Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    IT Security Jobs Go Mainstream

    Written by

    Deborah Rothberg
    Published October 19, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      IT security, once a subject of interest to a narrow group of techies and niche publications, has in the last year catapulted into mainstream media focus.

      On a tide of widely covered data breaches, laptop thefts and complex malware tactics—some of which require no user intervention whatsoever—general public interest is beginning to reflect what IT pros have long known: Securing networks is a daunting task.

      Those reports have also sent a bolt of fear into IT departments, many of which lack confidence that they could contain a large-scale security compromise.

      Its not just about securing desktops and laptops, but securing every memory stick device, mobile technology and user that may touch and unknowingly—or worse, knowingly—infect a network.

      For every office PC with a USB outlet awaiting a device connection, every remote worker who jumps on an insecure Wi-Fi network, and every piece of phishing-based e-mail enticing users to click, there is a potential security breach, virus, or resource-draining spyware program that could be lurking.

      For example, Apple on Oct. 18 revealed that it mistakenly shipped a small inventory of iPods with Windows viruses.

      Imagine if you had plugged one in to your system?

      “While our number of overall job listings on Dice.com are up 20 percent from this time last year, theyre up 30 percent in the area of IT security,” Ed ONeill, director of technical services at Dice.com, a New York-based job site for technology professionals, told eWEEK.

      eWEEK spoke to a range of professionals, from those on the recruiting side to long-term security technologists, to get a sense of whats changing for the role and responsibilities of the IT security professional these days. Below, trends that stand out.

      Shift from exterior to interior

      Three years ago, the biggest security concern was viruses sneaking into networks. More recently, however, theres been a shift in focus to stopping data from exiting the network. Those widely covered data breaches have not just the public panicking, but IT professionals as well.

      A recent study by the Elk Rapids, Mich.-based privacy management research company Ponemon Institute found that only 37 percent of IT professionals believed their company would be effective in detecting data breaches.

      “Security 1.0 was all about fundamentals—firewalls [and so on]. As the market has matured, however, theres less focus around infrastructure, more about data and customer relationships,” said Jim Lanzalotto, vice president of strategy and marketing at Yoh Services, a provider of talent and outsourcing services based in Philadelphia.

      The rise of CISSP

      Considered one of the premiere information security certifications, the CISSP (Certified Information Systems Security Professional), a vendor-neutral certification governed by the International Information Systems Security Certification Consortium, or (ISC)², has shown steady growth over the last several years.

      “In any high-level security job, you need your CISSP, and youll see them often among mid- to senior-level IT security professionals. We call this a center of the circle skill set,” said Matt Colarusso, national recruiting branch manager for Sapphire Technologies, a provider of IT staffing solutions in Woburn, Mass.

      Yet the CISSP is not without its critics, many of whom argue that passing the exam doesnt necessarily attest to acumen in staving off threats. All the same, half of security professional job openings request these letters after a name.

      “CISSP-certified professionals represented 50 percent of the openings for network security in Silicon Valley, New York and Washington, D.C., on Dice,” said ONeill.

      Next Page: Resiliency: Not if, when.

      2

      Resiliency: Not if, when

      As network security has matured, so has the outlook of many weathered IT departments, which now no longer presume that they will always be able to protect their networks from the next evil-doer. Instead, a greater focus is on not only protection, but also recovery.

      “The trend I see in IT security is in finding the highest impact areas, figuring out how to close those holes, and a move toward security as resiliency. There is an understanding that we know were going to get attacked, but how will we recover? This is a big trend,” Ross Brown, CEO of Aliso Viejo, Calif.-based eEye Digital Security, a developer of endpoint security and vulnerability management software solutions, told eWEEK.

      In job interviews, techies are increasingly questioned about not only what they know how to secure, but also how well they can recover a failed effort. Network downtime is lost money for a business, and each company wants to know how its next IT pro can put a cap on this damage.

      “When IT security pros are interviewing, theyre getting asked not just what they have done to prevent intrusions, but what they did after, understanding that its often more a matter of when than if,” Katherine Spencer Lee, executive director of Robert Half Technology, based in Menlo Park, Calif., told eWEEK.

      Embedding of security into all IT jobs

      While the largest corporations will always have dedicated security teams, the smaller to midsize organizations increasingly need their IT department to be full of technology everymen: manning the help desk, database backups and security upgrades.

      “IT security is becoming so pervasive that its now part of everybodys job. If youre a programmer, even if it doesnt have to do with network security or passwords, its still a big part of your job,” said Lee.

      Solid security knowledge and experience, once considered a bonus within a candidate, is now considered non-negotiable.

      “Ten years ago, you were either a help desk worker or a network administrator. Now, most positions require security experience. The world of IT gets hit with threats everyday… any company sharing any sort of information has to have someone doing security in their company,” said Colarusso.

      Smart guys think ahead

      Two of the fastest-growing job areas in IT security are in penetration testing and security analysis, both of which place emphasis on looking into a metaphorical glass ball and anticipating the biggest risks.

      “If you look at the most sought-after skill for someone in the security area to have, it would be a security analyst. This person performs risk assessment on enterprisewide networks, gathers information and assigns risk values,” said Colarusso.

      Many argue that the current biggest enterprise security risks are in wireless threats, from PDAs to mobile phones to the laptops of remote employees. Any device that syncs the desktop with a network can set out a welcome mat for the bad guys, IT pros argue.

      “We are seeing multiple reports of data being lost on laptops,” said Paul Davis, a Boston-based IT security strategist. “Who has started worrying about all of those PDAs and mobile phones being left in the back of taxis and airplanes?”

      Check out for the latest news, research and commentary on IT careers.

      Deborah Rothberg
      Deborah Rothberg

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×