1.2.2.4 Lab - Cybersecurity Job Hunt
1.2.2.4 Lab - Cybersecurity Job Hunt
Objectives
Explore the career opportunities for cybersecurity professionals.
Explore the career requirements for cybersecurity professionals.
Part 1: Exploring Cybersecurity Jobs
Part 2: Cybersecurity Job Requirements
Background / Scenario
The cyber world is full of dangers and threats to individuals, organizations, and countries. These perils have
resulted in a major demand for individuals with the knowledge, skills, credentials, and ethics to protect our
people and systems. In this lab, you will explore the types of jobs available, job titles, job requirements, and
credentials required by the cybersecurity industry. The Internet is full of job search websites that can provide
you with information about careers in cybersecurity. Many of these websites are job search sites called job
aggregators. This means that they collect job postings from many other sites and organizations. In part one,
you will explore three of the world’s most popular job aggregator websites. In part two, you will discover the
requirements of cybersecurity jobs.
URL: http://burning-glass.com/infographic-geography-cybersecurity-jobs-2015/
Required Resources
● PC or mobile device with Internet access
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab – Cybersecurity Job Hunt
d. Repeat these steps using the phrase network security for the third search. Record the number of jobs
found. Did you find more or less job postings? Why?
There are about 60 jobs in my area, it’s a bigger leap than cybersecurity and a bit more than
information security. I think a key difference is that it may be more of a broad career than just
cybersecurity.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab – Cybersecurity Job Hunt
very popular job search websites are CareerBuilder.com and USAJobs.gov. The websites list hundreds of
cybersecurity related jobs.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3