CAREERS

Are you looking for a fast-paced high-tech career that practically guarantees a steady well-paying job? A Georgetown University study estimates that, in Delaware alone, there will be 22,000 additional STEM (science, technology, engineering, and math) jobs in the next six years. The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek. And for every ten cyber security job ads that appear on careers site Indeed, only seven people even click on one of the ads, let alone apply.

Link to Video of why I work in Cyber Security
Why I Work in Cyber Security


Brookings Institution Study

  • Science Technology, engineering and math (STEM) jobs take more than twice as long to fill as other openings.
  • A high school grad with a STEM background is in higher demand than a college grad without such skills.

Hackers Wanted: An Examination of the Cyber Security Labor Market

  • People who are qualified to do forensics, code-writing, or red-teaming are the hardest to find in today's labor market.
  • Government Employers find it extra difficult to hire cyber security professionals.
  • The increase in education and training opportunities, coupled with the increase in compensation packages, will draw more workers into the profession over time.

Helpful Links

  • 20 Coolest Jobs in Information Security
    From SANS, the 20 Coolest Jobs in Information Security (with job description, why it's cool, how it makes a difference, and how to be successful)
  • CyberSeek Cybersecurity Jobs Heat Map
    Through a partnership between NICE, CompTIA, and Burning Glass, CyberSeek was developed to provide a visual representation of cybersecurity supply and demand across the nation. CyberSeek also features a Career Pathways tool which provides information on different types of positions to help students, job seekers, and workforce trainers visualize career advancement in cybersecurity. The Map and Career Pathway tools both incorporate the job categories, specialty areas, and knowledge, skills, and abilities from the NICE Cybersecurity Workforce Framework.
  • Scholarships
    Scholarship For Service (SFS) is a unique program designed to increase and strengthen the cadre of federal information assurance professionals that protect the government's critical information infrastructure. This program provides scholarships that fully fund the typical costs that students pay for books, tuition, and room and board while attending an approved institution of higher learning. Additionally, participants receive stipends of up to $8,000 for undergraduate and $12,000 for graduate students. The scholarships are funded through grants awarded by the National Science Foundation (NSF).
  • Secretary's Honors Program
    The Department of Homeland Security's career track program for exceptional college graduates in IT, Cyber, Policy and Law. The site also features information on a new program for students pursuing Associate's degrees.
  • National Initiative for Cyber Security Careers and Study
    Homeland Security's one-stop-shop for Cyber Security Careers and Studies
  • Local Higher Education Programs
  • IEEE Computer Society
    The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology. Serving more than 60,000 members, the IEEE Computer Society is the trusted information, networking, and career-development source for a global community of technology leaders that includes researchers, educators, software engineers, IT professionals, employers, and students.

Gain Experience

  • US Cyber Challenge: Cyber Quest
    Cyber Quests are a series of fun but challenging on-line competitions allowing participants to demonstrate their knowledge in a variety of information security realms. Each quest features an artifact for analysis, along with a series of quiz questions. Some quests focus on a potentially vulnerable sample web server as the artifact, challenging participants to identify its flaws using vulnerability analysis skills. Other quests are focused around forensic analysis, packet capture analysis, and more. The quests have varying levels of difficulty and complexity, with some quests geared toward beginners, while others include more intermediate and ultimately advanced material.
  • US Cyber Challenge
    The mission of U.S. Cyber Challenge (USCC) is to significantly reduce the shortage in today’s cyber workforce by serving as the premier program to identify, attract, recruit and place the next generation of cybersecurity professionals. USCC’s goal is to find 10,000 of America’s best and brightest to fill the ranks of cybersecurity professionals where their skills can be of the greatest value to the nation.
  • Cyber Aces
    SANS Cyber Aces Online is an online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorials, videos, and quizzes. It’s available as open courseware so you can take it anytime. SANS is donating the course from their library of professional development curriculum. And it’s free.
  • Microsoft Virtual Academy
    Microsoft Virtual Academy provides free online training by world-class experts to help you build your technical skills and advance your career.
  • Capture The Flag (CTF)
    There are a lot of Capture The Flag (CTF) competitions in our days, some of them have excellent tasks, but in most cases they're forgotten just after the CTF finished. We decided to make some kind of CTF archive and of course, it'll be too boring to have just an archive, so we made a place, where you can get some another CTF-related info - current overall Capture The Flag team rating, per-team statistics etc.
  • PICOCTF CMU Cybersecurity Challenge
    Game has completed but can still register and play - created by the Carnegie Mellon University's CyLab. A computer security game for middle and high school students. Challenges centered around a unique storyline where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. Challenges set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.
  • CSAW MiniChallenges and CyFor Modules
    Modules are hosted by the NYU Tandon School of Engineering. The CSAW High School Forensic Challenge is a rigorous test of cyber forensic knowledge. This area of the CyFor site is dedicated to previous years' challenges. Where possible, evidence has been made available for download, as well as the solutions.
  • Pivot Project
    The Pivot project is a portfolio of interesting, practical, enlightening, and often challenging hands-on exercises for people who are trying to improve their mastery of important cybersecurity skills. The site is a mixture of infosec and digital forensics exercises contributed by professionals, instructors and grad students. Includes answer keys.
  • Terminus Game
    Fun way to learn terminal commands - Terminus game - created by an MIT student at a Hackathon.
  • Practice Python
    Friendly exercise to learn Python. Same creator as the Terminus Game.
  • Holiday Hack Challenges
    Five years' worth of challenges along with write ups available that make these an in-depth learning tool.