• No results found

Cyber Security Jobs Report

N/A
N/A
Protected

Academic year: 2021

Share "Cyber Security Jobs Report"

Copied!
51
0
0
Show more ( Page)

Full text

(1)

   

Cyber Security Jobs Report

Release Date

January 8, 2013

Report Sponsors

This report was made possible through the generous support of the Abell Foundation, an organization dedicated to the enhancement of the quality of life in the city of Baltimore and across the state of Maryland. You can learn more about the Abell Foundation at their website, www.abell.org. CyberPoint International, CyberMaryland, Welz & Weisel Communications, and their collective community partners provided additional support.

About the Authors

Organized through the Baltimore Cyber Technology & Innovation Center (CTIC), this report is the result of a collaborative effort between CyberPoint International, CyberMaryland, Welz & Weisel Communications, and their collective community partners.

(2)

   

Table of Contents

Mission

3

Scope the Project

4

Methodology

7

Highlights: Cyber Jobs

13

Highlights: Education and Training

21

Summary

43

Appendix A: Cyber Security Taxonomy

44

Appendix B: The Cyber Jobs Survey

45

(3)

   

Mission

With the dramatic proliferation of computing and communications technologies across the globe, the cyber security industry has experienced unprecedented growth — particularly in the Baltimore metropolitan region. This growth has created an urgent need for qualified individuals to fill current job openings and to develop the skilled workforce necessary to address the expected dramatic job growth in the future.

While there has been a great deal of talk about job growth in the media as well as in industry and

government circles, there are only generalized estimates as to the true number of available cyber security jobs. There is also a lack of consolidated information on the training and educational requirements for obtaining those jobs. The purpose of this project is to shed some light on both of these issues. Our goal for this report was to generate awareness of cyber security jobs in Maryland, including the educational requirements for eligibility (i.e. certifications, two- or four-year degrees, etc.) and the programs available within Maryland to help individuals meet these requirements. While this effort will stand alone as a snapshot in time, we intend to identify a repeatable process such that the results can be updated regularly and periodically and will lead to an on-going cyber security job index based on emerging initiatives and activities.

(4)

   

Scoping the Project

Cyber vs. Cyber Security

The term “cyber” has been applied broadly throughout industry and has evolved to have almost no real meaning. In order to deliver valuable results, it was important to bound this study and define the scope of our project. This starts with defining what the terms “cyber” and “cyber security” mean to us in the context of jobs. Most professionals in the security industry use the term “cyber” as a short form of “cyber security”. When using the term “cyber”, they are not generally referring to Information Technology (IT) or referring more specifically to systems administration, network management, or network administration. Rather, they are referring to the technologies, people, and procedures influencing the protection of information and

information systems. However, those not in the cyber security industry often adopt the term, “cyber”, much more loosely to involve most anything related to IT, software, or any technology or capability that uses 1s and 0s. For the purposes of our study, we specifically considered Maryland programs and positions that support science, technology, engineering, and mathematics (STEM) disciplines in the cyber security industry. This includes positions available in both commercial sectors and government agencies and at all levels of education and training. A main objective of this study was to produce results such that a candidate interested in a certification program or degree program at one of the institutions within Maryland could see how many jobs they will be exposed to after completing such a program. For example, candidate X will know that when he/she completes their cyber security program at Y institution, they will have Z number of jobs for which they qualify to apply. We attempted to identify the numbers and levels of jobs offered throughout the state of Maryland and tie them to the qualifications required. Additionally, the results could be beneficial to job creators, industry and economic leaders, as well as investors and other key cyber stakeholders. The Cyber Security Jobs Report is tailored to job titles and/or roles that support the mission or purpose of protecting data, systems, and infrastructure from unauthorized access, theft, manipulation, or destruction, while maintaining access for authorized users and the effective functioning of essential services. We concede that almost any IT job could serve as a stepping-stone to a cyber security job, just as it could be assumed that any job requiring a security clearance, could serve as a stepping-stone to a cyber security job at one of the federal Intel agencies. However, we based this study on opportunities that serve as a direct path to a cyber security job where purpose determines the role. Additionally, we did not include jobs that are outside a technical STEM field but support the mission of cyber security. We acknowledge positions such as linguist, intelligence analyst, policy maker, and others are abundant in our region and are extremely valuable pursuits in support of the cyber security mission. However, for the purposes of this study, our focus was on

(5)

   

Assumptions

In our efforts to determine Maryland’s true differentiation, if any, with regards to cyber security jobs, there are a few assumptions upon which we relied. IT positions were not considered cyber security opportunities, unless their job roles specifically address security concerns and/or responsibilities, which often was the case in many job listings. It is understood that many small/mid-size businesses often mix roles of IT personnel but larger companies have security teams separate from IT staff. Therefore, we may have discounted some small/mid-size companies that exist in every state that hire one or two system administrators to serve as security personnel. While these jobs exist, they exist everywhere throughout the United States and at a fairly even distribution. Again, it was our goal to highlight what is unique about Maryland as it relates to cyber security.

The organizations targeted for this study included public and private companies, large systems integrators, government agencies, and job placement companies, etc. In scoping this study, we had to consider that many of these organizations might be reluctant to share too much detailed information. It was also necessary to be respectful of their time in order to encourage participation. Therefore, it was important to keep data collection simple and at a fairly high-level in order to yield the best opportunity for the greatest participation. In order to make the numbers as accurate as possible, we also moved away from an initial strategy of allowing target organizations to speculate on future job numbers. An ongoing Cyber Jobs Report will better serve understanding growth in the cyber security job market, and the reality of projections.

Cyber Security Roles

In the area of cyber security, we see the following categories of opportunities within STEM disciplines:

• Analysts • Architects • Developers • Engineers • Executives • Instructors • Interns • Operators • Programmers • Researchers • Sales Engineers

Each of these roles have various educational, certification, and/or level of experience requirements. We considered all levels of roles from chief information security officers (CISOs) to interns; from network security analysts to software security programmers; from security researchers to security software sales engineers. Our objective was to identify and create awareness of all possible avenues into the cyber security field for professionals, practitioners, and entry levels alike.

(6)

   

Cyber Security Educational Requirements

In addition to considering the opportunities available and offered in the state of Maryland, we explored the educational, training, and certification programs throughout the nation. The categories we set out to consider are as follows:

• Work Study Programs • Internships

• Technology Certification Programs (e.g. ITT Institute) • Community College Degree Programs

• 4-Year Degree Programs • Graduate Degree Programs

• Post-Graduate or Doctoral Programs

• Professional Certification Programs (e.g. CISSP) • Other (Specialized Training)

Cyber Security Jobs Reporting

The results of our report were released in two phases. First, a presentation entitled the Cyber Security Jobs Report was delivered at the 2012 CyberMaryland conference. At the conference, the initial findings were shared and the presentation was followed by a question and answer session with expert panelists. The second phase is this report, where our methods and findings are fully documented.

Cyber Security Taxonomy

As the cyber security market evolves, the technology classifications and taxonomies that describe the industry are evolving as well. Based on industry experience and analysis of the marketplace, we made the decision to adopt taxonomy used by the CyberMaryland Map. While opinions can differ greatly on how best to describe the cyber security marketplace, we believe this taxonomy accurately reflects the key product and service classifications existing in all sectors of today’s cyber security industry. At the highest level, we describe industry sectors and then categorize the functions to support each sector. This taxonomy formed the basis of the industry sectors and functions we considered within the jobs search. Below is a list of the high-level industry sectors. The next level including product types is included as Appendix A of this report.

• Critical Infrastructure Protection • Cyber Intelligence

• Cyber Situational Awareness • Data Protection

• Enterprise Security Management • Infrastructure

• Investigative Analysis • Managed Services • Unified Threat Intelligence • Wireless

(7)

   

Methodology

Research, Analysis, and Synthesis

After defining the scope of our project we set out to test our assumptions and taxonomy. This involved a multi-faceted approach where we would research, analyze, and synthesize in an iterative fashion samplings from both online job boards as well as corporate and government websites. During the first phase of this project, we evaluated sample job requisitions for position and education/training requirements, identified related articles on career and education opportunities, investigated relevant studies, and began to consider the technology community that was most prominent in the Maryland region. We used these initial findings to inform our process for creating a survey and to establish a targeted set of corporations and organizations that had a significant presence in Maryland in which to distribute.

Creating the Survey

Armed with the information from our research, we set out to answer the following questions:

• How many cyber security job opportunities exist in Maryland? More specifically, in the Baltimore

area?

• Who is hiring and what types of positions are they looking to fill?

• What education and training qualifications are required to meet these positions?

• Are there opportunities available for those interested in the field right out of high school?

• What resources (Universities, Community Colleges, Institutes, Certification Programs, etc.) exist in

Maryland to support these needs? And what programs do they offer?

• How does Maryland compare to other states?

We created a fairly complex 24-question survey to address the entirety of these questions that is included as Appendix B of this report. Our goal was to identify concrete numbers, which involved detailed questions. We attempted to make this survey as simple as possible and prepared to offer it online through Survey Monkey as well as to deliver it over the phone to targeted constituents. Our next step was to determine the

appropriate target audience that would provide us with the results necessary to get a feel for the majority of jobs offered in the region.

(8)

   

Defining the Target Audience

In order to obtain a representative sampling of the cyber security jobs offered by the major employers in the region we targeted three primary sectors: Government Agencies, the Defense Industrial Base, and Maryland cyber security technology companies.

Government Agencies

The list of major government agencies with a mission focus on cyber security with a heavy presence in Maryland includes the Department of Homeland Security (DHS), Department of Justice (DoJ), Federal Bureau of Investigation (FBI), National Aeronautics and Space Administration (NASA), and the National Security Agency (NSA). These agencies actively recruit for cyber security professionals throughout the nation and are widely known. Additionally, most local universities have some form of a relationship with one or more of these agencies including those universities that have achieved the status of Certified Academic Center of

Excellence in Information Assurance by NSA.

Defense Industrial Base

Due to the high concentration of systems integrators and government contractors that make up the region’s Defense Industrial Base (DIB), we set out to identify and include the major defense contractors. Through our research, we identified a Baltimore Business Journal source that ranked the top 25 defense contractors in Maryland based on contract size - Proctor, C. (2011, October 28). Top of the List: Maryland’s Defense and Federal Contractors, Baltimore Business Journal1. Starting with this list, we pared down and excluded those

that were not focused on the cyber security industry. The resulting list of 17 included: AAI Corp, Arinc, BAE Systems, Boeing, Booz Allen Hamilton, CSC, General Dynamics, Hewlett-Packard, IBM, Johns Hopkins University/APL, L-3 Communications, Lockheed Martin, MITRE, Raytheon, Northrop Grumman, SAIC and SRA.

Maryland Cyber Security Companies

Of course, in Maryland, there are many more high-technology companies with a focus in cyber security beyond the government and DIB. We set out to identify as many Maryland cyber security companies as possible. This effort led us to use three distinct sources to identify the companies we wished to target: first, because of our relationship with CyberMaryland, we were fortunate to gain access to over 70 companies registered within the CyberMaryland Map whose primary focus is cyber security as we defined it – reference Appendix A and the Scoping the Project section of this report; second, through our relationships with the Emerging Technology Center (ETC), UMBC@bwtech Cyber Incubator, Northrop Grumman Cync and CyberHive programs, Chesapeake Innovation Center (CIC), and other incubators and investors, we have first-hand knowledge of most, if not all, of the early stage cyber security companies in the region; and third, we used a recent report published in Inc Magazine identifying the largest cyber security companies in

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     

(9)

   

Maryland — Top Companies in Maryland on the 2011 Inc5000, Inc Magazine2. The complete pared down list

of targeted agencies and companies is included as Appendix C of this report.

Execution

Next, we leveraged the CyberMap contacts list, dug through our resources and researched online sources to identify HR contacts for each of these organizations. As we began to reach out to these targets, we

immediately found a few issues that would have a definite impact on the reliability and accuracy of the survey results. While most of the people to whom we spoke were very supportive and willing to complete the survey, an overwhelming majority wanted to remain anonymous. Additionally, it was clear that the information we requested, which was so relevant to our study results, was just not readily available. Remember, we are conducting this study precisely because organizations do not typically classify their job openings by cyber security so it is not evident how many of these positions are being advertised at any given time. Our initial discussions indicated that it would take months if not an entire calendar year for many of the larger organizations to capture and roll up all of the cyber security job requisitions they had outstanding. We ultimately concluded that the data provided by these candidates would be an estimate and could be misleading. This result was simply not acceptable to us.

Our objective was to get away from the estimates that were bantered about in the industry and leverage actual job requisitions to analyze and support our study. We went back to the brute force tactic of searching job boards and company websites like was done in our initial research phases to assist with defining the cyber security jobs taxonomy. This led us to identify a research partner that would facilitate our searches and resulting tabulations and would provide the scale necessary to produce valuable and reliable results.

Applying STEM to the Study

Our research partner is the chosen job search provider for LinkedIn, MySpace, Plaxo, BusinessWeek, CNNMoney.com, The Washington Post, Mashable, GigaOm, All Things Digital, and thousands of other sites. Rather than tackle this problem with analysts and spreadsheets, we decided to actually apply STEM to our problem. Leveraging their job search engine, we were able to implement our taxonomy into an algorithm that would allow us to get real-time data on actual job requisitions that were currently being offered. This tool allowed us to not only search on cyber security jobs in Maryland, but narrow the search to the Baltimore and surrounding region and compare against the other cyber security hotbeds throughout the nation like Austin, Boston, Palo Alta, San Antonio, and others. This search engine and relationship enabled us to capture data from postings at job boards and company websites across the Internet while implementing an algorithm to ensure multiple listings of the same requisition were only captured and represented once. We would be able to capture metrics based on our searches to include total number of listings, top companies represented and total number of companies providing listings, major job roles, education and training requirements, experience levels, and types of positions (full-time vs. part-time) all broken down by region.

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     

(10)

   

These outcomes were more in line with the goals we set out to accomplish. Real data supported by actual postings rather than assumptions and estimates.

Refining the Taxonomy and Expanding the Search

The initial results and energy that went into creating and initiating our survey proved extremely valuable to the process of implementing the taxonomy into a Boolean logic query algorithm. We established a baseline search for cyber security jobs in Maryland using a combination of forward leaning cyber security keywords such as cyber intelligence, cyber situational awareness, malware, and many others. This baseline search resulted in identifying over 3,000 cyber security jobs representing more than 1,800 employers throughout Maryland. We used this same query to make comparisons across the US, but the numbers seemed disproportional to what we knew about these other cyber security hotbeds. Because these results were not adding up, we took a subset of the jobs postings from each region and dug a little deeper. During this analysis we found that leaving out more traditional network security terms such as information assurance, network security, and others in combination with technology device keywords was to the detriment of these regions’ results. Upon expanding the search to include these terms, the job numbers in these competing hotbeds were magnified exponentially and seemed to even the playing field. With this expanded algorithm in place, our sample set grew to over 340,000 jobs across the nation and almost 20,000 jobs in the Maryland region alone, which made for a better comparison.

Analysis

Once we had a strong baseline of cyber security jobs, we set out to answer the questions cast by our mission. In the survey, we created questions that would lead us to actual data. Within our search results, we had the data we needed at our fingertips; it was just a matter of creating queries to formulate our results. We first established queries that would provide insights into what the industry were looking for in candidates, what qualifications were required, and what positions were sought. While this information was invaluable, making the connection from the Internet world to the physical world was just as important when considering this data.

A regional view is important. With access to the jobs search engine, we had the ability to apply our queries across the 340,000 cyber security jobs across the nation and associate them to cities and states in which they were being offered. This capability allowed us to determine how many jobs were located within Maryland and which ones were within close proximity to Baltimore. We also associated postings in other regions thought to be strong in cyber security to make comparisons to Maryland. Analyzing and

understanding this data at the highest level was critical to answer the questions — Where are the jobs? and just as importantly — Who is offering these jobs?

We designed a query that identified each company and/or government organization that had a posting within our dataset. This yielded over 18,000 companies posting cyber security positions throughout the nation and over 1,800 companies in Maryland alone. The results were representative of just about all of the companies

(11)

   

After compiling the base data set, we conducted deeper analysis of the data to learn what specific job demographics and trends we could highlight. We implemented a query that identified all position titles within each posting and set up a running tally so we could determine the most popular positions. The query initially counted common position titles at different levels as separate counts, but we later refined the results and merged each of them into one common position title. For example, if our original query identified 500 Senior Computer Engineers, 300 Junior Computer Engineers, and 100 Computer engineers, our final assessment concluded there were 900 Computer Engineers for the purposes of comparing common job roles. Of course, there is value in understanding the experience level differences. The experience breakdown is represented later in the results section of this report where we highlight education and experience level demographics.

We specifically evaluated the job position requirements, qualifications and engagement demographics. Our next query highlighted the levels of education required, whether that is a high school diploma, college degree, advanced degree or specialized training. We also looked at levels of experience sought and the types of engagements: part-time, full-time, contract, or internship. We evaluated the positions for

certifications that seemed to be the most popularly suggested as providing an advantage. And there was specific interest in opportunities for those with only a high school diploma.

The following sections highlight our findings. A key point to consider is that our highlights are generated from actual postings across the Internet. There is no common or standardized data field structure adopted by the companies making these postings. They use their own job titles and descriptions. The data fields one company utilizes do not correspond directly to others. So while some provide required level of experience data, others may not. While some call out requirements for certifications, others may not. We did our best to normalize the results, but we can only make comparisons based on the content provided within each posting.

Education and Training

A solid understanding of which cyber security job opportunities are available is just one piece of the puzzle. However, in order for our emerging cyber security workforce to take advantage of these opportunities and in order to position themselves for successful entry into this field, they need to know what resources in

Maryland are available to them to achieve the education and training requirements necessary. Fortunately, Maryland’s academic and training resources rival those of any in the nation. Local universities are dedicated to grow and build curriculum and certification programs to address the regions growing needs. It is difficult to discern whether the high job numbers demonstrate increasing innovation or a difficulty in filling vacancies. It is clear, however, that there is opportunity for those seeking employment and an enormous amount of cyber security activity in the area. We expect this is partly because of the strong presence of the DIB and

government agencies whose missions are finely tuned to the cyber security discipline. Over time, experts expect the need to continue generating supply and graduates and professionals from other regions will relocate to fill these positions.

(12)

   

By reaching out to local contacts and web searches, we collected data and provided a summary of the university, community college, technical institute, and professional affiliate programs focused on cyber security in Maryland for interested prospects to leverage. Highlights are included and documented in the following sections of this report. If your program is not represented or you wish to update or correct any inaccuracies, please feel free to contact us for future inclusion in follow-on reports.

(13)

   

Highlights: Cyber Jobs

Cyber Security Hot Beds with Job Openings

The Internet is full of cyber security job postings sourced by job boards, corporate websites, and various publication listings. The expanse of our research, which was a snapshot in time of the first week in October 2012, includes 340,000 jobs posted by 18,769 companies nationwide.

Based on this nationwide collection, we were able to segment them by region to make comparisons between several regions that are commonly considered hotbeds in cyber security. Figure 1 shows the relationship of the number of cyber security jobs posted in their respective regions. This data considers each city and the 25-mile surrounding area. Baltimore with 13,393 postings, ranks 3rd just behind Palo Alto and

San Francisco, two technical powerhouses, and slightly edges out Boston who sits at 4. The remaining cities have significantly lower numbers, but are still very relevant cyber security regions.

(14)

   

The numbers indicate that the proximity of Baltimore to the National Security Agency, US Cyber Command, defense contractors and emerging companies supporting these agency missions have a significant impact on the region’s cyber security innovation and representation. This presents both opportunity and a challenge. Do these numbers indicate these regions provide the best opportunity? Or do they indicate they are cyber security professional deficient? It would seem to be a strong indicator for individuals interested in gaining employment. But, could it be a concern for a company looking to relocate or start in Maryland? The latter question cannot be adequately addressed without knowing the rate these positions are being filled. We will leave that for a follow-on study. Local universities are well aware of the high concentration of cyber security opportunity in Maryland, in fact fifteen universities have become certified by NSA as Cyber Security Centers of Academic Excellence.

Maryland Companies with the Most Cyber Security Openings

It’s not just agencies in need of cyber security professionals. The government systems integrators and commercial technology companies supporting the cyber security mission in the region are also on the hunt. With 19,413 Maryland job postings considered in this study, we have identified 1,828 companies with job openings in Maryland alone.

Based on the cyber security job postings that were tuned to our queries, we were able to highlight

companies with the greatest number of outstanding hiring requisitions. These results are highlighted in Figure 2 on the next page. It should be of no surprise that 9 of the 10 companies highlighted include government integrators that make up the Defense Industrial Base. The one outlier includes an online cyber security recruitment company, CyberCoders. Additionally, there were 25 companies with over 100 job postings, 50 companies with more than 45 job postings, and over 100 with greater than 20 job postings. The resulting average posting per company is 10.61.

These companies ran the gambit of industries to include: finance, healthcare, telecommunications,

government, retail, critical infrastructure, academia, technology and many others. Tracking cyber security job offerings by industry is another point of interest for a follow-on effort. It would be interesting to identify which industries are contributing most to the cyber security industry and this could certainly be an indicator. Additionally, it would be interesting in a future effort, to be able to dig deeply into the requisitions and apply earning potential and highlight which industry sectors support the highest paying cyber security jobs.

(15)

   

In addition to the companies represented, several Fortune 500 companies offer positions in cyber security. A cross-section of these companies include: Lockheed Martin, Constellation Energy, Marriott International, Coventry Health Care, and Catalyst Health Solutions all located in either Bethesda, Baltimore, or Rockville, Maryland.

We expect the composition of employers outside of Maryland to be very different. Depending on the location, they are less likely to have such a high representation of defense contractors. We also would expect a lower average number of job postings per company and a more diverse set of companies leading to their

respective numbers. This is mainly because outside of government integrators, the largest population of security positions being offered would be from security companies themselves. There are just simply not as high a concentration of cyber security companies, with the size of these integrators, co-located in any particular region as there are defense contractors positioned in the Maryland area. It would be interesting to evaluate and analyze the details related to each alternate region separately in a follow-on study.

Top Maryland Cyber Security Job Opening Positions

Most recognize the typical cyber security positions to include: chief security officer, chief information security officer, network security analyst, exploitation analyst, reverse engineer, and other commonly known

positions. However, within this study, the scope of our definition was open to include all STEM positions supporting the mission of cyber security. Of the nearly 20,000 Maryland cyber security job postings we found that the most common job titles include much more traditional and widely adopted titles. The most popular titles can be seen in Figure 3 on the next page represented in a proportional comparison.

 

(16)

   

While a handful of creative job titles were identified, most align around curriculum offerings of our nation’s academic institutions. Engineering, administration, and analysis disciplines that revolve around both development and operational activities are the heavyweights. We have seen over time that work titles have evolved to be more and more in tune with actual job descriptions like reverse engineer and malware analyst, and the more often these positions are offered, the more likely specific education and training curriculum will be created to support them.

(17)

   

We looked at a cross-section of five (5) cyber security companies based in Maryland. Table 1 shows a summary of each of these companies, the number of cyber security jobs they were posting at the time of our study that aligned with our taxonomy, the most common position titles, and the company’s technology focus. When selecting these companies to profile, we wanted to make sure we covered both product and services as well as companies that target sales to both commercial and government customers. To clarify, this data was retrieved from each companies website. As is evident in just this small sampling, while there are several common words used for job titles, we highlighted 20 unique position titles. This is consistent with what we have seen across the larger data set.

Company Name

# Job Openings

Positions Technology Focus CyberCore

Technologies

90 Database Engineer, Web Analytics Developer, Applications Engineer, Network Engineer

Supply Chain

Management, Secure Network Design, Penetration Assessment SafeNet 28 Senior Systems Engineer, Network Security

Engineer, Software Engineering Specialist, Web Developer

Cloud Security, Data Protection,

Authentication, Encryption Raytheon BBN

Technologies

27 Cyber Security Scientist, Cyber Security Engineer, Software Engineer, Staff Scientist

DoS Triage, Cryptography, Systems Security, Standards Development CyberPoint International

11 Reverse Engineer, Vulnerability Research Analyst, Cleared Programmer, Vulnerability Engineer Malware Analysis, Reverse Engineering, Vulnerability Assessments, IR, CND Lookingglass Cyber Solutions

7 VP of Engineering, QA Engineer, Data Engineer, Senior Internet Security Analyst

Over-the-Horizon Cyber Threat Suppression

(18)

   

Maryland Cyber Security Job Breakdown

Taking a deeper look at the education and experience requirements for cyber security jobs in Maryland revealed that there are more opportunities being advertised for the entry- to mid-level workforce. Of those requisitions reporting education requirements, 76% require a Bachelor’s Degree while only 4% require a Master’s Degree or higher. This is consistent with the understanding that most of the jobs being offered are aligned with Engineering and/or Computer Science degrees of various disciplines and focus. Based on our data, it appears there is a great need for candidates with 0-5 and 10-15 years experience. This could be a sign of investment and innovation in cyber security innovation as this level of workforce is often considered both the heart and mind of innovation. We also see that the overwhelming majority of job postings are for full-time engagements. The relational data can be seen in Figures 4 and 5 and is based on a sampling of the overall data.

Figure  4:  Education  and  Experience  Breakdown

(19)

   

What’s in it for High School Graduates?

While the majority of the opportunities, 83%, call for a Bachelor’s Degree or higher, there certainly are opportunities for high school graduates. These opportunities include internships, work-study programs, cooperative programs, and contract, part-time, and full-time employment. The cyber security field, from its inception, has always been friendly to technical professionals without college degrees. While most advertise degree requirements, many positions, from those that are hands-on, network analysts, to those at the highest level, CISO, will take the most qualified individual. A rule of thumb in the industry is that 4 years of experience will account for a 2-year degree equivalency and 8 years will account for a 4-year degree equivalency. The cyber security field grew out of the information technology field, which has always been heavy with self-taught and trained, skilled professionals and technicians.

The majority of jobs offered to high school graduates were established internships that require a path to a degree. However, Figure 6 includes a list of 10 order ranked positions that had the requirement of a high school diploma and not a college degree.

Professional Certifications are Important to Some

Certification programs for Information Assurance have been around since the late 90s and early 2000s. Some have been more widely adopted than others. Based on our research, approximately one-third (1/3) of the requisitions included a certification requirement and/or preference. Based on our data, we have broken these certifications into tiers based on popularity. Popularity is determined by how often each shows up in job requisitions with Tier 1 being the most popular and Tier 3 being the least popular. A breakdown of these tiers can be seen in Table 2 on the next page.

(20)

   

Popularity Level 1000s of Requisitions 100s of Requisitions 10s of Requisitions Tier 1 CISSP

Tier 2 CAP, CISM, SSCP

Tier 3 GIAC, ISSEP, GSLC

Those interested in these certifications should refer to the below information:

The International Information Systems Security Certification Consortium (ISC2) offers an entry-level credential

called the Systems Security Certified Practitioner or SSCP. The SSCP leads directly to the most popular and most prevalent mid-tiered certification — the Certified Information Systems Security Practitioner (CISSP). ISC2 also offers the Information Systems Security Engineering (ISSEP), which was developed in conjunction

with the National Security Agency (NSA) for engineers responsible for incorporating security into project, applications, business processes, and information systems. And finally, the Certified Authorization Profession (CAP) certification is also issued by ISC2 and is for practitioners responsible for establishing processes to

access risk and establish security requirements and documentation. Visit www.isc2.org for more information on CISSP, SSCP and CAP.

The Global Information Assurance Certificate (GIAC) is offered by the Systems Administration and Network Security (SANS) Institute and is thought to be one of the more hands-on certifications. SANS also initiated and manages the GIAC Security Leadership Certification (GSLC) which accredits individuals who manage IT projects. Visit www.giac.org for more information on GIAC or GSLC.

The Information Systems Audit and Control Association (ISACA) offers a certification for information security managers known as the Certified Information Security Manager (CISM). To test for this certification requires a candidate have at least five years experience in information security and another three years in information security management. For more information on the CISM, visit www.isaca.org.

(21)

   

Highlights: Education & Training

Education and Training Opportunities Available in Maryland

The resources for cyber security education and training in the Maryland area are vast and include

universities, community colleges, research centers, learning centers and training institutes, as well as K-12 programs. In this section, we will highlight several of these opportunities.

The National Security Agency, located at Ft. Meade, MD, hosts a program called the National Center of Academic Excellence (CAE) in Information Assurance. This program is intended to be a deeply technical, inter-disciplinary, higher education program based on computer science, computer engineering, and electrical engineering; with extensive opportunities for hands-on applications via labs and exercises. This program’s certification requirements are intensive.

Maryland leads all states with 15 colleges fulfilling the criteria for Certification as an NSA CAE with Texas close behind with 12. For a comparison of the states with the greatest number of certified colleges, see Figure 7.

(22)

   

NSA CAE Universities in Maryland

• Bowie State University

• Capitol College

• Johns Hopkins University • Towson University

• United States Naval Academy

• University of Maryland, Baltimore County • University of Maryland, College Park • University of Maryland University College

NSA CAE Community Colleges in Maryland

• Anne Arundel Community College • College of Southern Maryland • Hagerstown Community College • Harford Community College • Montgomery College

• Prince George’s Community College

• The Community College of Baltimore County

K-12 Programs

The NSA works closely with local elementary, middle, and high schools through several programs including the Math Education Partnership (MEPP), Partners in Education Program, High-School Work Study Program and STARTALK initiatives. For more information on these programs, visit

www.nsa.gov/academia/early_opportunities.

Maryland Universities, Community Colleges, and Technical Institutes Offering Four-Year

and Post-Graduate Degrees, Two-Year and Certificate Programs, and Professional

Development Certificates

In efforts to provide some clarity and insight into what our local education and training resources offer in the way of cyber security, we have documented some highlights of the programs offered by each of the schools that have a designation of CAE from the NSA. Our hope is to provide a one-stop shop for interested parties to get a high-level summary of the unique and common offerings available in Maryland.

(23)

   

Bowie State University

Bachelor of Science

Computer Science Computer Technology

Management Information Systems

Mathematics – Pure Math, Applied and Computational Mathematics, Mathematics Education, Dual Degree Mathematics/Engineering

Master of Science

Computer Science Information Systems

Information Systems with a Concentration in Information Assurance

Doctorate Program

Computer Science

Post-Baccalaureate Certificate Program

Computer Science Information Assurance

Areas of Study

Intelligent agent-based computing, semantic Web technologies, software engineering/software structures, healthcare informatics, information assurance, e-Commerce and e-business technologies, product integration and process improvement, database systems, data warehousing and mining, business intelligence and decision support systems, enterprise information systems, digital business systems and security, project management, and human-computer interaction and collaboration.

(24)

   

Capital College

Associate of Science

Computer Engineering Technology Electronics Engineering Technology

Telecommunications Engineering Technology

Bachelor of Science

Computer Engineering

Computer Engineering Technology Computer Science

Electrical Engineering Information Assurance

Electronics Engineering Technology Management of Information Technology Software Engineering

Telecommunications Engineering Technology Web Development

Master of Science

Computer Science Electrical Engineering Internet Engineering Information Assurance

Information and Telecommunications Systems Management

Doctorate Program

Information Assurance

Post-Baccalaureate Certificate Program

Client/Server and Wireless Devices

Component Technologies and Online Collaboration Information Assurance Administration

Information Technology Network Protection

(25)

   

Prep for CompTIA Security+, SSCP certifications

Undergraduate Certificate Programs

Computer and Network Security Object-Oriented Programming Programming and Data Management Space Missions and Operations Specialist Software Engineering

Website Development

Online programs (BS, MS, and Online Experience Classes)

Information Assurance

Management of Information Technology

Critical Infrastructure and Cyber Protection Center Professional Development for Technical Managers

Certificate Program

Cyber intelligence FISMA

Homeland Security

Identify, Credentials & Access Management Industry Certification Preparation (CISSP)

National Information Assurance Training Standards

Resources

(26)

   

Johns Hopkins University

Bachelor of Science

Computer Science

Electrical and Computer Engineering Concurrent Bachelor’s/Master’s Program

Master of Science

Computer Science

Computer Science with Telecommunications and Networking Option Computer Science with a Concentration in Bioinformatics

Information Assurance

Information Systems Engineering

Opportunity to concentrate in information security, distributed systems, knowledge management, software systems, networking, information systems management

Dual Master’s Program

Post-Baccalaureate Certificate Program

Computer Science Information Assurance

Post-Master’s Certificate

Computer Science and Information Systems Engineering

The program offers two areas of concentration, which can be combined to meet your individual interests. These include networks, which focuses on protecting information assets from network-based intrusion and from attacks that are primarily focused on remote exploitation of protected systems; and systems, in which attacks are explored from within the system boundary, with an emphasis on platform, operating systems, and secure software development. All students have access to our extensive computing facilities, which are supported by a variety of software systems, applications, development tools, and specialized labs.

Information Security Institute

A Master of Science in Security Informatics degree represents Johns Hopkins University’s core cybersecurity offering. Over thirty courses are available in support of this graduate program. Over 15 full-time, part-time, or adjunct faculty are available to deliver these courses at multiple sites spanning the Homewood campus in northern Baltimore, the medical and health facilities in eastern Baltimore, the part-time graduate program operations at APL and the Montgomery County campus, and the SAIS and KSAS facilities in Washington, D.C.

(27)

   

Towson University

Bachelor of Science

Computer Science

Computer Science and Mathematics

Computer Science and Mathematics with Security Track Pure Mathematics

Applied Mathematics

Actuarial Science and Risk Management Information Systems

Combined Major in Information Systems and Business Administration Combined Major in Information Systems and E-Business

Information Technology

Master of Science

Computer Science Computer Security e-Commerce Software Engineering MS Information Technology

Doctorate Program

Information Technology

As a graduate student in Towson’s IT doctoral program, students develop advanced research skills while learning supplementary practices of modern technology. Students are given a comprehensive knowledge of the fundamentals in four of the following five areas: computer science fundamentals (data structures, algorithms, and operating systems), database systems, computer networks, software engineering, and information technology. Students who complete the program leave will be prepared to conduct and present scholarly research.

(28)

   

Online Courses

Master of Science

Applied Information Technology

Integrated Homeland Security Management

• the research, development and analysis of security strategies; • critical agency infrastructures and their inter relationships; • team leadership and cooperative planning; and

• formulating and executing integrated, rapid responses to crisis situations.

Post-Baccalaureate Certificate

Security Assessment and Management

5-course interdisciplinary program to provide an applied graduate education for personnel working in various areas of homeland security, risk protection and management, emergency response, and crisis

communications.

Areas of Study

• Database Management Systems - Design and develop database systems and learn to manage

a large database system.

• Information Security and Assurance - Implement and support computer-based information

systems with a focus on securing information.

• Information Systems Management - Learn information systems processes and understand the

central function of technology in managing organizational processes and achieving objectives.

• Internet Application Development - Create and apply the latest information systems

capabilities for the Internet.

• Networking Technologies - Develop and implement the design requirements of a successful

networked environment.

• Software Engineering - Study, design, develop, implement and support computer-based

(29)

   

US Naval Academy

Bachelor of Science

Computer Engineering Computer Science

Upper class computer science majors may engage in independent study, or participate in summer internships with the National Security Agency, the Defense Information Systems Agency, or the Naval Research Labs. Annually, a select group of computer science majors participate in the Service Academy Cyber Defense Exercise. Several midshipmen acquire majors in both computer science and information each year.

Computer science graduates can be selected into the highly competitive Information Professional (IP) or Information Warfare (IW) career field options. IP officers harness technology, information and knowledge to ensure battlespace dominance and IW officers conduct offensive cyber warfare operations. Software engineering and other computer science related fields are one of the fastest growing industries in the United States. A degree in computer science can lead to a highly successful career in the Navy and Marine Corps, or in the government and private sectors.

Information Systems Mathematics

Electrical Engineering

A number of summer internships with organizations such as the National Security Agency and the Naval Research Laboratory provide the opportunity to work with scientists on improving the design,

(30)

   

University of Maryland

Baltimore County

Bachelor of Science

Computer Engineering, Electrical Engineering Computer Science and Information Systems Cybersecurity

Mathematics

Master of Science

Computer Engineering, Electrical Engineering Computer Science and Information Systems Cybersecurity

Mathematics

Doctorate Program

Computer Engineering, Electrical Engineering Computer Science and Information Systems Cybersecurity

Mathematics

Post-Baccalaureate Certificate

Cybersecurity Strategy and Policy

Undergraduate Certificate

Auditing for Information Systems Network Administration

Project Management for Information Systems Web Development

(31)

   

University of Maryland, College Park

Bachelor of Science

Computer Engineering Computer Science Electrical Engineering Information Systems Mathematics

Master of Science

Computer Engineering Computer Science Electrical Engineering Information Systems Mathematics

Doctorate Program

Computer Engineering Computer Science Electrical Engineering Information Systems Mathematics

(32)

   

University of Maryland University College

Bachelor of Science

Computer and Information Science Computer Networks and Security Computer Science

Cybersecurity Homeland Security

Information Systems Management

Master of Science

Cybersecurity Cybersecurity Policy

Digital Forensics and Cyber Investigations Information Technology: E-Business Technology Management: E-Business

Information Technology: Homeland Security Management Information Technology: Information Assurance

Management: Homeland Security Management

Technology Management: Homeland Security Management Information Technology

Management: Information Systems and Services

Technology Management: Information Systems and Services Management: Intelligence Management

Information Technology: Software Engineering

Information Technology: Telecommunications Management

Online Programs

Cybersecurity

Information Assurance

UMUC offers a Bachelor of Science in Cybersecurity, Bachelor of Science in Computer Networks and Security; an undergraduate minor in cybersecurity; Master of Science programs in Cybersecurity, Cybersecurity Policy, and Digital Forensics and Cyber Investigations; and five graduate certificates. All programs are available entirely online.

(33)

   

Anne Arundel Community

College

Associate of Science

Computer Science Transfer Computer Information Systems Management Information Systems Game and Simulation Programming Computer Engineering Transfer Electronics Technology

Associate of Applied Science

Database Administration

Personal Computer Systems Technology Programming/Analysis

Information Assurance and Cybersecurity Information Assurance and Cyber Security Information Assurance and Cyber Security Cyber Forensics Option

Computer Network Management

Computer Science: Internet and Mobile Device Software Development

Certificate Program

Network Security

CISCO Certified Network Associate Cyber Forensics

Server Administration and Security Cyber Forensics

Database administration certificate Personal Computer Specialist

• Electronic Office

• Microsoft Office Certification • Help Desk Specialist

• Personal Computer Technician

Scientific Programming Options Computer Network Management Unix/Linux System Administrator

Internet and Mobile Device Software Development Publication Design on the Internet

(34)

   

Letter of Recognition

Database Administration Office Applications Specialist Network Operating Systems

(35)

   

College of Southern Maryland

Associate of Science

Computer Science Career opportunities

Software engineer, computer systems engineer,

systems programmer, systems analyst, computer scientist

Associate of Applied Science

Computer Information Systems Information Services Technology

Information Services Technology: Microsoft Certified Windows Network Administrator Information Services Technology: Web Developer

Information Systems Security Career opportunities

Information systems manager, systems analyst, business information systems designer, business information systems developer, business information systems project manager, information analyst, project analyst

Certificate Program

Electronics Technology

Electronics Technology: Communications Electronics Technology: Microprocessor Information Processing

Information Services Technology Web Developer

BootCamps

CISCO Certified Networking Associate A+ Certification Network+ Certification Security+ Certification CISSP ITIL V3 Foundations

Seminars

Security Wireless Networks Securing Mobile Technologies Virtualization and Cloud Computing

(36)

   

Hagerstown Community College

Associate of Science

Cybersecurity Computer Science

Associate of Applied Science

Cybersecurity

Computer Forensics Concentration, Information Systems Technology Computer Support Specialist, Information Systems Technology Network Administration, Information Systems Technology

Simulation and Digital Entertainment, Information Systems Technology Web and Multimedia Technology

Certificate Program

Advanced Network Security, Cybersecurity Cisco CCNA Prep, Cybersecurity

Network Security, Cybersecurity Desktop User Specialist

Network Administration Small Business Technology Web/Multimedia Development

Areas of Study

Major areas of study include network fundamentals, ethics, penetration testing, computer forensics, and operating systems. Students who plan to transfer to a four-year program should identify an intended transfer institution as early as possible and complete appropriate courses. Students should always confer with advisors and transferring institutions for specific requirements as these are subject to change.

(37)

   

Harford Community College

Associate of Science

Computer Science

Information Systems Management

Associate of Applied Science

Computer Information Systems

Information Assurance and Cybersecurity

Certificate Program

Programming Software UNIX

Information Assurance and Cybersecurity

Areas of Study

Students will complete courses in Information Science, Introduction to Business, Information Systems Security, Network Security, Computer Operating Systems, Windows Server Operating System, Strategic Infrastructure Security, Network Defense and Countermeasures, and Project Management.

(38)

   

Montgomery College

Associate of Science

Information Systems Computer Engineering Electrical Engineering Mathematics

Associate of Applied Science

Computer Applications Cybersecurity

Network and Wireless Technologies

Certificate Program

Advanced Network Security

Computer Applications – Database Systems Computer Applications – Information Technology Computer Programming Database Systems Information Technology IT Professional Java Developer Network Engineer

(39)

   

Prince George’s Community College

Associate of Science

Computer Science Mathematics

Associate of Applied Science

Computer Engineering Technology Information Security

Computer Information Systems Information Technology

Certificate Program

A+ Preparation Cisco CCNA Prep

Computer Service Technology Information Security

Information Security Management Computer Graphics

Computer Programming Database Systems

Network Systems Administrator Technical Support

Technical Core Concepts Web Technology

(40)

   

The Community College of Baltimore County

Associate of Science

Computer Science

Information Systems Management

Associate of Applied Science

Network Technology

Information Systems Security

Information Technology – Programming Information Technology – Database Information Technology – Web Technology Mathematics

Certificate Program

A+ Computer Basics Information Technology Technical Skills

CCBC emphasizes technical skills as well as skills to enable our students to articulate and implement thoughts and ideas. Our students can attain certificates in networking and computer- related technologies including Microsoft (MCSA, MCSE), Cisco (CCNA), CompTIA (A+, Network +, Security+), Linux (RHCT) and information technology support.

(41)

   

ITT Tech

School of Information Technology

Bachelor of Science

Information Systems and Cybersecurity Information Systems Security

Data Communication Systems Technology Software Engineering Technology

Project Management

Software Applications Development

Associate of Science

Network Systems Administration

Information Technology - Computer Network Systems

Information Technology - Software Applications and Programming Information Technology - Web Development

Software Development Technology

Online Programs

Bachelor of Science

Information Systems and Cybersecurity Information Systems Security

Project Management

Associate of Science

Network Systems Administration Information Systems Administration Computer Forensics

School of Electronics Technology

Bachelor of Science

Electrical Engineering Communications Technology Industrial Automation Engineering Technology

(42)

   

Associate of Science

Electrical Engineering Technology Computer and Electronics Technology

Computer and Electronics Engineering Technology

(43)

   

Summary

The results of this report have yielded findings that demonstrate the State of Maryland a major player in the cyber security job market, with 19,413 cyber security job openings as of October 2012. Based on our analysis, Baltimore with 13,393 job postings ranks third behind Palo Alto and San Francisco and slightly edged out Boston. These numbers are exciting and offer hope in a time where many industries are experiencing contraction. The cyber security industry seems to be alive and well in Maryland.

Job opportunities for STEM-related prospects are prevalent at all levels of education and experience. To address these urgent needs; Maryland higher education institutions are well positioned and lead the nation in programs certified by the National Security Agency in Cyber Security. The programs with this unique

distinction offer technical and professional certifications, undergraduate and advanced degrees, and cutting-edge research and training opportunities. Partnerships exist with government agencies to introduce cyber security education to K-12 students as well.

Our efforts to quantify these cyber security opportunities are just underway. We look forward to publishing future reports that will enable us to get better clarity around the opportunities, their rate of fulfillment, and any seasonal, event-driven, or time-based trends. We also look forward to provide more comprehensive material on educational programs that are evolving to meet these job requisitions.

(44)

   

Appendix A: Cyber Security Taxonomy

Critical  Infrastructure    

Protection       Infrastructure      

    Control  Systems       Applications       E-­‐Commerce       Cloud  Computing       Energy       Database  Management  

    Finance       Facilities  

    ISP       High-­‐speed  Computing  

    SCADA       Virtualization  

    Telecom   Investigative  Analysis      

    Utility       Attribution  

Cyber  Intelligence           Cyber  Terrorism  

    Global  Threat  Intelligence       Fraud  and  Economic  Crime       Exploitation  Techniques       Forensics  

    Operations   Service      

    Vulnerability  Discovery       Accounting  Compliance   Cyber  Situational  Awareness           Analysis  

    Continuous  Monitoring       Contracting         Cyber  Threat  Suppression       Finance       Data  Fusion,  Aggregation,  Visualization       Integration       Distributed  Security  Solutions       IP  Protection       Extended  Enterprise  Monitor-­‐ing       Legal  Compliance       Supply  Chain  Risk  Manage-­‐ment       Liability  Protection   Data  Protection           M&A  

    Identity  Management       Operations       Display  Security       Risk  Management   Enterprise  Security  Man-­‐

agement           Software  Assurance  (Insurance)       Deep  Packet  Analysis       Venture  

    Forensics   Unified  Threat  Intelli-­‐gence      

    IPS  /  IDS         DNS  Monitoring       Network  Event  Monitoring  and  Analysis  –  SEM       BGP  Monitoring       Policy       Phish  Monitoring       Privilege  User  Monitoring       Malware  Monitoring       Third  Party  Oversight   Wireless  Security      

(45)

   

 

(46)

   

(47)

   

References

Related documents

The Department of Electrical and Computer Engineering offers the Bachelor of Science in Electrical Engineering (BSEE) and a joint program with the School of Computer and

4.30 How do the employees in hotel industry at Temerloh, Pahang Darul Makmur perceived their

Computer Science and Engineering  College of Engineering  The Ohio State University.. Security:

Although many of the requirements collected from network operators, service providers (e.g. emergency response organizations) and users relate to national public policies

Description:- This is the Home page of user ,Admin and Visitor.. Description:- in this page visitor serch the bus details Visitor

We propose that the solution is a return to the basics of impact assessment with a call for increased integration around the goal of sustainable development, and focus through

lose lost lost 1.elveszít valamit (versenyt is) 2.elhagy valamit make made made csinál, készít valamit. mean meant meant 1.valami jelent

Minor in Mechanical Engineering Students pursuing a Bachelor’s degree in Aviation Science, Mathematics, Computer Science, Physics, Electrical and Computer Engineering, and

Bachelor of Science in Architectural Engineering Bachelor of Science in Chemical Engineering Bachelor of Science in Civil Engineering Bachelor of Science in Computer Engineering

Effects of dietary supplementation with sea buckthorn (Hippophaë rhamnoides) seed and pulp oils on fatty acid composition of plasma lipids in patients with atopic dermatitis

1) L’anàlisi del context territorial dels pobles de Mariola, englobant-los en un context més ampli on s’introdueixin les capçaleres comarcals, així com la

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or

The School of Computer Science and Engineering has two academic programs: Bachelor of Engineering of Information Technology in Computer Science and Bachelor of Engineering

The College offers a five-year Bachelor of Science and Master of Science BS/MS degree program in Architectural Engineering, Biomedical Engineering, Civil Engineering, Computer

The program educational objectives of the Bachelor of Science in electrical engineering (BSEE) program in the Department of Electrical Engineering and Computer Science (EECS)

If the number of bird-digested seeds is accurate in the above results, this poses potentially negative consequences for tawa regeneration as uncleaned seed generally have a

If we handle your email tra ffi c, we will also ensure spam so ft ware is up to date and protec ti ng your website from automated spam.... Backup [30mins - 1hr

To solve the inverse problem and evaluate the desired parameters, global optimization methods are used: genetic algorithm, particle swarm method, and simulated annealing.. A

Do skupiny miest prístupu na internet môžete napríklad prida ť miesta prístupu bezdrôtovej siete LAN (WLAN) a paketového dátového spojenia a túto skupinu potom použi ť

The model of ITO outcomes includes independent variables associated with transaction attributes, relational and contractual governance, client and provider

Analysis of CrtJ binding sites in vivo using ChIP-seq also surprisingly reveal that CrtJ is bound to many targets under both aerobic and anaerobic photosynthetic conditions.. This

The reform of corporate governance is a worldwide phenomenon. In the last decade India has engaged in an ambitious series of reforms. In order to better understand the context

The non-recurrence of adverse prior accident year claims development, a net risk margin release, the medical malpractice reinsurance transaction and a lenders’ mortgage insurance