​LinkedIn data uncovers security skills gap

ICT security professionals are among the most sought after in the information technology sector, a new labour market report based on LinkedIn data has revealed.

The annual report prepared by Deloitte Access Economics, Austraila’s Digital Pulse, for the first time used LinkedIn data to reveal details about the types of ICT roles most in demand and security skills ranked in the top ten.

Previously, said Deloitte Access Economics partner John O’Mahony, ICT employment data was limited to more generic job titles that may or may not have required security skills.

“The Digital Pulse report for 2016 for the first time uncovers the demand for cyber security professionals Australia hasn’t previously known about. Previous research at the state level or the commonwealth level has focused on existing classifications for workers.

Our report for the first time uses real-time data about labour market pressures and developments from LinkedIn to highlight that cyber security is a big IT need for Australia’s workforce,” Mr O’Mahony said.

For instance, in NSW ICT occupations under titles including network engineer and software engineer without revealing whether they security roles.

Australian Bureau of Statistics ICT occupational breakdowns were even more generic dividing the industry into six categories, Mr O’Mahony explained.

However, LinkedIn’s database classifies over 100 occupations as ICT roles offering a more granular view of the labour demand in the sector.

Of those, the report ranked ICT network security specialists as the sixth most sought after category of professionals.

Technical consultants, business development managers and cloud specialists round out the top three most sought after categories.

Deloitte has released of the new ICT labour market data at a time when the federal government is preparing to release the findings of its Cyber Security Review announced late in 2014.

The government has been holding consultations for the review with industry under strict confidentiality. However, skills have already been tipped to be one of the major challenges Australia faces protecting its critical systems and infrastructure.

A report released by the federal Australian Cyber Security Centre in 2015 found that Australia was coming under increasing threat from organised criminal and nation state sponsored “cyber adversaries”.

Read more: The IT-security divide is limiting full cyber attack chain analysis, expert warns

It found that the number cyber security incidents that the Australian Signals Directorate had been called on to respond to increased from 313 in 2011 to 1131 in 2014.

“In our approach to cyber security, Australia must remain vigilant, proactive and resourced to meet the challenges of a complex cyber environment.

“Cyber security efforts should aim to make Australia a harder target and thereby increase the trust and confidence of all Australians to engage in the benefits the internet brings. Effective cyber security requires a partnership between government and the private sector, with organisations and their users taking greater responsibility for the security of their networks and information,” the centre concluded in its report.



High Consequence Cyber Crime: The Crime of the Century

Organised criminals : Harness the power of analytics to detect breaches early and minimize their exposure.


Join the CSO newsletter!

Error: Please check your email address.

Tags ICT SecurityDeloitteCSO Australia​LinkedIn data

More about Access EconomicsAustralian Bureau of StatisticsDeloitte

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Andrew Colley

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place