The query initially counted common position titles at different levels as separate counts, but we later refined the results and merged each of them into one common position title. For example, if our original query identified 500 Senior Computer Engineers, 300 Junior Computer Engineers, and 100 Computer engineers, our final assessment concluded there were 900 Computer Engineers for the purposes of comparing common job roles. Of course, there is value in understanding the experience level differences. The experience breakdown is represented later in the results section of this report where we highlight education and experience level demographics. We specifically evaluated the job position requirements, qualifications and engagement demographics. Our next query highlighted the levels of education required, whether that is a high school diploma, college degree, advanced degree or specialized training. We also looked at levels of experience sought and the types of engagements: part-time, full-time, contract, or internship. We evaluated the positions for certifications that seemed to be the most popularly suggested as providing an advantage. And there was specific interest in opportunities for those with only a high school diploma. The following sections highlight our findings. A key point to consider is that our highlights are generated from actual postings across the Internet. There is no common or standardized data field structure adopted by the companies making these postings. They use their own job titles and descriptions. The data fields one company utilizes do not correspond directly to others. So while some provide required level of experience data, others may not. While some call out requirements for certifications, others may not. We did our best to normalize the results, but we can only make comparisons based on the content provided within each posting. Education and Training A solid understanding of which cyber security job opportunities are available is just one piece of the puzzle. However, in order for our emerging cyber security workforce to take advantage of these opportunities and in order to position themselves for successful entry into this field, they need to know what resources in Maryland are available to them to achieve the education and training requirements necessary. Fortunately, Maryland s academic and training resources rival those of any in the nation. Local universities are dedicated to grow and build curriculum and certification programs to address the regions growing needs. It is difficult to discern whether the high job numbers demonstrate increasing innovation or a difficulty in filling vacancies. It is clear, however, that there is opportunity for those seeking employment and an enormous amount of cyber security activity in the area. We expect this is partly because of the strong presence of the DIB and government agencies whose missions are finely tuned to the cyber security discipline. Over time, experts expect the need to continue generating supply and graduates and professionals from other regions will relocate to fill these positions The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 11

12 By reaching out to local contacts and web searches, we collected data and provided a summary of the university, community college, technical institute, and professional affiliate programs focused on cyber security in Maryland for interested prospects to leverage. Highlights are included and documented in the following sections of this report. If your program is not represented or you wish to update or correct any inaccuracies, please feel free to contact us for future inclusion in follow-on reports The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 12

13 Highlights: Cyber Jobs Cyber Security Hot Beds with Job Openings The Internet is full of cyber security job postings sourced by job boards, corporate websites, and various publication listings. The expanse of our research, which was a snapshot in time of the first week in October 2012, includes 340,000 jobs posted by 18,769 companies nationwide. Based on this nationwide collection, we were able to segment them by region to make comparisons between several regions that are commonly considered hotbeds in cyber security. Figure 1 shows the relationship of the number of cyber security jobs posted in their respective regions. This data considers each city and the 25-mile surrounding area. Baltimore with 13,393 postings, ranks 3 rd just behind Palo Alto and San Francisco, two technical powerhouses, and slightly edges out Boston who sits at 4. The remaining cities have significantly lower numbers, but are still very relevant cyber security regions. Figure 1: Regional Comparison 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 13

14 The numbers indicate that the proximity of Baltimore to the National Security Agency, US Cyber Command, defense contractors and emerging companies supporting these agency missions have a significant impact on the region s cyber security innovation and representation. This presents both opportunity and a challenge. Do these numbers indicate these regions provide the best opportunity? Or do they indicate they are cyber security professional deficient? It would seem to be a strong indicator for individuals interested in gaining employment. But, could it be a concern for a company looking to relocate or start in Maryland? The latter question cannot be adequately addressed without knowing the rate these positions are being filled. We will leave that for a follow-on study. Local universities are well aware of the high concentration of cyber security opportunity in Maryland, in fact fifteen universities have become certified by NSA as Cyber Security Centers of Academic Excellence. Maryland Companies with the Most Cyber Security Openings It s not just agencies in need of cyber security professionals. The government systems integrators and commercial technology companies supporting the cyber security mission in the region are also on the hunt. With 19,413 Maryland job postings considered in this study, we have identified 1,828 companies with job openings in Maryland alone. Based on the cyber security job postings that were tuned to our queries, we were able to highlight companies with the greatest number of outstanding hiring requisitions. These results are highlighted in Figure 2 on the next page. It should be of no surprise that 9 of the 10 companies highlighted include government integrators that make up the Defense Industrial Base. The one outlier includes an online cyber security recruitment company, CyberCoders. Additionally, there were 25 companies with over 100 job postings, 50 companies with more than 45 job postings, and over 100 with greater than 20 job postings. The resulting average posting per company is These companies ran the gambit of industries to include: finance, healthcare, telecommunications, government, retail, critical infrastructure, academia, technology and many others. Tracking cyber security job offerings by industry is another point of interest for a follow-on effort. It would be interesting to identify which industries are contributing most to the cyber security industry and this could certainly be an indicator. Additionally, it would be interesting in a future effort, to be able to dig deeply into the requisitions and apply earning potential and highlight which industry sectors support the highest paying cyber security jobs The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 14

15 In addition to the companies represented, several Fortune 500 companies offer positions in cyber security. A cross-section of these companies include: Lockheed Martin, Constellation Energy, Marriott International, Coventry Health Care, and Catalyst Health Solutions all located in either Bethesda, Baltimore, or Rockville, Maryland. Figure 2: Maryland Employers with the Most Cyber Security Openings We expect the composition of employers outside of Maryland to be very different. Depending on the location, they are less likely to have such a high representation of defense contractors. We also would expect a lower average number of job postings per company and a more diverse set of companies leading to their respective numbers. This is mainly because outside of government integrators, the largest population of security positions being offered would be from security companies themselves. There are just simply not as high a concentration of cyber security companies, with the size of these integrators, co-located in any particular region as there are defense contractors positioned in the Maryland area. It would be interesting to evaluate and analyze the details related to each alternate region separately in a follow-on study. Top Maryland Cyber Security Job Opening Positions Most recognize the typical cyber security positions to include: chief security officer, chief information security officer, network security analyst, exploitation analyst, reverse engineer, and other commonly known positions. However, within this study, the scope of our definition was open to include all STEM positions supporting the mission of cyber security. Of the nearly 20,000 Maryland cyber security job postings we found that the most common job titles include much more traditional and widely adopted titles. The most popular titles can be seen in Figure 3 on the next page represented in a proportional comparison The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 15

16 While a handful of creative job titles were identified, most align around curriculum offerings of our nation s academic institutions. Engineering, administration, and analysis disciplines that revolve around both development and operational activities are the heavyweights. We have seen over time that work titles have evolved to be more and more in tune with actual job descriptions like reverse engineer and malware analyst, and the more often these positions are offered, the more likely specific education and training curriculum will be created to support them. Figure 3: Maryland Cyber Security Job Titles 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 16

17 We looked at a cross-section of five (5) cyber security companies based in Maryland. Table 1 shows a summary of each of these companies, the number of cyber security jobs they were posting at the time of our study that aligned with our taxonomy, the most common position titles, and the company s technology focus. When selecting these companies to profile, we wanted to make sure we covered both product and services as well as companies that target sales to both commercial and government customers. To clarify, this data was retrieved from each companies website. As is evident in just this small sampling, while there are several common words used for job titles, we highlighted 20 unique position titles. This is consistent with what we have seen across the larger data set. Company Name # Job Openings Positions Technology Focus CyberCore Technologies 90 Database Engineer, Web Analytics Developer, Applications Engineer, Network Engineer Supply Chain Management, Secure Network Design, Penetration Assessment SafeNet 28 Senior Systems Engineer, Network Security Engineer, Software Engineering Specialist, Web Developer Cloud Security, Data Protection, Authentication, Encryption Raytheon BBN Technologies CyberPoint International Lookingglass Cyber Solutions 27 Cyber Security Scientist, Cyber Security Engineer, Software Engineer, Staff Scientist 11 Reverse Engineer, Vulnerability Research Analyst, Cleared Programmer, Vulnerability Engineer 7 VP of Engineering, QA Engineer, Data Engineer, Senior Internet Security Analyst DoS Triage, Cryptography, Systems Security, Standards Development Malware Analysis, Reverse Engineering, Vulnerability Assessments, IR, CND Over-the-Horizon Cyber Threat Suppression Table 1: Cyber Security Job Profile of Five (5) Maryland Cyber Security Companies 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 17

18 Maryland Cyber Security Job Breakdown Taking a deeper look at the education and experience requirements for cyber security jobs in Maryland revealed that there are more opportunities being advertised for the entry- to mid-level workforce. Of those requisitions reporting education requirements, 76% require a Bachelor s Degree while only 4% require a Master s Degree or higher. This is consistent with the understanding that most of the jobs being offered are aligned with Engineering and/or Computer Science degrees of various disciplines and focus. Based on our data, it appears there is a great need for candidates with 0-5 and years experience. This could be a sign of investment and innovation in cyber security innovation as this level of workforce is often considered both the heart and mind of innovation. We also see that the overwhelming majority of job postings are for full-time engagements. The relational data can be seen in Figures 4 and 5 and is based on a sampling of the overall data. Figure 4: Education and Experience Breakdown Figure 5: Job Engagement Breakdown 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 18

19 What s in it for High School Graduates? While the majority of the opportunities, 83%, call for a Bachelor s Degree or higher, there certainly are opportunities for high school graduates. These opportunities include internships, work-study programs, cooperative programs, and contract, part-time, and full-time employment. The cyber security field, from its inception, has always been friendly to technical professionals without college degrees. While most advertise degree requirements, many positions, from those that are hands-on, network analysts, to those at the highest level, CISO, will take the most qualified individual. A rule of thumb in the industry is that 4 years of experience will account for a 2-year degree equivalency and 8 years will account for a 4-year degree equivalency. The cyber security field grew out of the information technology field, which has always been heavy with self-taught and trained, skilled professionals and technicians. The majority of jobs offered to high school graduates were established internships that require a path to a degree. However, Figure 6 includes a list of 10 order ranked positions that had the requirement of a high school diploma and not a college degree. Figure 6: Job Titles for Positions Not Requiring a College Degree Professional Certifications are Important to Some Certification programs for Information Assurance have been around since the late 90s and early 2000s. Some have been more widely adopted than others. Based on our research, approximately one-third (1/3) of the requisitions included a certification requirement and/or preference. Based on our data, we have broken these certifications into tiers based on popularity. Popularity is determined by how often each shows up in job requisitions with Tier 1 being the most popular and Tier 3 being the least popular. A breakdown of these tiers can be seen in Table 2 on the next page The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 19

20 Popularity Level 1000s of Requisitions 100s of Requisitions 10s of Requisitions Tier 1 CISSP Tier 2 CAP, CISM, SSCP Tier 3 GIAC, ISSEP, GSLC Table 2: Professional Certifications Those interested in these certifications should refer to the below information: The International Information Systems Security Certification Consortium (ISC 2 ) offers an entry-level credential called the Systems Security Certified Practitioner or SSCP. The SSCP leads directly to the most popular and most prevalent mid-tiered certification the Certified Information Systems Security Practitioner (CISSP). ISC 2 also offers the Information Systems Security Engineering (ISSEP), which was developed in conjunction with the National Security Agency (NSA) for engineers responsible for incorporating security into project, applications, business processes, and information systems. And finally, the Certified Authorization Profession (CAP) certification is also issued by ISC 2 and is for practitioners responsible for establishing processes to access risk and establish security requirements and documentation. Visit for more information on CISSP, SSCP and CAP. The Global Information Assurance Certificate (GIAC) is offered by the Systems Administration and Network Security (SANS) Institute and is thought to be one of the more hands-on certifications. SANS also initiated and manages the GIAC Security Leadership Certification (GSLC) which accredits individuals who manage IT projects. Visit for more information on GIAC or GSLC. The Information Systems Audit and Control Association (ISACA) offers a certification for information security managers known as the Certified Information Security Manager (CISM). To test for this certification requires a candidate have at least five years experience in information security and another three years in information security management. For more information on the CISM, visit The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 20

21 Highlights: Education & Training Education and Training Opportunities Available in Maryland The resources for cyber security education and training in the Maryland area are vast and include universities, community colleges, research centers, learning centers and training institutes, as well as K-12 programs. In this section, we will highlight several of these opportunities. The National Security Agency, located at Ft. Meade, MD, hosts a program called the National Center of Academic Excellence (CAE) in Information Assurance. This program is intended to be a deeply technical, inter-disciplinary, higher education program based on computer science, computer engineering, and electrical engineering; with extensive opportunities for hands-on applications via labs and exercises. This program s certification requirements are intensive. Maryland leads all states with 15 colleges fulfilling the criteria for Certification as an NSA CAE with Texas close behind with 12. For a comparison of the states with the greatest number of certified colleges, see Figure 7. Figure 7: Number of Colleges Certified in Cyber Security by NSA 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 21

22 NSA CAE Universities in Maryland Bowie State University Capitol College Johns Hopkins University Towson University United States Naval Academy University of Maryland, Baltimore County University of Maryland, College Park University of Maryland University College NSA CAE Community Colleges in Maryland Anne Arundel Community College College of Southern Maryland Hagerstown Community College Harford Community College Montgomery College Prince George s Community College The Community College of Baltimore County K-12 Programs The NSA works closely with local elementary, middle, and high schools through several programs including the Math Education Partnership (MEPP), Partners in Education Program, High-School Work Study Program and STARTALK initiatives. For more information on these programs, visit Maryland Universities, Community Colleges, and Technical Institutes Offering Four-Year and Post-Graduate Degrees, Two-Year and Certificate Programs, and Professional Development Certificates In efforts to provide some clarity and insight into what our local education and training resources offer in the way of cyber security, we have documented some highlights of the programs offered by each of the schools that have a designation of CAE from the NSA. Our hope is to provide a one-stop shop for interested parties to get a high-level summary of the unique and common offerings available in Maryland The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 22

23 Bowie State University Bachelor of Science Computer Science Computer Technology Management Information Systems Mathematics Pure Math, Applied and Computational Mathematics, Mathematics Education, Dual Degree Mathematics/Engineering Master of Science Computer Science Information Systems Information Systems with a Concentration in Information Assurance Doctorate Program Computer Science Post-Baccalaureate Certificate Program Computer Science Information Assurance Areas of Study Intelligent agent-based computing, semantic Web technologies, software engineering/software structures, healthcare informatics, information assurance, e-commerce and e-business technologies, product integration and process improvement, database systems, data warehousing and mining, business intelligence and decision support systems, enterprise information systems, digital business systems and security, project management, and human-computer interaction and collaboration The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 23

24 Capital College Associate of Science Computer Engineering Technology Electronics Engineering Technology Telecommunications Engineering Technology Bachelor of Science Computer Engineering Computer Engineering Technology Computer Science Electrical Engineering Information Assurance Electronics Engineering Technology Management of Information Technology Software Engineering Telecommunications Engineering Technology Web Development Master of Science Computer Science Electrical Engineering Internet Engineering Information Assurance Information and Telecommunications Systems Management Doctorate Program Information Assurance Post-Baccalaureate Certificate Program Client/Server and Wireless Devices Component Technologies and Online Collaboration Information Assurance Administration Information Technology Network Protection Security Management 2013 The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 24

25 Prep for CompTIA Security+, SSCP certifications Undergraduate Certificate Programs Computer and Network Security Object-Oriented Programming Programming and Data Management Space Missions and Operations Specialist Software Engineering Website Development Online programs (BS, MS, and Online Experience Classes) Information Assurance Management of Information Technology Critical Infrastructure and Cyber Protection Center Professional Development for Technical Managers Certificate Program Cyber intelligence FISMA Homeland Security Identify, Credentials & Access Management Industry Certification Preparation (CISSP) National Information Assurance Training Standards Resources Capitol College hosts a Cyber Battle Lab and offers an Information Assurance Scholarship Program The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 25

26 Johns Hopkins University Bachelor of Science Computer Science Electrical and Computer Engineering Concurrent Bachelor s/master s Program Master of Science Computer Science Computer Science with Telecommunications and Networking Option Computer Science with a Concentration in Bioinformatics Information Assurance Information Systems Engineering Opportunity to concentrate in information security, distributed systems, knowledge management, software systems, networking, information systems management Dual Master s Program Post-Baccalaureate Certificate Program Computer Science Information Assurance Post-Master s Certificate Computer Science and Information Systems Engineering The program offers two areas of concentration, which can be combined to meet your individual interests. These include networks, which focuses on protecting information assets from network-based intrusion and from attacks that are primarily focused on remote exploitation of protected systems; and systems, in which attacks are explored from within the system boundary, with an emphasis on platform, operating systems, and secure software development. All students have access to our extensive computing facilities, which are supported by a variety of software systems, applications, development tools, and specialized labs. Information Security Institute A Master of Science in Security Informatics degree represents Johns Hopkins University s core cybersecurity offering. Over thirty courses are available in support of this graduate program. Over 15 full-time, part-time, or adjunct faculty are available to deliver these courses at multiple sites spanning the Homewood campus in northern Baltimore, the medical and health facilities in eastern Baltimore, the part-time graduate program operations at APL and the Montgomery County campus, and the SAIS and KSAS facilities in Washington, D.C The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 26

27 Towson University Bachelor of Science Computer Science Computer Science and Mathematics Computer Science and Mathematics with Security Track Pure Mathematics Applied Mathematics Actuarial Science and Risk Management Information Systems Combined Major in Information Systems and Business Administration Combined Major in Information Systems and E-Business Information Technology Master of Science Computer Science Computer Security e-commerce Software Engineering MS Information Technology Doctorate Program Information Technology As a graduate student in Towson s IT doctoral program, students develop advanced research skills while learning supplementary practices of modern technology. Students are given a comprehensive knowledge of the fundamentals in four of the following five areas: computer science fundamentals (data structures, algorithms, and operating systems), database systems, computer networks, software engineering, and information technology. Students who complete the program leave will be prepared to conduct and present scholarly research The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 27

28 Online Courses Master of Science Applied Information Technology Integrated Homeland Security Management the research, development and analysis of security strategies; critical agency infrastructures and their inter relationships; team leadership and cooperative planning; and formulating and executing integrated, rapid responses to crisis situations. Post-Baccalaureate Certificate Security Assessment and Management 5-course interdisciplinary program to provide an applied graduate education for personnel working in various areas of homeland security, risk protection and management, emergency response, and crisis communications. Areas of Study Database Management Systems - Design and develop database systems and learn to manage a large database system. Information Security and Assurance - Implement and support computer-based information systems with a focus on securing information. Information Systems Management - Learn information systems processes and understand the central function of technology in managing organizational processes and achieving objectives. Internet Application Development - Create and apply the latest information systems capabilities for the Internet. Networking Technologies - Develop and implement the design requirements of a successful networked environment. Software Engineering - Study, design, develop, implement and support computer-based information systems The Abell Foundation & CyberPoint International, LLC Cyber Security Jobs Report 28

White Paper: Why We Need Veterans for Critical Infrastructure Security

White Paper: Why We Need Veterans for Critical Infrastructure Security White Paper: Why We Need Veterans for Critical Infrastructure Security Published By: SkillBridge, LLC November 8, 2013 Converging Factors There is a significant and growing challenge that currently faces

More information

BHEF s National Higher Education and Workforce Initiative

BHEF s National Higher Education and Workforce Initiative BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member

More information

2014 CYBER INDUSTRY SURVEY

2014 CYBER INDUSTRY SURVEY Maryland s Cyber Industry Maryland s dynamic community of cybersecurity entrepreneurs, academia, federal agencies, investors, technologists and seasoned industry leaders makes it the nation s epicenter

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development

National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Executive Summary. Principal Findings

Executive Summary. Principal Findings On May 30, 2012, Governor Deval Patrick launched the Massachusetts Big Data Initiative, to leverage and expand the Commonwealth s position as a global leader in the rapidly growing big data sector. The

More information

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011 100304 INFO SYS TECH:SIMULATION & DIGITAL ENTER Hagerstown Community College Lower Division Certificate 100304 COMPUTER GAMING AND SIMULATION Montgomery College-All Campuses Associate Degree 100304 Count

More information

University of Maryland University College 2013 Spring Job Fair & Career Expo

University of Maryland University College 2013 Spring Job Fair & Career Expo Aflac University of Maryland University College Address: 152 Rollins Avenue Suite 210 Rockville, Maryland 20852 Website: www.aflac.com Position(s): Sales and Marketing Associate, Human Resources and Corporate

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Analysis of the Impact of the Earnings Limitation on the Recruitment and Retention of Nurses in Community Colleges. Prepared By:

Analysis of the Impact of the Earnings Limitation on the Recruitment and Retention of Nurses in Community Colleges. Prepared By: Analysis of the Impact of the Earnings Limitation on the Recruitment and Retention of Nurses in Community Colleges Prepared By: Maryland Higher Education Commission Division of Finance Policy As Requested

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Cybersecurity Education

Cybersecurity Education Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity

More information

Cybersecurity Workforce Training Partnership

Cybersecurity Workforce Training Partnership Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education

More information

Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University

Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University Securing cyberspace and our national information infrastructure is now more important

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

National Business Park: Economic Development Case Study. Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661

National Business Park: Economic Development Case Study. Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661 National Business Park: Economic Development Case Study Prepared by Cole Greene University of Maryland Urban Studies and Planning Program URSP 661 May 18 th, 2015 Background and History As the United States

More information

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State Agenda Item 2 USM Cyber Security Landscape and Contributions to the State BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION TOPIC: USM Cyber Security Landscape and Contributions to

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Getting in Front of the Cybersecurity Talent Crisis

Getting in Front of the Cybersecurity Talent Crisis CYBERSECURITY WORKFORCE Getting in Front of the Cybersecurity Talent Crisis http://boozallen.tumblr.com/post/120784624298/ how-to-build-a-cyber-dream-team-when-it-comes-to CONTENTS INTRODUCTION Introduction...

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

PH.D. IN BUSINESS ADMINISTRATION

PH.D. IN BUSINESS ADMINISTRATION PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent

More information

Role of Transfer Students in Meeting College Completion

Role of Transfer Students in Meeting College Completion Role of Transfer Students in Meeting College Completion Presentation to the Senate Education, Business, and Administration Subcommittee and the House Education and Economic Development Subcommittee Department

More information

Engineering and Applied Science Programs for Professionals

Engineering and Applied Science Programs for Professionals Engineering and Applied Science Programs for Professionals Allan W. Bjerkaas The Engineering and Applied Science Programs for Professionals (EPP), a part of the Whiting School of Engineering, has the mission

More information

UMUC FED Program. Online Open House July 22, 2015

UMUC FED Program. Online Open House July 22, 2015 UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or cls@umuc.edu www.umuc.edu/fedgov 2 UMUC

More information

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings Introduction to Real-Time Labor Market Information Real time labor market information is derived from online job postings. Details included in online job postings can provide information such as the type

More information

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will

More information

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said.

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said. Up-to-Date: Earning the Certs the Market Demands by Eric Vanderburg Certification is an excellent way to enhance your skills and employability, but although everyone wants to move ahead, many lack direction.

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

know school PubliC affairs

know school PubliC affairs know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to

More information

Part-time Graduate Programs in Arts and Sciences and Engineering

Part-time Graduate Programs in Arts and Sciences and Engineering Johns Hopkins University - 2013-2014 1 Degree Programs Degree Programs in Arts and Sciences and See program descriptions for the specific degrees offered. Arts and Sciences Program Major Bachelors Combined

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

TOPIC: University of Maryland, College Park: Master of Science in Information Systems (MSIS)

TOPIC: University of Maryland, College Park: Master of Science in Information Systems (MSIS) BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION, OR DISCUSSION TOPIC: University of Maryland, College Park: Master of Science in Information Systems (MSIS) COMMITTEE: Education Policy and Student

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

IT and Cybersecurity. Workforce Development with CompTIA Certification

IT and Cybersecurity. Workforce Development with CompTIA Certification IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting

More information

TOPSECRETPROTECTION.COM (TSP)

TOPSECRETPROTECTION.COM (TSP) TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Redesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC

Redesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC Redesigning Data System Technology Curricula in the Big Data World IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC Presentation Outline Challenges Phase

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report. April 2009

The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report. April 2009 The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report April 2009 The State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report Executive summary Governments

More information

Cybersecurity Industry Brief

Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Cyber Intelligence Workforce

Cyber Intelligence Workforce Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

M.S. in Computational Finance and Risk Management University of Washington Seattle

M.S. in Computational Finance and Risk Management University of Washington Seattle May 2011 M.S. in Computational Finance and Risk Management University of Washington Seattle Introduction University of Washington (UW) proposes to offer a Master of Science in Computational Finance and

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

Please review current Graduate College policies and procedures.

Please review current Graduate College policies and procedures. Ph.D. Degree Requirements and Procedures Summary of Procedures for Ph.D. Students Complete every deficiency course with a grade of B or higher within the first two terms File an approved tentative program

More information

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

MARYLAND 2011 For a strong economy, the skills gap must be closed.

MARYLAND 2011 For a strong economy, the skills gap must be closed. For a strong economy, the skills gap must be closed. 67% 45% 22% By 22, jobs requiring a career certificate or college degree Skills gap Too few students make it through college. MEMBER Maryland adults

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

MN Space Grant Consortium_2007 Annual Performance Data

MN Space Grant Consortium_2007 Annual Performance Data MN Space Grant Consortium_2007 Annual Performance Data Minnesota Space Grant Consortium Lead Institution: University of Minnesota Director: William L. Garrard Telephone number: 612 626 9295, 612 625 9002

More information

Introduction to NICE Cybersecurity Workforce Framework

Introduction to NICE Cybersecurity Workforce Framework Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,

More information

AGENDA ITEM SUMMARY. SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013

AGENDA ITEM SUMMARY. SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013 Martin O Malley Governor Anthony G. Brown Lt. Governor Anwer Hasan Chairperson Danette G. Howard Secretary AGENDA ITEM SUMMARY SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013

More information

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Software Assurance Competency Model

Software Assurance Competency Model Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University

More information

Journal of Homeland Security and Emergency Management

Journal of Homeland Security and Emergency Management Journal of Homeland Security and Emergency Management Volume 8, Issue 2 2011 Article 9 FUTURE OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT EDUCATION Professional Education for Emergency Managers William

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber

The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber innovation by promoting workforce training, education, and

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

NORTHEASTERN MARYLAND REGION HIGHER EDUCATION NEEDS ASSESSMENT

NORTHEASTERN MARYLAND REGION HIGHER EDUCATION NEEDS ASSESSMENT NORTHEASTERN MARYLAND REGION HIGHER EDUCATION NEEDS ASSESSMENT Submitted to: and the NORTHEASTERN MARYLAND HIGHER EDUCATION ADVISORY BOARD Submitted by: December 5, 2014 NORTHEASTERN MARYLAND REGION HIGHER

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies Job Market Intelligence: Cybersecurity Jobs, 2015 Introduction: Cybersecurity and the Job Market American employers have realized the vital importance of cybersecurity but that realization has created

More information

Cover/Signature Page Full Template

Cover/Signature Page Full Template Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Certificate of Completion in Construction Management School or Division or Location: College of

More information

the school of PUBLIC POLICY

the school of PUBLIC POLICY the school of PUBLIC POLICY at THE SCHOOL OF PUBLIC POLICY AT UMBC The University of Maryland, Baltimore County (UMBC) has been in the vanguard of public policy education and research since establishing

More information

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014 Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber

More information

Employer Insights: skills survey 2015

Employer Insights: skills survey 2015 Employer Insights: skills survey 2015 The Tech Partnership is a growing network of employers, collaborating to create the skills for the digital economy. Its leadership includes the CEOs of major companies

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Associate Director of Business Development/Sales

Associate Director of Business Development/Sales Polytechnic School of Engineering NYU POSITION DESCRIPTION Associate Director of Business Development/Sales NYU Polytechnic School of Engineering has retained KULPER & COMPANY, LLC to advise them in this

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

THE ROAD AHEAD FOR INFORMATION TECHNOLOGY OCCUPATIONS: A Workforce Strategy For Oregon REPORT HIGHLIGHTS

THE ROAD AHEAD FOR INFORMATION TECHNOLOGY OCCUPATIONS: A Workforce Strategy For Oregon REPORT HIGHLIGHTS THE ROAD AHEAD FOR INFORMATION TECHNOLOGY OCCUPATIONS: A Workforce Strategy For Oregon REPORT HIGHLIGHTS September 2003 Prepared by: Scruggs & Associates, Inc. Oregon Council for Knowledge and Economic

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Page 1 of13. (301) 405-0576 kstewart@rhsmith.umd.edu. Robert H. Smith School of Business Katherine Stewart

Page 1 of13. (301) 405-0576 kstewart@rhsmith.umd.edu. Robert H. Smith School of Business Katherine Stewart UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR X New Instructional Program Substantial Expansion/Major Modification Cooperative Degree Program X Within Existing Resources, or Requiring New Resources

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble POSITION SPECIFICATION President Northern Virginia Community College Preamble The Virginia Community College System provides programs and courses of instruction, through the associate degree level, encompassing

More information

Dimensionalizing Big Data. WA State vs. peers. Building on strengths CONTENTS. McKinsey & Company 1

Dimensionalizing Big Data. WA State vs. peers. Building on strengths CONTENTS. McKinsey & Company 1 CONTENTS Building on strengths 1 Printed 2/26/2015 12:55 PM Pacific Standard Time WA State vs. peers Last Modified 3/2/2015 10:17 AM Pacific Standard Time Dimensionalizing Big Data Big Data: big and getting

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Learning Outcomes Assessment for Building Construction Management

Learning Outcomes Assessment for Building Construction Management Learning Outcomes Assessment for Building Construction Management Building Construction Management Learning Outcomes 1. The student is prepared to assume an entry level professional constructor s role

More information

The Technical Management (TM) and Systems. Engineering Programs. Samuel J. Seymour and Alexander Kossiakoff INTRODUCTION PARTNERSHIPS

The Technical Management (TM) and Systems. Engineering Programs. Samuel J. Seymour and Alexander Kossiakoff INTRODUCTION PARTNERSHIPS The Technical Management and Systems Engineering Programs Samuel J. Seymour and Alexander Kossiakoff The Master s of Science programs in Technical Management and Systems Engineering have several unique

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report 2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...

More information