This page contains a Flash digital edition of a book.
CAREER OUTLOOK


by Editors Career Guide TIPS TO LAND ONE OF TOMORROW’S EXCITING NEW JOBS TODAY C


yber security is a rapidly growing field encompassing a multitude of opportunities for STEM professionals. With the numerous cyber threats existing today, organizations have a high demand for information security experts to help safe- guard and monitor their systems. As or- ganizations gravitate toward Web-based applications as solutions to everyday needs, individuals looking to enter the industry, or move upward in their careers, have several options.


Since information security is an up-and-coming field, there are various technology avenues for STEM profes- sionals to explore. The Occupational Job Handbook lists technical specialists as one of the fastest-growing fields and the Bureau of Labor Statistics forecasts the industry to see faster than the average growth of job prospects over the next several years.


Since the security industry is still growing and evolving, in many instances the supply of jobs outweighs the number of eligible candidates, but competition for jobs is picking up. As a result, profes- sional STEM individuals are looking at a variety of ways to find available jobs and get their names visible as job candidates.


Explore Opportunities


One of the initial steps to obtaining employment in the cyber security job niche is to understand industry needs and requirements. This, coupled with the right education, training and knowl- edge, is vital for preparation to enter the security field.


Niche-oriented job search websites contain basic tools that help STEM individuals connect with available jobs. Websites such as ClearanceJobs.com, UsaJobs.com, CareerBuilder.com and Monster.com, are worth exploring as a good jumping-off point to see what areas


60 USBE&IT I WINTER 2010


of information security are in demand. The public sector often has a sub- stantial need for knowledgeable security professionals. For instance, the U.S. De- partment of Homeland Security and the Department of Defense frequently have a high requirement for cyber security experts; in 2010 DHS hosted a virtual cyber job fair seeking to fill up to 1,000 positions with skilled cyber specialists.


Social Media


In addition to job search websites that have sections dedicated to informa- tion security, social media is a useful avenue to explore. Increasingly, STEM professionals are using the innovative strategy of combining traditional and virtual methods to find employment. To obtain a job in cyber security,


or any industry, in order to remain on competitive ground, there is often a level of self-marketing involved. Social media can help fill this requisite. Increasingly, professionals are utilizing social networks for ca- reer management and employing them as tools for both research and


exposure. Networking is traditionally a valuable activity for career management and today’s applicants are connecting in both the offline and virtual environments. LinkedIn is a popular social media website where professionals build an online presence. This website holds value in a variety of ways for those seeking to find a job in specific industries. Individu- als have the ability to build their own online profile and resume, and searches can be conducted for other like-minded individuals already working in the indus- try to see what kinds of specialization, experience, education and certifications are needed. In October 2010, LinkedIn,


in collaboration with PwC US, launched a new tool called Career Explorer. PwC US is one of the largest employers of college graduates in the U.S., and by partnering with LinkedIn, these two companies jointly developed a way to help students plan and build their careers. Career Explorer offers mapping tech- niques using statistical and data-driven insights, lists available job openings, and introduces students to potential mentors and future employers. Twitter and Facebook are two other


social media networks people are increas- ingly turning to for career management. Not only do professionals directly connect with each other and/or desir- able organizations to work for, but many listing agencies are also actively using social media to share industry informa- tion and job availabilities. For instance, ClearanceJobs.com routinely engages on Twitter to share information with fol- lowers about job listings, industry news and/or provide other relevant information. Facebook offers similar interaction by allowing orga-


nizations to establish business profiles. In general, social media encour- ages strengthened relationships, and the virtual tools available today can enhance career associations. Every network has its strengths and weaknesses, and finding the benefits of each and then utilizing the strengths can further augment career possibilities. Establishing a presence on a variety of social networks can act as a gateway to industry information and/or keep informed on the latest news, trends, and forecasts relating to cyber security. Engaging with others who share like interests and goals may be a helpful way to find a desired position. Online


www.blackengineer.com editors@ccgmag.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92