{"id":880,"date":"2022-06-14T06:42:44","date_gmt":"2022-06-14T05:42:44","guid":{"rendered":"http:\/\/articles.acdev.co.uk\/articles\/?p=880"},"modified":"2024-07-23T11:22:02","modified_gmt":"2024-07-23T10:22:02","slug":"cyber-security-jobs-why-are-more-firms-recruiting-hackers","status":"publish","type":"post","link":"https:\/\/www.agencycentral.co.uk\/articles\/cyber-security-jobs-why-are-more-firms-recruiting-hackers\/","title":{"rendered":"Cyber security jobs: why are more firms recruiting hackers?"},"content":{"rendered":"\n<p>Tell me, what do you think about when you read &#8216;<strong>cyber security&#8217;<\/strong>?<\/p>\n\n\n\n<p>Dark clothed anarchists hunched over laptops? Matrix digital rain? Annoying antivirus updates?<\/p>\n\n\n\n<p>These are just the tip of the cyber security iceberg, a sector that has picked up significant momentum over the last decade.<\/p>\n\n\n\n<p>Of course, this has been matched by&nbsp;<strong>recruitment growth<\/strong>, with employers increasing their hiring efforts in an attempt to protect themselves from system attacks.<\/p>\n\n\n\n<p>But just&nbsp;<strong>what exactly is cyber security<\/strong>&nbsp;and what is the current state of<strong>&nbsp;<\/strong><a href=\"https:\/\/www.agencycentral.co.uk\/agencysearch\/IT\/skills\/security\/information-security.htm\"><strong>recruitment<\/strong>&nbsp;in the information security and&nbsp;IT sector<\/a>?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The cyber security sector: an overview<\/h2>\n\n\n\n<p>Cyber security is a fairly new industry.<\/p>\n\n\n\n<p>While \u2018cyber\u2019 itself has been used as a prefix for more than 50 years, \u2018cyber security\u2019 wasn\u2019t coined until 1989.<\/p>\n\n\n\n<p>Still, the term didn\u2019t really enter popular lexicon until the mid-noughties, but even then was more associated with the military or spy novels.<\/p>\n\n\n\n<p>Times have changed though and the&nbsp;<strong>acceleration in internet connectivity<\/strong>&nbsp;has brought cyber security to the forefront of modern business.<\/p>\n\n\n\n<p>Employers are increasingly becoming aware of the dangers that a connected world can bring and are<strong>&nbsp;turning to recruitment<\/strong>&nbsp;to counteract the problem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the cyber security sector?<\/h3>\n\n\n\n<p>The cyber security sector is concerned with protecting computers (and networks) from damage or unauthorised access. It is a growing field of work that has established a significant presence in response to the&nbsp;rising number of internet-connected devices.<\/p>\n\n\n\n<p>It\u2019s thought that the&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/collections\/cyber-security-export-help\" target=\"_blank\" rel=\"noopener\">UK cyber security sector employs around 100,000 people<\/a>&nbsp;and is worth more than \u00a322 billion to the economy &#8211; increasing at roughly 10% year-on-year.<\/p>\n\n\n\n<p>This mirrors a trend that has seen the worldwide market increase by \u00a3133 billion since 2004.<\/p>\n\n\n\n<p>Job roles can range from risk analysis to information security, but all are ultimately geared towards&nbsp;<strong>safeguarding businesses from cyber attacks<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a cyber attack?<\/h2>\n\n\n\n<p>A cyber attack is exactly as it sounds. It is an attempt to damage, compromise or infiltrate a computer system.<\/p>\n\n\n\n<p>Cyber attacks can be used to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Steal data.<\/li>\n\n\n\n<li>Deny service.<\/li>\n\n\n\n<li>Damage systems.<\/li>\n\n\n\n<li>Blackmail.<\/li>\n<\/ul>\n\n\n\n<p>Not all cyber attacks are malicious though, something we\u2019ll go into a little later on\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The first cyber attack: the Morris worm<\/h3>\n\n\n\n<p>While a need for cyber security has been created by genuine threats, the first notable attack on the internet was actually an accident &#8211;\u00a0<a href=\"https:\/\/limn.it\/articles\/the-morris-worm\/\" target=\"_blank\" rel=\"noopener\">the Morris worm<\/a>.<\/p>\n\n\n\n<p>In 1988, Robert Morris, a college graduate from Cornell University, created a worm (a programme that clones itself and spreads to other computers) in order to find out how large the internet was.<\/p>\n\n\n\n<p>The mistake? Morris had inadvertently instructed the worm to replicate itself more than necessary, causing it to infect a computer multiple times.<\/p>\n\n\n\n<p>It\u2019s been estimated that around 10% of all internet connected systems were brought to a crawl as a result &#8211; the largest attack in history (even if it only equated to 6,000 computers at the time).<\/p>\n\n\n\n<p>It took 72 hours to clear up the virus and Robert Morris became the first person to ever be sentenced according to the computer fraud law.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How many business have been the victims of a cyber attack?<\/h3>\n\n\n\n<p>If you\u2019ve paid any attention to the news recently, you\u2019ll have noticed a number of<strong>&nbsp;high profile cyber attacks<\/strong>.<\/p>\n\n\n\n<p>In May (2017), the&nbsp;<a href=\"https:\/\/www.theguardian.com\/society\/2017\/may\/12\/hospitals-across-england-hit-by-large-scale-cyber-attack\" target=\"_blank\" rel=\"noopener\">NHS became victim of a global ransomware attack<\/a>&nbsp;that impacted GPs and hospitals all over the UK. The attack essentially rendered computer systems useless, with attackers demanding $300 in order to unfreeze documents including patient records.<\/p>\n\n\n\n<p>Just one month later,&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/uk-40394074\" target=\"_blank\" rel=\"noopener\">UK parliament was subjected to an attack<\/a>&nbsp;that saw fewer than 90 email addresses accessed. This, however, was less likely to be a few profiteering hackers and more likely to be a different state (country).<\/p>\n\n\n\n<p>Attacks aren\u2019t just reserved for big names though.<\/p>\n\n\n\n<p>The British Chambers of Commerce (BCC) reported that&nbsp;<strong>one in five UK businesses<\/strong>&nbsp;were victims to a cyber attack last year.<\/p>\n\n\n\n<p>According to the Department of Culture, Media and Sport, there also seems to be a correlation between the size of a business and the number of attacks received.<\/p>\n\n\n\n<p>In their&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2017\" target=\"_blank\" rel=\"noopener\">Cyber Security Breaches Survey<\/a>, 68% of large businesses (250 + employees) had experienced an attack. This is 16% more than the small businesses who were surveyed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recruitment in cyber security<\/h2>\n\n\n\n<p>With attacks (and the awareness of attacks) on the rise, cyber security is the&nbsp;<strong>future of IT recruitment<\/strong>. Businesses are increasingly concerned with protecting their networks, and as such, this is likely to make cyber security one of the most&nbsp;<strong>lucrative sectors for agencies<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What careers are available in cyber security?<\/h3>\n\n\n\n<p>Within cyber security, there are a variety of career paths that a recruitment agency will have to recruit for.<\/p>\n\n\n\n<p>Just some cyber security job titles include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Chief Information Office (CIO).<\/li>\n\n\n\n<li>Risk Assessor.<\/li>\n\n\n\n<li>Security Analyst.<\/li>\n\n\n\n<li>Cryptographer.<\/li>\n\n\n\n<li>Security Software Developer.<\/li>\n\n\n\n<li>Network Security Specialist.<\/li>\n<\/ul>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/publications\/national-cyber-security-strategy-2016-to-2021\" target=\"_blank\" rel=\"noopener\">National Cyber Security Strategy 2016-2021<\/a>, has seen nearly&nbsp;<strong>\u00a32bn invested into stopping cyber attacks<\/strong>&nbsp;in the UK. More money means more jobs &#8211; a fact that has seen a rise in cyber-recruitment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Skills crisis?<\/h3>\n\n\n\n<p>The UK is in the midst of a&nbsp;<a href=\"https:\/\/www.agencycentral.co.uk\/articles\/uk-skills-shortage-a-recruiters-guide\/\">digital skills shortage<\/a>, and unsurprisingly, this extends to cyber security.<\/p>\n\n\n\n<p>The number of advertised vacancies for cyber security jobs is on the rise. Between 2014 and 2016, the&nbsp;<a href=\"https:\/\/www.thisismoney.co.uk\/money\/beatthescammers\/article-4127756\/Britain-severe-cyber-security-skills-gap.html\" target=\"_blank\" rel=\"noopener\">demand for cyber security professionals rose by 32%<\/a>, however the number of related job searches was less than a third of those posted.<\/p>\n\n\n\n<p>This has seen the skills gap grow by 5% in the last two years and leaves the UK with the&nbsp;second largest skills gap&nbsp;in the world &#8211; only ahead of Israel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hackers for hire<\/h2>\n\n\n\n<p>Okay, so why do employers want to hire hackers?<\/p>\n\n\n\n<p>Well, believe it or not, there really are business that actually&nbsp;<em>want<\/em><strong>&nbsp;to employ hackers.<\/strong><\/p>\n\n\n\n<p>I know, I know, this seems kind of counterintuitive. If you want to protect your systems, why openly hire a person who can hack them?<\/p>\n\n\n\n<p>Well think of it this way instead\u2026<\/p>\n\n\n\n<p>If you want to protect your computer systems, why not hire a person who can hack them&nbsp;<em>and<\/em>&nbsp;tell you where your weakness are?<\/p>\n\n\n\n<p>You can apply this thinking to other areas.<\/p>\n\n\n\n<p>If someone&#8217;s telling you how to protect your home (locks, alarm, etc.), you&#8217;d better hope they know how to break into one.<\/p>\n\n\n\n<p>See, there\u2019s method in the madness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ethical vs black hat hackers<\/h3>\n\n\n\n<p>When talking about hackers, it\u2019s important to make a distinction between the different types.<\/p>\n\n\n\n<p>The words \u2018hacking\u2019 or \u2018hacker\u2019 have become synonymous with crime and angry tabloid headlines &#8211; but they\u2019re not all like this.<\/p>\n\n\n\n<p>Hackers can generally be split into&nbsp;<strong>white hat and black hat&nbsp;<\/strong>(although there is also grey hat, blue hat and red hat!).<\/p>\n\n\n\n<p>All you really need to remember is that&nbsp;<strong>white hat are the good guys<\/strong>&nbsp;and&nbsp;<strong>black hat are the bad guys<\/strong>. In other words, white hat hackers build, black hat hackers break\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Bug bounties<\/h3>\n\n\n\n<p>Have you heard about companies<strong>&nbsp;rewarding hackers<\/strong>&nbsp;who can break into their systems?<\/p>\n\n\n\n<p>These rewards, known as \u2018bug bounties,\u2019 are used to&nbsp;<strong>encourage hackers<\/strong>&nbsp;to try and find security weaknesses in an organisation\u2019s computer systems.<\/p>\n\n\n\n<p>From Facebook to Google, some of the biggest companies in the world have a bug bounty program &#8211; with tens of thousands of pounds potentially being paid out at a time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In closing<\/h2>\n\n\n\n<p>There\u2019s no getting away from it, we\u2019re all becoming more connected &#8211; digitally that is. While this has obvious benefits, it\u2019s inevitable that it will also make businesses vulnerable to hackers and online racketeers.<\/p>\n\n\n\n<p>Is recruitment the answer? Well, with more cyber security positions than ever, employers certainly seem to think so.<\/p>\n\n\n\n<p>The challenge for cyber security then, isn\u2019t just holding back the black hats, but also finding a way to tackle a skills shortage which could curtail future growth in the sector.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the cyber security sector, including the history of cyber attacks, what careers are available and whether there is such a thing as an ethical hacker<\/p>\n","protected":false},"author":3,"featured_media":881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/comments?post=880"}],"version-history":[{"count":12,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/posts\/880\/revisions"}],"predecessor-version":[{"id":2285,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/posts\/880\/revisions\/2285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/media\/881"}],"wp:attachment":[{"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/media?parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/categories?post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.agencycentral.co.uk\/articles\/wp-json\/wp\/v2\/tags?post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}