Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and Management

Tips to recruit and retain employees in cybersecurity talent shortage

By Andi Ursry
two people working on same laptop

Image via Unsplash

December 1, 2023

ISC2’s 2023 Cybersecurity Workforce Study found the cybersecurity workforce gap has reached an all-time high, with “4 million professionals needed to adequately safeguard digital assets.” Not only is there a shortage of external candidates in the field, but the cybersecurity industry is also plagued with rampant burnout – leading to internal churn that widens the workforce gap. 

Security leaders have heard a lot about the talent shortage problem and not enough about how they can solve it. In an effort to redirect the conversation and make a change, here are five steps organizations can take to attract and retain cybersecurity professionals in this market.

1) Offer the option to work remotely — Since the COVID-19 pandemic forced companies to transition to a remote operating model in March of 2020, employees have gotten used to working from home and enjoying a better work/life balance. And, in many cases, company leaders have found that remote employees are happier and more productive, which is better for the business. With benefits across the board, many organizations are allowing employees to continue working from home either on a part-time or full-time basis.

In this new era of work, mandating employees to come into the office full-time could deter candidates and make it hard to fill vacant positions. Contrary, offering the option to work remotely opens the candidate pool, allowing a company to find the most highly qualified person for the job — even if they reside in a different state or country. 

2) Provide insight into cybersecurity career paths — Doing this can solve a two-fold problem. First, there is a widespread misperception that cybersecurity professionals sit behind a computer all day long, using their technical skills to thwart cybercriminals. While there certainly are people that do just this, there are also a variety of other cybersecurity career paths that individuals can take — for example, working in sales or marketing, heading up human resources (HR), managing communications or joining the legal team at a cybersecurity company. Promoting all the different types of roles that are available within cybersecurity can create a more diverse candidate pool and help those on the fence make the jump into this exciting field — increasing the chances of finding the right fit for the unfilled positions. 

Second, there are many individuals who may be 100 percent confident that they want to get into cybersecurity, but they procrastinate because they simply don’t know where to start. Creating awareness for organizations specifically built to help individuals begin a career in cybersecurity — such as ISC2 or Women in CyberSecurity (WiCyS) — can aid both internal employees and external candidates on their career journey.

3) Promote from within — To aid in employee retention, promote from within the organization prior to seeking external candidates. Individuals work tirelessly for their organization, and burnout and frustrations from being passed over on promotions can contribute to turnover. 

Cybersecurity is something that can be taught. So, if a company has an employee with the necessary soft skills — a good work ethic, dedication, drive and a willingness to learn — then, they can teach them the necessary technical skills required to be successful in the open position. The best candidates for the cybersecurity roles might already be employed in the company – leaders just have to broaden their mindset. 

4) Be open to non-traditional career paths — Similarly, if security leaders can’t hire from within, they should be open to external candidates with experience that relates, but doesn’t directly tie to, cybersecurity. For example, let’s say the company is looking for someone to join the threat intelligence team, and job responsibilities include tracking threat trends, providing insight into the human behaviors of threat groups, and recognizing traffic patterns. Be open to candidates who have experience with analysis and trend/pattern recognition in other fields, as these skills can translate to cybersecurity. 

One other important point to note is that hiring employees who don’t have a traditional background in cybersecurity can often provide a layer of diversity that brings different perspectives, allowing leaders to take a comprehensive view of security problems, so they can provide a holistic strategy to solve them.

5) Offer training and certification programs — Investing in training and development will provide current employees with the knowledge and experience they need to stay on top in an ever-evolving field. Not only will this benefit a business, but it will also help employees remain successful — boosting employee satisfaction and retention. Paying for cybersecurity certification programs is also a great way to show commitment to employees’ professional development, building employee loyalty while helping to close the cybersecurity skills gap. In addition to these internal benefits, training and certification programs also can be great incentives for external hires.

Make a change today

Security leaders have been hearing about the cybersecurity workforce gap for years, which means current strategies to recruit and retain cybersecurity professionals just aren’t working. It’s time they come together as an industry to solve this problem. The above best practices are strategies we can implement in the near-term to make a difference over the long-term. And, when they do this, they can start to tip the scales and close the talent gap that has been plaguing the industry for far too long.

KEYWORDS: burnout cybersecurity talent gap employee training hiring practices ISC2

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Andi Ursry is a cyber threat intelligence analyst at Optiv.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hiring_recruiting-freepik1170.jpg

    Four steps to build and retain a solid cybersecurity team during a labor shortage

    See More
  • workforce training

    How to recruit the right cybersecurity talent

    See More
  • Businesses and Countries Vulnerable Due to Shortage of Cybersecurity Talent

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing