Cyber Security in Delaware


Are you looking for a fast-paced high-tech career that practically guarantees a steady well-paying job? A Georgetown University study estimates that, in Delaware alone, there will be 22,000 additional STEM (science, technology, engineering, and math) jobs in the next six years. The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek. And for every ten cyber security job ads that appear on careers site Indeed, only seven people even click on one of the ads, let alone apply.

Brookings Institution Study

  • Science Technology, engineering and math (STEM) jobs take more than twice as long to fill as other openings.
  • A high school grad with a STEM background is in higher demand than a college grad without such skills.

Cybersecurity Skills Gap

  • Cybersecurity Skills Shortage Organizations now recognize that investment in security is a necessity. Yet with a current estimated 350,000 open cyber security positions in the US, and a predicted global shortfall of 3.5 million cyber security jobs by 2021 — according to Cybersecurity Ventures — the industry clearly has a massive problem regarding supply and demand.
  • Cybersecurity Suffers from Talent Shortage Could there be a better time to pursue a career in cybersecurity? Probably not. With more than one million cybersecurity positions unfilled worldwide, currently-identified security needs couldn't be met if every employee at GM, Costco, Home Depot, Delta and Procter & Gamble became security experts tomorrow, reported the Leviathan Security Group.
  • Cybersecurity Talent Gap Is An Industry Crisis If you’re finding the job market a bit tight these days, you must not be in cybersecurity. As hackers ramp up attacks with increasingly sophisticated methods and tools that are readily available for purchase on the dark web, the "white hats" need all the help they can get. According to recent estimates, there will be as many as 3.5 million unfilled positions in the industry by 2021.
  • What’s causing the cybersecurity skills gap? The proliferation of next-gen technology into mainstream society has been a boon for consumers, entrepreneurs, and business owners alike. Between the rise of mobile computing, the Internet of Things (IoT), and modern social media, our society is more connected than ever before.

Hackers Wanted: An Examination of the Cyber Security Labor Market

  • People who are qualified to do forensics, code-writing, or red-teaming are the hardest to find in today's labor market.
  • Government Employers find it extra difficult to hire cyber security professionals.
  • The increase in education and training opportunities, coupled with the increase in compensation packages, will draw more workers into the profession over time.

Helpful Links

  • 20 Coolest Jobs in Information Security
    From SANS, the 20 Coolest Jobs in Information Security (with job description, why it's cool, how it makes a difference, and how to be successful)
  • CyberSeek Cybersecurity Jobs Heat Map
    Through a partnership between NICE, CompTIA, and Burning Glass, CyberSeek was developed to provide a visual representation of cybersecurity supply and demand across the nation. CyberSeek also features a Career Pathways tool which provides information on different types of positions to help students, job seekers, and workforce trainers visualize career advancement in cybersecurity. The Map and Career Pathway tools both incorporate the job categories, specialty areas, and knowledge, skills, and abilities from the NICE Cybersecurity Workforce Framework.
  • Local Higher Education Programs
  • National Initiative for Cyber Security Careers and Study
    Homeland Security's one-stop-shop for Cyber Security Careers and Studies
  • Scholarships
    Scholarship For Service (SFS) is a unique program designed to increase and strengthen the cadre of federal information assurance professionals that protect the government's critical information infrastructure. This program provides scholarships that fully fund the typical costs that students pay for books, tuition, and room and board while attending an approved institution of higher learning. Additionally, participants receive stipends of up to $8,000 for undergraduate and $12,000 for graduate students. The scholarships are funded through grants awarded by the National Science Foundation (NSF).
  • Secretary's Honors Program
    The Department of Homeland Security's career track program for exceptional college graduates in IT, Cyber, Policy and Law. The site also features information on a new program for students pursuing Associate's degrees.

Gain Experience

  • Capture The Flag (CTF)
    There are a lot of Capture The Flag (CTF) competitions in our days, some of them have excellent tasks, but in most cases they're forgotten just after the CTF finished. We decided to make some kind of CTF archive and of course, it'll be too boring to have just an archive, so we made a place, where you can get some another CTF-related info - current overall Capture The Flag team rating, per-team statistics etc.
  • CSAW MiniChallenges and CyFor Modules
    Modules are hosted by the NYU Tandon School of Engineering. The CSAW High School Forensic Challenge is a rigorous test of cyber forensic knowledge. This area of the CyFor site is dedicated to previous years' challenges. Where possible, evidence has been made available for download, as well as the solutions.
  • Cyber Aces
    SANS Cyber Aces Online is an online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorials, videos, and quizzes. It’s available as open courseware so you can take it anytime. SANS is donating the course from their library of professional development curriculum. And it’s free.
  • Holiday Hack Challenges
    Five years' worth of challenges along with write ups available that make these an in-depth learning tool.
  • Microsoft Virtual Academy
    Microsoft Virtual Academy provides free online training by world-class experts to help you build your technical skills and advance your career.
  • PICOCTF CMU Cybersecurity Challenge
    Game has completed but can still register and play - created by the Carnegie Mellon University's CyLab. A computer security game for middle and high school students. Challenges centered around a unique storyline where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. Challenges set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.
  • Pivot Project
    The Pivot project is a portfolio of interesting, practical, enlightening, and often challenging hands-on exercises for people who are trying to improve their mastery of important cybersecurity skills. The site is a mixture of infosec and digital forensics exercises contributed by professionals, instructors and grad students. Includes answer keys.
  • Practice Python
    Friendly exercise to learn Python. Same creator as the Terminus Game.
  • Terminus Game
    Fun way to learn terminal commands - Terminus game - created by an MIT student at a Hackathon.
  • US Cyber Challenge
    The mission of U.S. Cyber Challenge (USCC) is to significantly reduce the shortage in today’s cyber workforce by serving as the premier program to identify, attract, recruit and place the next generation of cybersecurity professionals. USCC’s goal is to find 10,000 of America’s best and brightest to fill the ranks of cybersecurity professionals where their skills can be of the greatest value to the nation.
  • US Cyber Challenge: Cyber Quest
    Cyber Quests are a series of fun but challenging on-line competitions allowing participants to demonstrate their knowledge in a variety of information security realms. Each quest features an artifact for analysis, along with a series of quiz questions. Some quests focus on a potentially vulnerable sample web server as the artifact, challenging participants to identify its flaws using vulnerability analysis skills. Other quests are focused around forensic analysis, packet capture analysis, and more. The quests have varying levels of difficulty and complexity, with some quests geared toward beginners, while others include more intermediate and ultimately advanced material.