Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & TrainingCybersecurity News

Cybersecurity Salary Survey Reveals Variance Across Industries and Geolocations in 2020

What’s worrying consumers and business the most?
December 17, 2019

Skills and achievements are associated with higher pay grades, says a new cybersecurity salary report from Cynet.

The 2020 Cybersecurity Salary Survey was developed for the purpose of gaining insight into a wide range of employee attributes related to cybersecurity compensation. The data received backs detailed salary profiles for five popular security positions: Security Analyst, Threat Intelligence Specialist, Security\Cloud Security Architect, Penetration Tester and Security Director\Manager. The data includes both the range and composition/salaries for these positions, as well as the relative impacts of the organization (geolocation, industry, etc.) and individual (gender, experience, certification) factors.

According to the report:

  • Geolocation matters: Security analysts in North America get significantly higher salary than in EMEA and APAC, with more than 80% earning between US $71K and $110K. In contrast, less than 35% in EMEA and 21% in APAC earn equivalent salaries.
  • A degree does not guarantee higher compensation: All analyzed positions feature similar salary range distribution for both employees with or without a degree in computer science or a related engineering field.
  • Banking and finance provide the highest salaries in the industry: This holds true for both strategic management and tactical positions.
  • Quality beats experience: Individuals were analyzed across all positions and those quality professionals with little experience were at the top of the payment curve, while seasoned veterans were at the bottom.
  • Pivoting pays: Individuals that pivoted from an IT occupation to a cybersecurity position earned more than their peers that started out in cybersecurity.
  • Bonuses are common practice: With the exception of security analysts, all other positions included periodic bonuses with annual rates ranging between one and ten percent.
  • Women are hard to find: There is a significant shortage of women in security positions. The highest percentage is in the 20-29 age group with 6% in overall positions.
  • Women in management: Within the five analyzed positions, the highest percentage of women were found in the security director/manager position at a rate of 10%.

Using the survey results, any individual can go to the section relevant for his or her role and learn how their salary benchmarks against the respective range of factors, which includes skill level, years of experience and more.

“Whether under the title of CISO, Director of Security, or even CIO, one cannot protect their organization single-handedly. At the end of the day, a cybersecurity professional is part of a team which makes recruiting and retaining talent an imperative,” said Eyal Gruner, Founder & CEO of Cynet. “The survey provides insights which can be useful for both cybersecurity professionals and employers and we expect those individuals leveraging this report to benefit from the intelligence.”

KEYWORDS: cyber security cybersecurity cybersecurity careers cybersecurity skills gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • identity theft, fraud prevention, cybersecurity, data theft

    Massive spike in fraud across all industries - 4.3 billion attacks detected since Black Friday

    See More
  • cyber-camera-enews

    Global Cybersecurity Awareness Survey Reveals 33 Percent of U.S. Respondents Have Experienced Identity Theft

    See More
  • cyber 3 responsive default

    Survey Reveals Challenges Facing Cybersecurity Profession

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing