Wednesday, July 22, 2020

How can SMEs find the best cyber security talent - Viewpoint Viewpoint careers advice blog

How can SMEs find the best cyber security talent - Viewpoint Cybercrime is rated by small to medium-sized enterprises (SMEs) as the 5th biggest risk to their business, according to a survey by the Office of the NSW Small Business Commissioner (OSBC) of over 1,000 SMEs. These SMEs were most concerned about fraudulent emails or phone calls, social media hacking, online banking fraud, crypto ransomware and malware. Only 20 per cent were confident that they had the expertise and resources to respond to a security breach. No wonder then that cyber security professionals are in increasing demand by SMEs to battle the growing threat of cyber crime. So, if you are thinking of hiring a permanent or temporary cyber security expert, what do you need to look for? Here are our tips: 1. Talk to an expert: Firstly, let’s acknowledge that recruiting in this area can be tricky for organisations of any size. Most business owners and even HR departments have little understanding of cyber security skills and technical requirements, not to mention software and hardware. That’s why we suggest you talk to a recruiting expert who works in this niche field every day. You should also get a benchmark for the right salary to offer these professionals, based on the  Hays Salary Guides in your country. 2. Test for technical requirements: In cyber security the strength of a candidate’s technical skills matter the most as they must be strong enough to hold or fight off a potential threat. The cost of setting up a practical test for your shortlisted candidates may be worth it long term as you’ll be able to confirm if your preferred candidate can understand, detect and prevent threats and risks. 3. Ensure they’ve used AI: They should also understand how AI and machine learning can aid cyber security efforts. A cyber security expert would be able to talk about how they’ve used AI, such as Watson for Cyber Security, to identify security threats significantly faster than human investigations can alone. 4. Check their communication skills: It’s also important to secure a cyber security candidate with strong business acumen and communication skills. You want someone who understands your business and can explain technical terms to people who do not work in IT. Additional desirable soft skills include the ability to be innovative and think outside the box when it comes to identifying and preventing threats. 5. A desire for ongoing learning: Finally, assess the candidates desire for ongoing learning. Cyber crime is a pulsating market where new threats are constantly emerging. Your cyber security employee should want to be on top of the latest trends and constantly looking to add to their knowledge and expertise of the latest vulnerabilities, whether through Meetups, hackathons, conferences or online forums. What’s not on the above list is a certain degree, certification or years of experience. There are times when an organisation requires a certified expert, but in most cases stipulating that candidates must hold a particular certification only serves to significantly reduce your candidate pool in what is already a candidate-short market while doing little to identify quality applicants. It’s also worth pointing out that investing in upskilling your existing staff can help you to bridge the cyber security skills gaps within your organisation. You could also discuss this issue with your IT service providers to see what capabilities they offer. There’s no denying that demand for cyber security professionals will only increase. Getting on top of this trend now will ensure you understand the expertise that your SME requires in the face of the growing threat of cybercrime. Are you currently hiring? Our recruiting and hiring tips and advice will help ensure you find the right person for the job Get ahead of the game if you want to snap up the best talent How will job searching change in 2018 and beyond? The jobs and skills to seek out in 2018

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.