March 2, 2018 By Shane Schick 2 min read

Money takes a back seat to respect and empowerment when IT workers make decisions about cybersecurity employment, according to a recent survey. ISC2’s “Hiring and Retaining Top Cybersecurity Talent” report revealed that 84 percent of cybersecurity workers are open to leaving their current role this year, including 14 percent who are actively looking for new employment.

Respect Tops IT Workers’ Cybersecurity Employment Wish List

A skill set of such mission-critical importance is in high demand, but the survey suggested that many security professionals are ready to jump ship because their current employer doesn’t listen to them well enough. About half of respondents (49 percent) cited salary as an important consideration when looking for new cybersecurity employment, behind a strong voice within the company (68 percent), an opportunity to “protect people and their data” (62 percent) and adherence to a code of ethics (59 percent).

When security professionals decide to make the leap to a new firm, 62 percent want their employer to clearly spell out their cybersecurity responsibilities rather than weaving data protection into a more general IT management role. In addition, 59 percent of survey respondents said they wanted to work for a company that invests in security training and emerging technologies.

The Domino Effect of the Cybersecurity Skills Shortage

Other research has shown that the cybersecurity skills gap is contributing to job fatigue among established IT professionals. For example, 51 percent of organizations surveyed by Enterprise Security Group (ESG) said they faced a “problematic shortage” of cybersecurity skills in 2018, which is up from 45 percent in 2017.

This dearth of talent places an even heavier burden on experienced IT workers, which may be another factor that leads them to seek greener pastures. Sixty-three percent of respondents to the ESG survey said the skills shortage has increased the existing staff’s workload. Additionally, 41 percent said this has forced them to spend nearly all their working hours putting out high-priority fires, which contributes to rising levels of stress in the workplace.

Organizations can’t afford to lose their top talent. By focusing on ways to reduce the pressure placed on existing staff and tapping new pools of talent to fill the skills gap, companies can make strides toward fixing the issues that influence IT professionals to seek new cybersecurity employment.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today