Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity & Business Resilience

How to bridge the cybersecurity skills gap — Take a risk

By Crystal Morin
Women shaking hands

Resume Genius via Unsplash

April 18, 2025

The cybersecurity industry is ripe with opportunity, boasting nearly 500,000 job postings in February. From bright-eyed high school and college graduates with no strings holding them down to seasoned professionals seeking a career change, there is an incredible talent pool just waiting to be tapped. 

But here’s the catch: companies must be willing to put in some additional effort and take a little risk to reap some major benefits. 

To close the skills gap, companies need to be willing to hire and train new security professionals or upskill current professionals missing the niche capabilities necessary for their cyberinfrastructure. Unfortunately, many current job listings require prior experience or certifications, and many cybersecurity training programs and certifications are quite expensive and time-consuming. This becomes an impasse too large to bridge for many individuals who are already employed or are caregivers. 

Many of those folks trying to break into the industry bring a particular passion and drive, they want to be in the industry. Instead of filtering candidates by checkboxes, organizations should focus on hiring the right people — those who bring curiosity, problem-solving skills, and a willingness to learn. Cybersecurity is a team effort and requires a lot of hard, mentally exhausting work. Hiring for the right culture fit, adaptability and passion will result in a stronger and more resilient team in the long run.

Cybersecurity would also stand to benefit from the perspectives of individuals from different professional backgrounds. A journalist or marketer’s experience can transfer to cyber threat intelligence; an educator can cross-train to technical writing or security awareness training; an accountant can work in cyber fraud; someone who is multi-lingual can become a threat researcher; and mechanics and engineers can learn hardware, Supervisory Control and Data Acquisition (SCADA), or Internet of Things (IoT) security — the list goes on. Professionals from non-traditional roles, when transferred into cybersecurity roles, will also bring fresh, valuable, and unique perspectives to the industry. 

The presumed concern and hesitancy to hire individuals with little-to-no cyber experience likely comes from the time and cost necessary to train a new hire, in addition to the risk of losing them following training completion. Fortunately, we live in the modern day of GenAI power, which can be leveraged to upskill and support junior cybersecurity professionals as they work alongside senior mentors.

I recently came across a job posting for an organization valued at $700M doing exactly what I hope to see more companies do. This post advertised an opening for a Tier One SOC position, in-person, on third shift, and there were no special requirements — just the standard high school diploma, an understanding of basic computer programs, and a willingness to learn new skill sets. The job duties entailed everything from physical security of the building, like a security guard, to, more importantly, watching for and escalating cyber detection alerts. This is the kind of entry-level, bare-requirement position that helps folks break into the industry. 

One week later, I came across a similar position for a different organization. It, too, was third shift and on-site, but did not include physical security duties. This listing required 1-3 years of experience and preferred applicants with certifications and prior knowledge of various tools and applications. I would argue that experience could be taught on the job in a position at this level. Someone with a military, law enforcement, or IT background would understand processes and could be trained on tools, whereas folks with existing certifications but no experience may know the tools and quickly be able to learn the processes. All it takes is some additional on-the-job training.

Hands-on training is essential in any field, but it’s especially valuable in cybersecurity. Cybersecurity concepts are often complex and difficult to grasp through textbook or lecture-based education alone. The best way to learn how to secure an environment or application, analyze threats, and pentest existing defenses is through direct experience with a real cloud environment, analysis of a known attack path, and practice evading detection tools. HackTheBox and TryHackMe are incredibly valuable hands-on learning programs, but newcomers to the cybersecurity industry learn more — and learn faster — from mentors and with the support of GenAI tools on the job. 

At the end of the day, we don’t have a shortage of talent — we have a skills gap. Take me for example: I never had a formal education in cybersecurity and didn’t receive any certifications prior to holding a cyber position. I’m living proof that on-the-job training works, and I’m not alone. Plenty of passionate, capable people are eager to join this industry, but they’re being blocked by checklists and rigid hiring mindsets. 

To fill the nearly half million open roles, I encourage organizations to take a chance on non-traditional candidates and invest in training. Cyber threats don’t wait for an opportune moment, so why are you?

KEYWORDS: cyber workforce cybersecurity training hiring practices talent gap

Share This Story

Crystal morin headshot

Crystal Morin is a Cybersecurity Strategist at Sysdig. She was originally a threat research engineer on the Sysdig Threat Research Team, where Crystal spent her time discovering and analyzing cyber threat actors who took advantage of the cloud. Crystal started her career as a linguist and intelligence analyst in the United States Air Force. Image courtesy of Morin 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing