News: 1749821768

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Wanted: Junior cybersecurity staff with 10 years' experience and a PhD

(2025/06/13)


Cybersecurity hiring managers need a reality check when it comes to hiring junior staff, with job adverts littered with unfair expectations that are hampering recruitment efforts, says industry training and cert issuer ISC2.

According to the organization's latest hiring trends study, entry-level and junior job descriptions contain requirements that "are often difficult or impossible for these professionals to meet."

"This can create a catch-22 – where employers struggle to find qualified candidates and early-career talent is locked out of opportunities that could help them build that very experience," it added.

IBM job ad calls for 12 years' experience with Kubernetes – which is six years old [1]READ MORE

"Hiring managers should consider reevaluating their job descriptions and other hiring mechanisms to reflect the true nature of the role, making the distinction between 'nice-to-have' and 'must-have' qualifications clear."

The study showed that more than a third of hiring managers expected early-stage hires to already have advanced certifications such as a CISSP, CISA, or CISM – achievements Dan Houser, a former ISC2 chair now at Oracle, said were unlikely or unfeasible at this level. "This has been a problem for some time, and it seems the battle continues."

[2]

The report also stated that the most pressing skills gaps in the workforce can be filled by early-career cyber professionals who are simply given some on-the-job training coupled with clear development support from their employer.

[3]

[4]

Aside from employers with unrealistic expectations, job seekers should also be prepared to demonstrate their skills in teamwork, problem-solving, and analytical thinking – the three most in-demand (technical and non-technical) skills in all job descriptions.

Only in India are employers valuing technical know-how more highly than interpersonal skills at this level, with cloud security and data security seen as the two most in-demand specialisms in the country, and generally across the world, too.

[5]

A lot has been said about the value of diversity in cybersecurity, both in terms of neurology and education, and those with backgrounds outside of technology or science should not give up hope of entering the industry.

ISC2 said around a quarter of hiring managers who recruit from education programs were able to find valuable cyber talent in those who studied fields outside of cybersecurity, computer science, and IT.

It's true that technical education, previous experiences, and/or the expected basic certs will give candidates a leg-up on the competition for entry-level roles.

[6]

According to the [7]research , 90 percent of hiring managers would only consider candidates with previous IT work experience, and 89 percent said the same about holding entry-level certs.

However, the study noted that successful recruits were also sourced internally from departments such as finance and even non-STEM fields like communications, HR, customer service, and marketing to bring fresh ideas to the table.

So, if a candidate in the comms team starts thinking about a career switch, the way to maximize the chances of securing a job would be to work toward a Security+ cert, which is generally one of, if not the first qualification an aspiring IT pro should pursue.

[8]Cybersecurity not the hiring-'em-like-hotcakes role it once was

[9]You probably have more CIO experience than the incoming White House CIO

[10]Mind the talent gap: Infosec vacancies abound, but hiring is flat

[11]Infosec pros can secure IT, but have harder time securing job satisfaction

It's also one of the most in-demand certs employers are looking out for when assessing entry-level or junior candidates, second only to the CASP+, which is a far more advanced qualification.

"This trend indicates the value that professionals from non-IT backgrounds can bring to the field, offering fresh perspectives, business acumen, technical and non-technical (soft) skills, and innovative thinking to the cybersecurity team," the report stated.

"Hiring strategies that include sourcing candidates from alternative pathways – such as internships, apprenticeships, and non-traditional educational or training backgrounds – can also help strengthen talent pipelines and foster a new generation of cybersecurity professionals from which hiring managers can draw.

"It is more important than ever for organizations to have these tools in place to stay ahead in a profession that demands continuous learning and adaptation."

Job market

Once considered an empty chasm of talent, waiting to be filled, some experts now say cybersecurity has very little demand for generalists.

Industry hiring has been in flux for some years now. From the COVID-19 days of mass recruitment to the economic pressures of the past 18 months making many positions redundant, what used to be a sure-fire bet for a stable career [12]suddenly doesn't seem so safe .

Mary McHale, a careers advisor for UC Berkeley's Master's in Cybersecurity, told The Register that industry players are now looking for specialists in certain sub-fields of cybersecurity.

Recent layoffs have left the job market oversaturated, and with AI products now easily handling basic security tasks like event monitoring, employers are increasingly seeking unique talent, especially in oversight and governance.

While the private sector may not have many problems with hiring top cyber talent at the moment, the same can't be said for the public sector, at least in the UK, where robust pension packages don't make up for the [13]comparatively lackluster salaries . ®

Get our [14]Tech Resources



[1] https://www.theregister.com/2020/07/13/ibm_kubernetes_experience_job_ad/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aExLFIMlQFVNwv6XqlPPrAAAA8U&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aExLFIMlQFVNwv6XqlPPrAAAA8U&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aExLFIMlQFVNwv6XqlPPrAAAA8U&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aExLFIMlQFVNwv6XqlPPrAAAA8U&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aExLFIMlQFVNwv6XqlPPrAAAA8U&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://www.isc2.org/Insights/2025/06/cybersecurity-hiring-trends-study

[8] https://www.theregister.com/2025/03/03/cybersecurity_jobs_market/

[9] https://www.theregister.com/2025/01/28/the_us_governments_new_cio/

[10] https://www.theregister.com/2024/09/11/mind_the_talent_gap_infosec/

[11] https://www.theregister.com/2023/11/02/infosec_pros_burnout/

[12] https://www.theregister.com/2025/01/29/nao_blasts_uk_gov_cyber/

[13] https://www.theregister.com/2025/01/29/nao_blasts_uk_gov_cyber/

[14] https://whitepapers.theregister.com/



Security+

Throatwarbler Mangrove

On a lark, I decided to do a CompTIA Security+ prep course and found it so basic that I skipped right through several modules. Not that I'm particularly interested in security work, per se, but perhaps I should scoop up the certification if it's in such high demand.

Re: Security+

elsergiovolador

If a job description fixates on certificates, it's usually a sign that no one in the hiring pipeline actually understands the role. Expect to work alongside people who bought their certs, memorised multiple-choice answers, or got waved through because HR needed a checkbox ticked.

And if they clock that you’re actually competent? Brace yourself - you’ll get all the work, none of the credit, and probably be told you’re “not a team player” when you burn out from carrying dead weight.

Re: Security+

ecofeco

...or eventfully fired because you're a threat to the favored son and making them look bad.

My philosophy these days is sod it all and let them burn.

Let's be clear

Pascal Monett

Recruitment offer that demands you to be young and highly qualified and experienced at the same time ? What a surprise.

This has been going on for decades already. Companies want to put you to work and pay you peanuts for the priviledge. Everybody knows the stupidity of this, but somehow it keeps on happening.

Re: Let's be clear

Doctor Syntax

I suspect that some of these problems can often be laid at the door of ISO 9000 and its friends and relations.

Scene: Quality manual is being written

Wallah 1. We come to minimum experience need for any job.

Wallah 2. It can't be just anybody. All jobs must be done with somebody with good experience.

Wallay 3. How about 5 years?

Wallah 2. Sounds good to me. Should that be the current version of whatever it is they're using?

Wallah 3. That must be right. In fact current versions of anything should always be used.

Wallah 2. I'll go along with that.

Wallah 1. And me. I'll put that down.

And hence we have a requirement to use stuff which is never more than 2 years old and those needing it need to have been using it for at least 5 years.

Its always

Boris the Cockroach

been this way.

Technology X is released to the public.

5 minutes later the job ads start appearing Senior roles : must have 5 years+ in technology X, junior roles: 2 years experience in technolgy X (plus a master degree in comp science and 5-10 years in a developers role, ideally aged 21 or less)

Cynical? and there me thinking the was my middle name

Re: Its always

b0llchit

The real kicker is that questioning or commenting on the contradictions and impossibilities makes you ineligible for the job. You are marked as "person questions authority" and that disqualifies you immediately.

Re: and that disqualifies you immediately

DJV

Then again, do you really want to work for a company that prides itself in the employment of people who constantly generate such contradictions?

Of course, if the company also has a BOFH with more than 10 years of lift-shaft maintenance, a qualification in applied quicklime along with a sideline in rolled-up carpetry, there may still be hope for the place!

Unfair expectations

abend0c4

Potential employers seem to try it on all the time. But if they're failing to recruit, presumably all those highly-paid HR "professionals" are there to align their candidate requirements with market reality. Or is that an unfair expectation too?

Re: Unfair expectations

steelpillow

Definitely unfair to expect HR staff to do a good job of HR. By failing to recruit, they make the case for more HR staff - an empire under them and a comfortable pension. Oh, and guess who wrote the ticksheet? HR!

Time was...

Tron

...techies were not known primarily for their 'interpersonal skills'. This used to be a sector where you would treasure your ever-so-slightly aspie Linux geeks, even if they want to work at home, in glorious isolation, communicating only with the mothership in Klingon.

But now (outside India) they are seeking clubbable folk with interpersonal skills who yearn to work in teams, excavating the nether regions of server code in a spirit of caring, sharing togetherness. Oh brave new world!

Re: Time was...

Doctor Syntax

Interface layer needed.

Re: Time was...

cookieMonster

Oh god, the horror.

So glad I’m no longer in this field.

Re: Time was...

elsergiovolador

Under UK law, autism is a protected disability - so rejecting someone with ASD for lacking vague “interpersonal skills” that aren’t essential to the job can be grounds for disability discrimination under the Equality Act 2010.

But let’s be honest: corporations don’t want the best minds - they want compliant personalities who smile in meetings, nod through nonsense, and tick HR’s “team player” box. It’s not about ability, it’s about cultural obedience. If you’re brilliant but don’t perform the corporate social ritual, you're out. Because nothing threatens mediocrity like competence without deference.

I have to wonder

Ashentaine

...if at least some of those jobs are ones that were already filled internally but due to regulations they're required to post a public listing, and so set ridiculous or conflicting requirements to keep anyone but the pre-chosen individual from applying.

Re: I have to wonder

ecofeco

You bet a fair percentage are, for sure.

Compliance theater.

Crisis

elsergiovolador

The cybersecurity hiring crisis - where companies want junior staff with senior certs, five years of experience, a spotless record, and the willingness to work for public-sector wages because "pensions". Newsflash: pensions are a 1980s relic. By the time most people cash them out, they'll be half-crippled from stress, redundant by automation, or dead. What exactly is the personal upside here?

Cybersecurity isn’t just a job - it’s a constant arms race. To stay sharp, you pay out of pocket for certs, run your own infrastructure, rent boxes for testing, keep up with threat intel, toolchains, legislation, and whatever AI-generated malware just dropped. Meanwhile, companies treat talent like disposable assets, with layoffs every quarter and HR still wondering why no one’s loyal.

The only reason you still get applicants is because some people genuinely love the work - and they have to eat. But don't mistake desperation for pipeline health. If you’re not paying for training, stability, or respect, don’t be shocked when your “junior hire” ghosts after six months or couldn’t spot a backdoor in a broom closet. You built this problem. You're just mad it's costing you now.

Re: Crisis

Pascal Monett

I have to say that I agree with absolutely everything in your post.

Although I am getting close to pensionable age, so I'd rather it wait a bit longer to become a true relic.

It's no better at senior levels

Anonymous Coward

I spent a few years as security lead for a product that I'd worked on as a developer. I knew the product, the team (dev & QA), had a good idea of where security issues might turn up. It was an interesting and fun job, even the visit to the SVP's staff meeting for a mea culpa after I (and fortunately not a customer) found a serious security issue in a new version that required a stop-ship & new release.

Then came promotion to security head for the wider organisation. I was a sort of policeman for products and teams that I barely knew, and who didn't like an outsider telling them how to 'do' security. I had the experience, but nor the formal qualifications, and getting those was tedious and uninteresting. Some of the products were appalling, some were very solid and secure, but neither liked an 'outsider' supervising them. Soul-destroying work, even with the teams I knew and liked. I stuck it for a couple of years & then left for something that allowed me to look forward to going to work again.

Re: It's no better at senior levels

ecofeco

Yep, once the silos form, it's all over but the shouting.

Competive pay for experience

ecofeco

Offering 60K US and wondering why they got hacked, but for sure they know who to scapegoat.

80K if you're lucky. And no, that is still NOT a lot of money these days.

Re: Competive pay for experience

elsergiovolador

You could make much more as a sparkie. No CVEs, no threat intel feeds, no 3am breach notifications - just stay vaguely up to date on building regs and show up with tools. Can’t work from home, sure, but you also don’t get blamed when a FTSE 100 gets popped because someone reused "Analbeads2023!” as a password.

Re: Competive pay for experience

ecofeco

Yeah, in theory and for sure less stress, but wages are not keeping up in the USA, but actively going down across ALL professions.

When I started work, back in the dawn of prehistory

Neil Barnes

Companies provided training. They had enough smarts to realise that engineers didn't hatch from the egg knowing all they would ever need to know, and that if they provided training not only would they get competent engineers (or weed out the incompetent early) but they would be trained in the way that the company did things and so could be reasonably expected to work in the same way as their colleagues.

The company I chose basically did a three-year on-the-job degree level education with both workplace and formal classroom work; the other companies that offered me work had similar schemes. Even thirty years later, they still offered training although by then it had mutated to the level that if you left within a certain time period, there was a compensatory financial penalty.

Expecting someone else to provide the training for your staff is just plain foolish.

Re: When I started work, back in the dawn of prehistory

ecofeco

Are you saying 28 year old CEOs might not have a clue about things in general?

Someone should tell Meta they might have recently overpaid for one.

Nah, on second thought, let them burn their money.

Well, my daddy left home when I was three,
And he didn't leave much for Ma and me,
Just and old guitar an'a empty bottle of booze.
Now I don't blame him 'cause he ran and hid,
But the meanest thing that he ever did,
Was before he left he went and named me Sue.
...
But I made me a vow to the moon and the stars,
I'd search the honkey tonks and the bars,
And kill the man that give me that awful name.
It was Gatlinburg in mid-July,
I'd just hit town and my throat was dry,
Thought I'd stop and have myself a brew,
At an old saloon on a street of mud,
Sitting at a table, dealing stud,
Sat that dirty (bleep) that named me Sue.
...
Now, I knew that snake was my own sweet Dad,
From a wornout picture that my Mother had,
And I knew that scar on his cheek and his evil eye...
-- Johnny Cash, "A Boy Named Sue"