Cyber Security

Cyber Security

Glocomms: A specialist Cyber Security talent partner

The world of Cyber Security is rapidly changing, and the demand for skilled professionals is increasing. Companies need to ensure their data and networks stay secure, and they are turning to the expertise of Cyber Security professionals to help them do just that.

At Glocomms, we specialize in providing top-tier cybersecurity talent on a permanent or freelance basis. Our experienced consultants have a deep understanding of the cybersecurity industry and can help you find the perfect candidate to meet your specific needs. Whether you're looking for a permanent employee with expertise in threat detection and response, network security, or cloud security, or a freelancer to help with a short-term project, we can help you find the right fit quickly and efficiently.

We understand that hiring for cybersecurity positions can be challenging, which is why our team is here to guide you through every step of the process. We strive to provide the best possible experience for both parties, making sure everyone is satisfied. If you're looking to hire a Cyber Security professional, or if you're a job seeker looking for the right opportunity, take a look at our live roles or submit your live vacancy to us.

โ€‹

If you're a Cyber Security professional, please register your resume.

Register your CV

โ€‹

If you're looking for Cyber Security talent, please register your vacancy today.

Register your vacancy
or
Request a call back

โ€‹

Benefits of working with us

Our Cyber Security recruitment specialists support growing technology businesses source the right go-to-market strategy talent, manage the recruitment process and facilitate onboarding. With multi-lingual language support, we provide international recruitment expertise to secure business-critical talent across Europe.

Our recruitment benefits

Experience

We have a decadeโ€™s worth of Cyber Security experience as a leading talent partner in Technology.

Network

A vast, global network of the best, in-demand Cyber Security talent.

Knowledge

Our award-winning talent specialists offer bespoke, tailored guidance on the latest hiring trends.

At Glocomms, we are dedicated to cultivating enduring alliances grounded in trust, honesty, and shared prosperity. Our commitment lies in delivering customized solutions that align with your distinct demands, granting adaptable alternatives to match your Cyber Security recruitment preferences. Whether you seek swift placement for pivotal roles or aspire for strategic talent acquisition solutions, our arsenal of resources and proficiency ensures successful outcomes. Share your vacancy with us today.

Looking to hire? Request a call back

Cyber Security Jobs

At Glocomms, we're excited about the future of technology Cyber Security. We encourage you to visit our Cyber Security Jobs to explore the cutting-edge roles we're filling in this transformative sector. Shape tomorrow's tech world with us; your future begins at Glocomms.

IAM Engineer

IAM Engineers Dallas, Tx - 5-days on-site $150,000 - $160,000 Glocomms are partnered with a technology service provided funded by a leading private equity firm in the search for an IAM Engineer to join the team based out of Dallas, Tx. Key responsibilities: Designing, maintaining, debugging, and expanding the firms identity and authentication services. Act as the group's ADDS and Microsoft Entra ID subject matter specialist. Develop best practices and authentication policies to impliment throughout IDPs. Create and oversee roles, identity federation, AWS/Azure/ADDS IAM policies, etc. Apply upgrades to cloud and on-premises directory systems. In collaboration with the product owners, provide advanced design and engineering services for the following skill sets: automation/scripting, Windows, Linux, Directory Services, IGA, PAM, and Windows. Carry out Proofs of Concepts (PoCs) to evaluate and identify the technologies in accordance with the organization's requirements. Automate IAM processes. Collaborate with the InfoSec, Risk, and Compliance teams to interpret policies and standards; make sure IAM control solutions appropriately adhere to all policies and standards. Create and record IAM standards, guidelines, policies, and procedures. Examines, records, monitors, and settles important complicated software/hardware issues related to Enterprise Identity and Access Management systems, particularly Microsoft Entra ID (Azure Active Directory) and Active Directory. Support the administration of Identity Governance, which includes Access Reviews and PAM. Required experience: Bachelor's degree in computer science or a comparable level of training and work experience. 5+ years of expertise deploying PAM, Enterprise Identity and Access Management (EIAM), and other relevant security systems (Active Directory, Microsoft Entra ID, AWS IAM, and Saviynt). This needs to contain at least two years of AWS and Microsoft Azure Active Directory (Azure ID) experience. 5+ years of experience with technical architecture, including understanding security and dataflow within these components and integrating multi-tiered applications, LDAP and directory services, application servers, and network infrastructure. Extensive design, implementation, and support experience with Entra ID and Active Directory. Domain and forest recovery procedures. Knowledge in setting up authentication methods such as Kerberos on Linux and other non-Windows platforms. Knowledge in setting up and implementing authentication technologies such as LDAP, OAUTH, SAML, and OIDC. Knowledge of web services architectures using SCIM REST API. Knowledge of cloud service providers such as AWS, Azure, and GCP. Excellent oral and writing communication skills. Capable of writing, debating, and elucidating technical documentation succinctly and effectively for a range of audiences, even individuals with no technical background. A cooperative team member who also feels at ease working independently.

US$150000 - US$160000 per year
Dallas
Apply

Principal Threat Detection and Response Engineer

Glocomms is partnered with a leading international hedge fund to play a pivotal role in our security operations team. As Principal Threat Detection & Response Engineer you will join as robust security team to oversee the identification, investigation, and mitigation of security incidents to ensure the safety and integrity of sensitive client data. Key Responsibilities: Lead and coordinate response efforts to security incidents, ensuring timely and effective resolution and helping create best-practice playbooks. Design, develop, and maintain advanced detection mechanisms to identify potential security threats. Proactively hunt for threats and vulnerabilities within the firm's digital environment. Collaborate with DevOps teams to integrate security practices into the software development lifecycle. Develop and maintain scripts, tools, and platforms to streamline IR processes and enhance overall security operations efficiency. Perform in-depth analysis and reverse engineering of malware and other malicious artifacts to uncover hidden threats and attack vectors. Leverage your expertise in reverse engineering to dissect complex malware, understand its behavior, and develop robust detection and mitigation strategies. Provide insights and recommendations based on analysis to improve defenses and detection capabilities. Apply a deep understanding of security principles and practices to all aspects of your work. Stay current with emerging threats, vulnerabilities, and industry best practices. Mentor and provide guidance to junior team members. Qualifications: Bachelor's or Master's degree in Computer Science, Information Security, or a related field. 5+ years of experience in a senior threat management role (financial services or hedge fund environment exposure preferred). Strong expertise in incident response, computer forensics, and threat detection. Proficiency in scripting and automation languages (e.g., Python, PowerShell). Experience with security information and event management (SIEM) tools and technologies. Advanced knowledge of malware analysis and reverse engineering techniques, including static and dynamic analysis, debugging, and disassembly. Familiarity with DevOps practices and tools. Excellent problem-solving skills and the ability to work under pressure. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, GCIH, GCFA, or similar. Experience with cloud security (AWS, Azure, GCP). Understanding of financial industry regulations and compliance requirements.

US$240000 - US$320000 per year
New York
Apply

Senior Offensive Security Engineer

Senior Offensive Security Engineer Location: Washington, DC (hybrid 3 days on-site) Salary: $160,000 - $220,000 Glocomms are partnered with a leading commercial and residential real estate firm in the search for a Senior Offensive Security Engineer to further develop capabilities, and create test plans to remediate, mitigate, and exploit vulnerabilities. Key responsibilities: Spearhead collaboration with purple and blue teams to manage threats and conduct adversary emulation activities as well as defensive and vulnerability controls. Create and enforce red team engagements with third parties. Manage internal pen-test activities whilst mentoring junior members of the team, ensuring tests on critical infrastructure (AD, CI/CD, Systems, etc.) is carried out accordingly. Manage automation efforts for general offensive security activities including penetration tests, threat emulations, attack simulations, etc. Experience required: Bachelor's degree in Computer Science/Cyber Security/a relevant field from an accredited not-for-profit university or college. 6+ years of IT experience with 3+ years in offensive security. Programming skills in Python, Bash, PowerShell, C#, etc. Hands-on experience conducting red and purple team scenarios.

US$160000 - US$220000 per year
Washington
Apply

Director, Threat Detection

Director, Threat Detection Location: NYC Compensation: $200,000 - $275,000 Glocomms are partnered with a globally leading Hedge Fund in the search for a Director, Threat Detection to join their global threat detection team based out of NYC leading a team of 8-10 heads. Key responsibilities: Lead a global team of highly technical hands-on Engineers across US, EMEA, and APAC. Conduct threat hunting activities to identify adversaries targeting the firms' systems. Create and rollout detection rules for cyber threat prevention against the firms' systems. Ensure security logs are thoroughly reviewed to support and further develop detection capabilities and support risk. Create threat intelligence reports as it relates to the cyber cyber/threat landscape and present all reports to senior leadership. Research and analyze threat actor/group TTPs in order to convert them to detection solutions in various languages and tools. Develop the firms' detection-as-code ecosystem to improve detection and response time and accuracy. Collaborate with other businesses units to become well-versed with internal network and use this knowledge to conduct further in-depth threat hunts. Experience required: Bachelor's degree in Computer Science, Cyber Security, Security Engineering, or a similar field (Master in Cyber Security preferred!) 8+ years of experience in SecOps/Endpoint Security. Deep technical experience using Python programming language. Strong expertise in conducting analysis o f security logs, packet captures, network devices, and media. In-depth knowledge of the cyber threat landscape including threat actor/group TTPs. Experience working in a SOC/NOC environment.

US$200000 - US$275000 per year
Manhattan
Apply

VP Information Security (eCommerce)

Note: This position is open to candidates residing in the following states: Arizona, California*, Colorado, Illinois*, Indiana, Kentucky, Maryland, Minnesota*, Nevada, New Jersey, North Carolina, Texas, Utah, Washington, Wisconsin. *Candidates located in a commutable distance to the following office locations will be required to follow a hybrid schedule (3 days/week onsite): Calabasas, CA; San Diego, CA; Pleasanton, CA; Woodbridge, IL; Eden Prairie, MN. Glocomms is partnered with a dynamic and rapidly growing e-commerce company committed to providing its customers with exceptional service and innovative products. The client is seeking a highly skilled and experienced Head of Information Security to lead efforts in safeguarding its digital assets, ensuring compliance, and maintaining the highest standards of security. The technology stack is predominantly based on Microsoft technologies and primarily utilizes AWS for cloud infrastructure. Position Overview: The Head of Information Security will be responsible for overseeing all aspects of information security, including incident response, bug bounty programs, vulnerability remediation, and compliance. This leadership role requires a strategic thinker with a hands-on approach, capable of managing and developing a high-performing security team. The successful candidate will have a proven track record in information security within the e-commerce sector or a similar fast-paced environment, with strong experience in a Microsoft tech stack and AWS cloud infrastructure. Key Responsibilities: Leadership and Strategy: Develop and implement the overall information security strategy aligned with business objectives. Lead and manage a team of three information security professionals, fostering a culture of security awareness and continuous improvement. Provide strategic guidance to executive leadership on security initiatives and risk management. Incident Response: Oversee the incident response program, ensuring swift and effective handling of security incidents. Coordinate incident response efforts, including investigation, containment, eradication, recovery, and post-incident analysis. Develop and maintain incident response plans, playbooks, and runbooks. Bug Bounty and Vulnerability Remediation: Establish and manage a bug bounty program to incentivize external security researchers. Oversee vulnerability management processes, including regular scanning, assessment, and remediation of security vulnerabilities. Collaborate with development and operations teams to ensure timely and effective remediation of identified vulnerabilities. Compliance and Governance: Ensure compliance with relevant regulations, standards, and frameworks (e.g., PCI-DSS, GDPR, CCPA). Develop and maintain security policies, procedures, and documentation. Conduct regular security audits and assessments to ensure compliance and identify areas for improvement. Risk Management: Identify, assess, and manage information security risks across the organization. Implement and maintain security controls to mitigate identified risks. Develop and deliver security awareness training programs for employees. Technology and Innovation: Stay current with emerging security trends, threats, and technologies. Evaluate and implement new security tools and technologies to enhance the security posture. Collaborate with IT and engineering teams to integrate security into the software development lifecycle (SSDLC). Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree preferred. 10+ years of experience in information security, with at least 5 years in a leadership role. Proven experience in incident response, vulnerability management, and compliance within an e-commerce or B2C environment is essential. Strong knowledge of security standards, regulations, and best practices (e.g., PCI-DSS, GDPR, CCPA). Extensive experience with a Microsoft tech stack, including Windows Server, Active Directory, and related technologies. Strong experience with AWS or Azure cloud infrastructure. Excellent leadership, communication, and interpersonal skills. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. All employees are required to be vaccinated against Covid-19 - reasonable accommodation requests will be considered. Benefits: Competitive salary and performance-based bonuses Comprehensive health, dental, and vision insurance 401(k) with company match Generous paid time off and holiday schedule Employee discounts for company products

US$240000 - US$270000 per year
United States of America
Apply

Azure Cloud Security Engineer

Job Title: Cloud Security Engineer (Azure) Compensation: Up to $150,000 (dependent on candidate skills and YOE) Location: Remote (quarterly travel required to their Missouri office) SUMMARY Currently supporting a pioneer in the Automotive industry looking to bring on a Cloud Security Engineer to lead their digital transformation. You will be safeguarding their cloud infrastructure and responsible for designing, implementing, and troubleshooting their DLP and data security platforms. You will play a crucial role in a greenfield environment with full opportunity to fortify their Azure cloud environment against potential threats and vulnerabilities. You will collaborate closely with cross-functional teams to deploy and configure Microsoft tools such as Azure, Active Directory, and Office 365, while leveraging PowerShell scripting to automate security processes. RESPONSIBILITIES Develop and implement security policies, procedures, and controls to safeguard our Azure cloud infrastructure. Conduct risk assessments and vulnerability scans to identify potential security gaps and mitigate risks effectively. Deploy and manage DLP solutions to prevent unauthorized access of sensitive data. Lead incident response efforts to promptly detect, analyze, and mitigate security incidents. Develop and maintain incident response plans, conduct post-incident reviews, and implement remediation measures to enhance resilience against cyber threats. Configure, deploy, and manage Microsoft Azure, Active Directory, and Office 365 environments to maintain optimal security posture. Utilize PowerShell scripting to automate security tasks, streamline workflows, and enhance operational efficiency. Develop custom scripts for monitoring, auditing, and enforcing security controls across Azure cloud environments. Qualifications: Bachelor's degree in Computer Science, Information Technology, or related field. Proven experience working as a Cloud Security Engineer or similar role, with a focus on Azure cloud environments. 7+ YOE in Information Technology and at least 3+ years in a Microsoft Windows shop Hands-on experience with DLP solutions, incident response processes, and security incident and event management (SIEM) tools. Experience with Power BI and Linux servers. **Compensation is negotiable and will reflect candidate experience, interview, and will ultimately be decided by the employer. **NO C2C** FTE ONLY **The organization is not able to sponsor for this position

US$130000 - US$155000 per year
Missouri
Apply

DevSecOps Engineer

Job Title: DevSecOps Engineer Compensation: Up to $220,000 Currently supporting a cutting edge real estate organization owning over 75 web applications and have been recognized as one of the top 30 fastest growing companies in the DMV area. They are looking to expand their product security team with a DevSecOps Engineer. The ideal candidate will have prior experience as a DevSecOps Engineer with a strong focus on Cloud IAM Security and scripting in either Python, Powershell, or Terraform (for IAC). Responsibilities Proactive hunting for both secrets and data leakage within codes, documentations, and logs Running dynamic scans to identify and mitigate vulnerabilities in real time Partner alongside the software development team to foster a security first mindset relative to CI/CD pipelines and tool integrations Qualifications Bachelor's degree from a not for profit university (required) preferably in Computer Science, Information Technology, or related 5+ years of experience in CI/CD pipeline security, Kubernetes, and cloud security (ideally in an AWS environment) Ability to create scripts from scratch in either Python or Powershell and similar experience for IAC with Terraform, Ansible, or CloudFormation This position requires an onsite component in their Washington, DC, or Richmond, VA office Tuesday - Thursday with the ability for remote work Monday and Friday. At this time, the organization cannot sponsor or transfer visa's for this position

US$22000 - US$220000 per year
Washington
Apply

Cryptography & Security Researcher

Location: Downtown San Francisco (Financial District) Compensation: $150,000 - $180,000 base salary + equity Glocomms is partnered with an innovative open-source AI startup leveraging cutting-edge cryptographic techniques and blockchain technologies to create a secure, efficient, and scalable platform. Responsibilities: Design, analyze, and enhance our Proof of Sampling protocol, integrating optimistic fraud proofs and zero-knowledge proofs. Conduct advanced research on cryptographic algorithms and protocols, including but not limited to threshold signatures, multi-party computation (MPC), and secure communication protocols. Develop and implement security solutions for blockchain components, focusing on Layer 1 and Layer 2 blockchain projects. Conduct security assessments and penetration tests on blockchain components, identifying vulnerabilities and proposing mitigation strategies. Develop and audit smart contracts using Solidity, ensuring robustness and security. Implement and optimize Byzantine Fault Tolerance (BFT) consensus mechanisms. Collaborate with the development team to integrate cryptographic solutions and ensure secure implementation. Publish research findings in academic journals and present at conferences to contribute to the broader blockchain and cryptography community. Stay updated with the latest advancements in blockchain security and cryptography to continuously improve the platform. Qualifications: Bachelor's, Master's, or PhD in Computer Science, Cryptography, Information Security, or a related field. Proven experience in blockchain security and cryptography research, with a strong understanding of cryptographic algorithms and secure communication protocols. Strong analytical and problem-solving skills, with the ability to conduct thorough security assessments and penetration tests. Excellent written and verbal communication skills, with a track record of publishing research in reputable journals or conferences. Ability to work independently and collaboratively in a fast-paced, remote startup environment. Experience with threshold signatures, multi-party computation (MPC), and Byzantine Fault Tolerance (BFT) consensus mechanisms. Familiarity with optimistic fraud proofs and zero-knowledge proofs. Preferred: Proficiency in programming languages such as C++, Go, or Rust. Preferred: Experience with Solidity and smart contract development. Preferred: In-depth knowledge of Layer 1 and Layer 2 blockchain projects and protocols. Preferred: Prior experience in an open-source project or decentralized platform. What's in it for you: Competitive salary and equity options. Opportunity to work on groundbreaking technology in a rapidly evolving field. Flexible remote work environment. Collaborative and inclusive team culture. This position will be up to 75% on-site in downtown San Francisco, CA.

Negotiable
San Francisco
Apply

McAffee WebGateway (SkyHigh) - Technical Coordinator / Expert

McAffee WebGateway (SkyHigh) - Technical Coordinator / Expert Location: Paris Work Pattern: Hybrid (2 days per week onsite / 3 days per week remote) Start Date: As soon as possible Contract duration: Long term (up to 3 years) Must be French and English Speaking I am assisting a international insurance company in the search for a highly skilled and motivated McAfee WebGateway Expert to join their dynamic team. The client is currently doing a big restructuring of their business unit and need someone and take charge of the Build and Run team and be the referent on McAfee WebGateway (SkyHigh) solution The Customer is one of the leaders in their market across the whole world. The scope for work and progression is endless. Glocomms has a long-standing relationship with the customer having already placed numerous contractors with them. Specific Duties: Technically advise and support SWA Product management on the ownership and definition of the Product Strategy, roadmap and lifecycle to ensure to serve the security objectives Technically advise, lead and support technical discussion with Group security related to any topics related to the product Technically advise, lead and support any technical activity and improvement that may be set up on the proxy product and related to: -Policy configurations -Security reports requirement (who, what, when, how) -Performance improvement -Automation -New additional features -Service management (service catalogue, internal processes, TOM, etc.) To challenge and lead technical discussion with the vendor for topics as service request, or incident ticket, or improvement plan or new feature, etc. To support and advise the BAU service provider (Cap Gemini) on some level 3 activities and work closely with their L2 support teams to technically lead and advise them on their daily activities To support, lead and manage incidents resolution related to web gateway daily operations. Support and technically advise on new customer's demands and assess the technical sets-up on proxy configurations to answer the need To technically advise, lead and support the standards definitions Prepare technical documentations and procedures to support the overall projects and BAU teams Analyse user or application internet activities for security purpose. Analyse user or application internet activities for performance improvement. To head up on the integration of the web gateway product with the overall environment Webgateways security role and key design. McAfee webgateway solution on premise & cloud Migrating users from on premise proxy to McAfee web gateways Cloud solution. Experience: Strong experience on McAfee WebGateway (SkyHigh) solution Experience in Network and Security technologies and products Must be an English and French speaker

โ‚ฌ500 - โ‚ฌ800 per day
Paris
Apply

Palo Alto Technical Lead

Palo Alto Technical Lead Location : Tours Working pattern: Hybrid (3 days per week on site) Duration: 3+ year project Start Date: Late August / Early September Languages: Must be English and French speaking I am assisting a leading electrical manufacturer in a search for a skilled Palo Alto Technical Lead to work on a project to support the deployment of network/security solutions in various sites to prevent cyber threats My customer has a firm reputation and is a family name across the whole of Europe. The scope for professional and technological progression is endless. Glocomms has a long-standing relationship with the customer having already placed numerous contractors with them. Main Responsibilities: Technical Coordination for the design and implementation of firewall security rules: Participate to the definition of the firewall (Palo Alto) rules design and implementation methodology. Technical project management to coordinate technical activities with suppliers and the different stakeholders across the different sites Strong communication skills Experience in large cybersecurity solutions deployment in an international environment, experience in designing and implementing firewall rules preferably on Palo Alto Networks firewalls technology Review and update Technical documents Risk Analysis of Technical operations Technical review of documents like HLD/LLD and propose improvements Technical review of the runbook and propose improvements Reporting to project manager and project team Skills and Requirements: High Proficiency Cisco Networking (LAN , WAN, Nexus , Catalyst) Very high proficiency in Palo Alto Experience in Coordinating Network Security Engineers/teams in project environments Communication skills (English and French is a must) Good Coordination and collaboration skills

โ‚ฌ600 - โ‚ฌ700 per day
Tours
Apply

Senior IAM Engineer

One of the fastest growing companies in the world is looking to add a Senior IAM Engineer to their security team. This is a Senior Engineer position, seeking someone who is an expert in Authentication and Authorization in Cloud, on-prem, Enterprise, and Customer environments. REQUIREMENTS: - 5+ years of experience in IAM Engineering in an Enterprise-scale organization - Proficiency in SSO, MFA, Federation and Authentication Protocols (SAML, OIDC, OAuth, Kerberos, LDAP) - Proficiency in either AWS or Azure IAM - Ability to put new processes into place and maintain existing infrastructure - Must be able to work with cross-functional teams in governance, infrastructure, product, and leadership. - Ability to be the primary point of escalation for all issues related to the IAM Systems Location: Los Angeles, CA Compensation: $150-220k base + bonus, possible stock, and strong benefits This role should be filled by August 2024. Please apply if interested to learn more.

US$150000 - US$220000 per year
Los Angeles
Apply

Governance, Risk, and Compliance Lead

Governance, Risk, and Compliance Lead Remote | New York City (must be able to come onsite as needed) $190,000 - $210,000 base salary* Glocomms partnered with a leading law firm in the search for a GRC Analyst to be responsible for safeguarding the firm's information through comprehensive risk assessments, audits, controls testing, and policy and procedure compliance initiatives. This role involves supporting a variety of GRC projects and working with a range of security tools and applications. You will conduct information security risk assessments and evaluate the control environment of business processes and applications, including both manual and automated systems, in line with the information security program. While leading efforts to secure compliance certifications such as ISO 27000 series, NIST, and more, you will also oversee client assessments and conduct risk assessments of third parties. Requirements: 4+ years of demonstrable experience in Information Security Bachelor's degree in relevant field or discipline Strong experience leading Information Security initiatives and strong knowledge of local/global privacy and compliance regulations Familiarity with frameworks such as ISO 27000, NIST, COSO, and COBIT Practical hands-on experience with security tools like DLP, SIEM, NAC, A/V, EDR, etc. Excellent written, verbal, and interpersonal communication skills. *Compensation dependent on candidate experience and geographic location

Negotiable
New York
Apply

Cyber Security News & Insights

As Digital Threats Skyrocket, the Answer Lies in Professional Defense Image
hiring advice

As Digital Threats Skyrocket, the Answer Lies in Professional Defense

In today's digital landscape, where businesses are increasingly dependent on online platforms and cloud systems, cyber threats loom large. Every breach headline reminds us of the vulnerability of our digital assets. While technologies have evolved rapidly, so too have the strategies of cybercriminals. According to the latest IBM Data Breach Report, 83% of organizations experienced more than one data breach during 2022.To stay ahead, businesses must realize that mere firewalls and anti-virus solutions aren't sufficient anymore. What's required now is a solid human defense line โ€” a team of dedicated cybersecurity professionals.The Endless Threat LandscapeIt's not just about hacking now. Phishing, ransomware, insider threats, zero-day exploits โ€” the list is endless. And now, with the advent of artificial intelligence (AI), the threat matrix has expanded exponentially. Cybercriminals are leveraging AI to craft more sophisticated and targeted attacks, making their intrusions harder to detect and counteract. Their methods are evolving at a rapid pace, often outstripping traditional defense mechanisms. Confronting this amplified threat landscape requires not just advanced tools but also experts who deeply understand the evolving nature of these threats, especially in the context of AI-enhanced cyberattacks.Why Hiring Cybersecurity Professionals is Non-NegotiableDeep-Dive Expertise: Cybersecurity professionals are trained to address the complexities of the digital threat landscape. They bring a holistic understanding of both the technical and behavioral aspects of cyber threats.Proactive Threat Management: Instead of reacting to breaches, cybersecurity experts focus on proactive measures, detecting vulnerabilities, and patching them before they can be exploited.Customized Strategy: Every business is different, with its unique set of digital assets, software, and infrastructure. Cybersecurity professionals can design and implement tailored strategies that fit perfectly with a company's specific needs.The Glocomms AdvantageWhile understanding the need for cybersecurity professionals is one thing, finding the right ones is another challenge. This is where Glocomms proves invaluable.Why Source Cybersecurity Talent from Glocomms?Leading professionals: We connect businesses with top cybersecurity talent sourced from our vast, global network of candidates. These are individuals who have showcased exemplary skills and knowledge in their domain.Staying Ahead of the Curve: The professionals in our network at Glocomms are not only equipped with current expertise but also continuously upgrade their knowledge to stay ahead of emerging threats.Holistic Defense Approach: By hiring through us, you're not just getting a professional. You're acquiring a strategic partner who can align with your business goals and create bespoke hiring strategies, while ensuring a robust defense against cyber threats.In an era where data is as precious as gold and a company's reputation is its most invaluable asset, prioritizing cybersecurity isn't just wise โ€” it's imperative. As cyber threats grow more intricate and relentless, the need for top cybersecurity professionals becomes more pressing.If you're a hiring manager, recognizing the urgency of this matter is only the first step. Action is what counts. If you're looking to enhance your company's cybersecurity and wish to engage with the best in the field, don't leave it for another day.Request a call back from us today or submit your job specification. Let us help you navigate the vast talent landscape, ensuring that your business is not only protected but also primed for a secure digital future. In the world of cybersecurity, the time to act is always now.

Read More
Criminals are Looking to Create Their Own ChatGPT Clones Image
industry insights

Criminals are Looking to Create Their Own ChatGPT Clones

In a world where technology is advancing at an alarming rate, it's no surprise that criminals are looking to harness the power of artificial intelligence (AI). Recently, dark corners of the internet have started buzzing with rumors: cybercriminals claim they have successfully cloned OpenAIโ€™s groundbreaking ChatGPT, and they're looking to integrate this high-level tech into their malevolent schemes.ChatGPT and Its Influence on the Tech LandscapeFor those unfamiliar, OpenAIโ€™s ChatGPT is a chatbot built on a robust machine learning architecture. Its ability to generate human-like text has both thrilled and alarmed many, resulting in a rush of new startups aiming to harness its capabilities. The platform has found a home in numerous applications, from customer support to tutoring and beyond.But with every technological leap, there's a shadowy figure lurking in the background, looking for ways to exploit the innovation. In the case of ChatGPT, these shadowy figures are cybercriminals.The Threat of ChatGPT Clones in Malicious HandsIf these claims of cloned versions of ChatGPT hold any truth, there are concerning implications. Imagine receiving a phishing email that's so well-crafted, it becomes nearly indistinguishable from a legitimate message. These AI-powered emails could contain persuasive language, perfectly mimicking the style and tone of the person or organization they're imitating. This could increase the success rate of phishing campaigns.Furthermore, in the realm of malware, an AI model could potentially be trained to craft malicious code that changes and evolves, making it difficult for traditional security measures to detect and neutralize it.Skepticism Surrounding Cybercriminal ClaimsHowever, it's essential to approach these claims with a healthy dose of skepticism. Developing a clone of a sophisticated model like ChatGPT is no small feat. It requires vast resources, not to mention expertise. The possibility exists that these alleged ChatGPT clones are scams in their own right โ€“ an attempt by criminals to intimidate or bluff, or even to sell counterfeit versions of the tech to gullible buyers on the dark web.It's also worth considering that any legitimate ChatGPT clone will still have limitations. AI, no matter how advanced, can still make mistakes and can often be identified by the telltale signs of machine-generated text.The way forwardThe chatter about cybercriminals possibly harnessing AI, as illustrated by the ChatGPT clones narrative, underscores a vital point for every cybersecurity professional out there: The realm of cybersecurity is fluid, evolving in tandem with technological advancements, so continuous learning and adaptation is vital.While it's true that AI tools, like every technology, can be a double-edged sword, they also present an unmatched opportunity. By proactively learning about emerging AI tools, cybersecurity professionals can harness them to not only strengthen defenses but also anticipate and neutralize threats.Furthermore, a professional who takes the initiative to master these technologies positions themselves strongly in the market. With AI becoming an integral part of the digital landscape, professionals with a deep understanding of AI-driven threats โ€” and the expertise to mitigate them โ€” will undoubtedly be in high demand. By staying ahead of the curve, you're not just safeguarding digital domains; you're also carving a niche for yourself as a sought-after expert in an ever-evolving field.If you're a cybersecurity professional, submit your resume today. Whether you're looking for a change, a challenge, or simply an opportunity to engage with like-minded professionals, taking this step could open numerous doors and position yourself at the forefront of an industry in dire need of skilled experts.

Read More
Decoding the Future:  Network Security Transformations Image
cyber-security

Decoding the Future: Network Security Transformations

In our increasingly digital world, the significance of network security has soared. To help businesses navigate this ever-changing landscape, James Roache, Associate Director at Glocomms, shares his expertise.More than Just a Technical IssueNetwork Security has evolved into a complex interplay of considerations. As Roache points out, "Network security is not only a technical issue but also a strategic one." In today's digital age, a robust security stance determines how businesses protect their critical data and systems from cyber-attacks. But it goes beyond just protection; it's about leveraging opportunities, like cloud and hybrid networks, to meet business objectives effectively.Addressing the Network Security Skills GapAn under-discussed but equally pressing matter is the widening network security skills gap. As businesses expand and their digital needs become more complex, there is a growing demand for professionals who can navigate the intricate maze of network security. This need calls for investments in training and hiring to ensure businesses are equipped to deal with current and emerging challenges.Key Trends in Network SecurityJames notes some of the latest network security trends that businesses should be aware of:Increased Emphasis on AutomationNetwork automation is becoming increasingly important. Clients are looking at automation as a means to enhance performance, reduce manual interventions, and create a more resilient network infrastructure.Leveraging Tools for Enhanced EfficiencyTools like Terraform and Ansible are making waves in the sector. Businesses are actively incorporating these tools to drive efficiency, scalability, and manageability in their network operations.โ€‹Looking to Hire?The landscape of network security is continually evolving, with new challenges and opportunities emerging almost daily. Understanding these trends and adapting to them is paramount for businesses aiming to thrive in the digital era. If you're on the lookout for professionals who can guide your business through these challenges, don't navigate this journey alone. Request a call back today and partner with experts who are dedicated to propelling your business into a secure digital future.

Read More
Talent Acquisition Trends for Cyber Security Image
Highlights

Talent Acquisition Trends for Cyber Security

โ€‹The Cyber Security industry is becoming increasingly diverse, and the development of new technologies is powering rapid, fast-paced change in the sector. The Cyber Security market in the US is projected to grow by 8.53% from 2023 to 2028, resulting in a market volume of $103.40 billion by 2028. In line with this rapid growth, according to data from Gitnux, the global Cyber Security workforce had a talent gap of 3.5 million workers as of 2021, and womenโ€™s representation in this industry is set to increase from 25% in 2022 to over 35% in 2031.These shifting trends and talent gaps are shaping the way that Cyber Security organizations secure valuable talent to drive them forward. This guide will highlight key methods for improving your own talent acquisition processes to find the right people for your business.The importance of candidate experienceImproving your candidate experience throughout the hiring process is becoming an increasingly important approach in the highly competitive Cyber Security sector. You can improve the experience your candidates receive by communicating effectively and timeously and providing and accepting transparent feedback. Offering a personalized experience to your applicants that focuses on their unique skills, goals, and motivations is also advised.Offer flexibility and remote work opportunitiesMost Cyber Security professionals require remote work flexibility to maintain optimal productivity. These professionals may need to work during off-hours and over weekends and holidays, making remote flexibility essential not only to their workflows, but to the safety of their client organizations as well. Sole Cyber Security professionals may also need to work on-site. Therefore, itโ€™s essential to determine the best flexible working opportunities for candidates based on the nature of their specific roles.Promote diversity and inclusionDiversity and inclusion in the workforce allow for a range of experiences and perspectives to influence workflows and key processes. Diversity can promote improved problem-solving abilities, enhanced innovation, and more creative and pioneering solutions to challenges. Having an inclusive workforce may also help to ensure that Cyber Security solutions are personalized according to the needs of an equally diverse user base.Highlight career progression and growth opportunitiesOffering career growth and progression opportunities to candidates is another highly effective way to attract and retain important talent. According to the 2022 (ISC)ยฒ Cybersecurity Workforce Study, while the global Cyber Security workforce is at a record high with 4.7 million professionals and counting, a further 3.4 million more workers are required to effectively secure key assets.Moreover, with 64% of Cyber Security respondents seeking new skills growth certifications to stay up to date with security trends, offering these certifications will meet the motivations of your talent pool while also assisting you to keep vital talent within your organization.Hire top Cyber Security talent with GlocommsGlocomms is a leading specialist technology recruiter in the Cyber Security industry and beyond. We offer permanent, multi-hire, and contract-based recruitment solutions to the Cyber Security sector to help you locate and retain the talent that your organization needs to thrive. Submit a vacancy or request a call back to discover how we can drive your future growth.

Read More
Empowering Women in Technology: How to Hire More Women in Tech Image
management & culture

Empowering Women in Technology: How to Hire More Women in Tech

โ€‹While women are gaining an ever-strong standing in the Technology workforce, more work is needed to ensure that they enjoy equal opportunity, compensation, and career growth opportunities. According to Deloitte's Women @ Work: A Global Outlook report, while women are becoming better represented in the sector, they still experience non-inclusive behaviors, with 44% of respondents noting that they experienced micro-aggressions or harassment in the workplace in 2023. In this article, we will explore how Tech organizations can empower women, improve their hiring strategies to include more female talent where available, and create a workplace culture that nurtures and supports women in Tech.The importance of diversity in the workplaceDiverse and inclusive workplaces build high-performing teams and motivated, goal-oriented individuals. Todayโ€™s candidates also prioritize and seek out diverse workforces in which they will be accepted, supported, and provided with sufficient growth and development opportunities.Creating a diverse workplace that includes women in the Tech industry will help to create stronger problem-solving approaches and bring new and innovative ideas to your organization.Eliminate unconscious bias in role descriptionsAn important, but often overlooked, factor that contributes to biases in the hiring process is unconscious bias in job titles and role descriptions. Unconscious bias perpetuates assumptions and stereotypes of certain genders, ethnicities, races, ages, and social classes, among other factors. Ensure that you re-frame role descriptions that contain any outdated or gender-biased language to create space for diversity in your hiring process. Use gender neutral pronouns, check your descriptions for biased language, and avoid presenting a โ€˜toxicโ€™ or gender-prejudiced work culture during interviews and communications with applicants.Involve female employees throughout the hiring processWhere possible, introducing your female candidates to current female employees during the hiring and interview processes will assist you in portraying your organization as a diverse and inclusive one. It may also help to improve the hiring experience for female candidates and could help you to attract referrals in the future. Promote family-friendly policiesAccording to Deloitte, women bear the largest responsibility for household tasks. While 88% of the respondents worked full time, almost half of the women polled by Deloitte were also primarily responsible for household tasks such as cooking, cleaning, shopping, or providing care for dependents.Including flexible and family-friendly policies in your hiring process can help to create a more supportive and inclusive work environment for women in the tech industry. Over half of women have noted that working from home has made them more productive, and offering remote working policies could assist your talent in striking a healthier and more sustainable work-life balance while driving your organization forward.Highlight learning and development opportunitiesCareer development is a leading priority for women in tech. Your organizationโ€™s learning and development opportunities and upskilling programs should be highlighted in role descriptions and throughout the hiring process to attract more valuable female candidates.Providing clear pathways for advancement and promoting a culture that values skill development also demonstrates that your company values the career progression and long-term success of its employees. Retaining your workforceOnce you have built a more diverse and inclusive workforce, itโ€™s important to focus on retaining your diverse spectrum of talent. Some of the most significant challenges in retaining talent in the technology industry include a lack of advancement opportunities and a poor work-life balance. To address these concerns, ensure that you provide sufficient career development opportunities and actively promote equal opportunities for advancement into leadership roles for all employees, including women. Additionally, promoting work-life balance through flexible working arrangements and a supportive company culture can help create an environment where current employees feel supported. Find diverse talent with GlocommsGlocomms specializes in assisting technology organizations to secure leading talent for their open roles. Submit a vacancy or request a call back to partner with us and find the right people to support your future in tech.

Read More
Hiring Cyber Security Talent Image
cyber-security

Hiring Cyber Security Talent

There are many verticals we specialize in here at Glocomms across the cyber security space, each with their own unique hiring trends. Here is a brief overview of some of the cyber security developments we are seeing across manufacturing, health technology, media & entertainment, and SaaS. ManufacturingCyber security is a fundamental challenge for any business leader, but manufacturing has officially overtaken financial services, healthcare, and insurance, to become the worldโ€™s most attacked sector[i], due to increases in reconnaissance targeting. As more supply chains and manufacturing facilities embrace digital software for efficiency reasons, there is the dual challenge of losing precious time to mitigating cyber-attacks. This presents the industry with an acute need for more cyber security professionals to prevent such attacks, but with a tight talent pool, competition for the best professionals is high. Europeโ€™s automotive manufacturing and supply chain companies[ii]saw demand rising for cyber security professionals more than any other industry last year. This figure is compiled by GlobalData, whose thematic approach groups company activity to see which organizations can best weather disruptions and tackle issues โ€œthat keeps a CEO awake at night.โ€ Health Technology The threat to healthcare and healthtech from cyber-attacks cannot be understated โ€“ 32% of healthcare security leaders said they had to divert patients to other providers after cyber-attacks, according to Imprivataโ€™s report[iii], a digital identity company for life and mission-critical industries. ECRI[iv], a non-profit that focuses on healthcare technology and safety, also cites cloud security in its list of, โ€˜Top 10 Health Technology Hazards for 2023.โ€™There is a greater need for cyber security professionals who can protect patient data as the healthcare industry becomes more reliant on technology. Medical institutions also need to create a culture of cyber security, to assist cyber experts when they come into the business. Media & EntertainmentYou may recall the leaking of the script for the James Bond movie โ€˜Spectreโ€™[v], which highlighted how vulnerable the media & entertainment industry can be to cyber-attacks. Streaming services such as Netflix have also seen their own customer data breaches, with ransomware authors also becoming more adept at finding vulnerabilities, and thus exploiting them[vi]. So, how can the industry protect itself? Ultimately media & entertainment platforms need to invest in cyber software and professionals. Household names can utilize their brand power to attract talent and invest profits back into internships to enable new talent to enter the market in the future. Thinking long-term and planning for the talent of tomorrow is one strategy to future-proof an organization, because large-scale media & entertainment names cannot afford the reputable fallout of security breaches. SaaSThe popularity of Software-as-a-Service (SaaS) platforms is only going to grow, and the more applications an organization has in its tech stack, the greater the risk of cyber breaches. This means it is crucial to keep up with cyber security developments to maintain customer trust and platform integrity. According to Forbes[vii], โ€œSaaS security is unique because of the velocity of new SaaS being adopted and the decentralized purchasing decision process. These two things combined break the traditional cybersecurity frameworks.โ€While business leaders and CISOs must adopt a risk mindset, whether working for a SaaS company or using one as a customer, the reality is that one way to mitigate cyber threats is to consider hazards outside of the software itself. Cyber experts can be employed to also educate users and have visibility over data transmissions. Often organizations are at the mercy of employees exposing information, therefore businesses must find talent that can not only lead it securely, but also has soft skills in teaching colleagues and training the wider organization on best practice. โ€‹A number of industries are competing for the same cyber security talent. There are different push and pull factors dependent on the individual being hired, so a nuanced approach as opposed to a one-size-fits-all strategy will result in talent being more attracted to a business. To hire the best candidate for your open role,ย get in touchย with Glocommsย today. As a specialist talent partner in Technology, we have access to industry-leading talent around the world. Find the talent you need by submitting your vacancy, orย request a call back to elevate your hiring process with the right talent partner today.

Read More
The Importance of Soft Skills in the AI-Driven Cyber Security Landscape Image
Management & Culture

The Importance of Soft Skills in the AI-Driven Cyber Security Landscape

As we plunge further into the 21st century, the rise of Artificial Intelligence (AI) and Machine Learning (ML) technologies has become an unmistakably dominant force, carving out a new landscape in virtually every industry. Among these industries, cyber security is one of the most significant, where AI-driven solutions have dramatically transformed traditional operations. However, alongside this digital evolution, an often-underestimated aspect continues to hold the key to success: soft skills. In an AI-driven cyber security landscape, human elements such as soft skills have become more crucial than ever.The Rising AI Era in Cyber SecurityThe adoption of AI and ML in cyber security offers enormous potential. It allows security systems to learn, adapt, and respond to cyber threats more swiftly and efficiently than traditional systems. AI-driven models can analyze enormous volumes of data, identify trends, predict potential threats, and automate responses in a way that was unthinkable just a few years ago.These models can tirelessly scrutinize network activity, identifying anomalies that may indicate a cyber-attack. They are also proficient in detecting newer forms of threats, such as zero-day exploits, thereby offering advanced protection to critical systems and data.Why Soft Skills Matter in the AI EraDespite the tremendous potential of AI in cyber security, the role of humans โ€“ and their unique abilities and skills โ€“ remain central to effective security operations. Here's where the importance of soft skills becomes apparent.CommunicationOne of the essential soft skills in the cyber security landscape is effective communication. Cyber security professionals need to be able to explain complex technical concepts in simple terms to non-technical stakeholders. This ability is crucial when it comes to gaining buy-in for security strategies or when explaining the consequences of a data breach. A cyber security expert with strong communication skills can help everyone in the organization understand their role in maintaining security, ultimately creating a stronger, more resilient security environment.Critical ThinkingAI can process data and make decisions faster than any human, but it lacks the capacity for critical thinking. Cyber security professionals need to be able to interpret and understand the significance of the threats detected by AI tools and decide on the best course of action. This requires a deep understanding of the organization's context, its strategic priorities, and the potential implications of different types of cyber threats.CreativityCreativity is a soft skill that is often associated with fields such as art, music, or writing. However, it holds immense value in technical and analytical fields as well, such as cyber security. Creativity in this context refers to the ability to think outside the box, generate innovative solutions, and view problems from unique angles.In essence, creativity in cyber security isn't about artistic flair; it's about innovative thinking, seeing beyond the conventional, and devising unique solutions to complex problems. This ability not only enhances problem-solving capabilities but also contributes to more proactive and robust defense mechanisms against evolving cyber threats.Emotional IntelligenceAI's lack of Emotional Intelligence (EI) presents many hurdles in the cyber security landscape. While AI excels at processing vast amounts of data and identifying patterns, it lacks the nuanced understanding, empathy, and judgement that a person provides with the right soft skills, underscoring the importance of maintaining a human element in the field. Here's why a lack of EI can be problematic:Lack of Nuanced Judgement: While AI can perform tasks based on predefined rules and algorithms, it lacks the ability to apply nuanced judgement that often comes with EI. For instance, an AI might flag a user behavior as suspicious based on certain patterns, but a human with high EI may recognize that the behavior is a result of stress or other emotional factors.Inability to Understand User Emotions: AI systems without EI can't understand user emotions, which is essential in certain aspects of cyber security. For example, phishing attacks often prey on users' emotions, such as fear or curiosity, so only a human could recognize these emotionally charged situations and respond effectively.Impersonal User Interactions: In user-facing roles, lack of EI in AI systems can result in impersonal, ineffective interactions. If a user is frustrated or stressed, an AI system without EI may not be able to adapt its responses to provide effective support or instruction.Ethical Considerations: Cyber security decisions often involve ethical considerations. An AI system without EI would not be able to consider the emotional and ethical implications of certain actions, potentially leading to decisions that could harm individuals or the organization.Inability to Adapt to Emotional Context: In certain cyber security situations, the emotional context can be crucial. For instance, in the midst of a severe cyber-attack, a team might be operating under high stress. An AI system without EI would not understand this context and could continue to send routine alerts or tasks, adding to the team's stress.The Synergy of AI and Soft SkillsWhile AI is transforming the cyber security landscape, it is not replacing the need for talented human professionals. Instead, it is redefining the skills that these professionals need. Soft skills, often overlooked in the tech world, have emerged as critical factors for success in an AI-driven cyber security landscape.By combining the strengths of AI with the soft skills of human professionals, organizations can build a more balanced and effective cyber security operation. AI can handle the heavy data lifting, automating routine tasks and identifying potential threats at speed, while humans can use their soft skills to interpret these threats, communicate effectively, make nuanced decisions, and devise innovative strategies. This synergy is not just desirable โ€“ it is essential.As a leading specialist in tech talent sourcing, we bridge the gap between organizations in need of such multifaceted talent and the professionals who are primed to provide it. We understand that each organization has unique needs, and we tailor our services accordingly, connecting you with the ideal candidates that align with your specific requirements.Our dedicated Cyber Security team at Glocomms is committed to sourcing top-tier talent, equipped with the essential blend of technical prowess and soft skills, to drive your organization's growth in the ever-evolving world of AI-driven cyber security. Request a call back today for a more detailed discussion about how Glocomms can support your cyber security needs.Looking for Talent insights?Navigating the ever-changing landscape of cyber security can be complex. But, with the right insights, you can turn these complexities into your strategic advantage. Here's how Glocomms Cyber Security Insights report can help you:Uncover Key Cyber Security Trends: Learn about the latest market risks and innovative hiring strategies to enhance your defenses and attract top talent.Understand Candidate Priorities: Discover what today's cyber security professionals value most, empowering you to create an appealing work environment that attracts and retains the best.Benefit from Expert Perspectives: Gain unique insights from Katie Owston, Associate Vice President at Glocomms, enhancing your understanding of the field.Receive Actionable Recommendations: Leverage key takeaways tailored to your needs as a hiring manager to bolster your recruitment strategy and nurture talent effectively.Take this opportunity to elevate your cyber security strategy. Download the Glocomms Cyber Security Insights report today and step confidently into the future of cyber security.

Read More
Cyber Security Talent Insights Image
Highlights

Cyber Security Talent Insights

โ€‹The cyber security market is predicted to grow to $266 billion by 2027, but with opportunity comes many risks, disruptions and challenges. With skilled business-critical cyber security professionals in high demand, companies must develop effective hiring solutions to capitalize on the market and protect their systems, networks, and data against cyber attacks and security breaches.In this report, our technology talent experts at Glocomms guide you through:Key trends in cyber security, from market risks to hiring approachesTop priorities for candidates in the cyber security fieldInsights from Katie Owston, Associate Vice President at GlocommsKey takeaways and recommendations for both hiring managers and professionalsDownload your copy of the 'Cyber Security Talent Insights' report by completing the form below:โ€‹โ€‹โ€‹

Read More
Cyber Security Trends to Watch Out For in 2023 Image
cyber-security

Cyber Security Trends to Watch Out For in 2023

โ€‹Whilst the Cyber Security industry has always been known to be constantly evolving, it's undeniable that the rate of change in this sector has accelerated in recent years. A large part of this has been driven by the Coronavirus pandemic, which precipitated a substantial rise in data breaches as increasing numbers of people chose to work remotely, access cloud computing services and use the IoT.In addition, hackers are harnessing the power of machine learning and advanced artificial intelligence (AI) to launch increasingly effective attacks against businesses and financial institutions.These Cyber Security trends may seem very concerning to many, as the sector faces considerable challenges in overcoming the efforts of hackers. However, these issues also present an exciting opportunity for employees in this sector to find innovative solutions. By deploying AI and automated technologies similar to those used by cyber hackers, the Cyber Security industry can help businesses protect both their data and their bottom line.Online data breaches are on the riseThe years following the outbreak of COVID-19 saw a marked increase in the volume of online data breaches. The average total cost of a data breach reached an all-time high of $4.35m in 2022, a 2.6% increase from the average cost of $4.24m recorded in 2021. This is a considerable increase of 12.7% from the $3.86m average cost recorded in the 2020 report. In cases where remote working was identified as a factor in causing the breach, costs were nearly $1m greater than in breaches that donโ€™t involve remote working ($4.99m vs. $4.02m).Asia was the most affected region in 2021, receiving 26% of global attacks, of which 23.2% were targeted at Manufacturing, replacing Financial Services as the most impacted industry. Interestingly, the human element such as a successful phishing attempt or a misuse of credentials, is still a significant factor, accounting for 82% of breaches. According to research conducted by IBM, Microsoft, Apple and Google are the top three brands that cyber criminals attempted to mimic in 2021, seeking to exploit consumer confidence in these companies.Not surprisingly, cybercrime costs are predicted to increase by 15% annually and could exceed $10.5 trillion by 2025. The rise of AIIn the past, hackers operating alone posed the greatest security concern to organizations; however, this is no longer the case. Cyberattacks increasingly involve the use of advanced technologies such as machine learning and AI. A good example of such malware is Emolet, a sophisticated, self-propagating computer program designed to steal banking credentials, which made an unwelcome reappearance in November 2021 after having been enhanced by AI to increase its effectiveness. There is even evidence to suggest that AI can generate phishing emails that are more effective at fooling recipients than humans.On a more positive note, it has been shown that organizations with a fully deployed AI and automation program can identify and contain breaches 28 days faster than those without, saving $3.05 million in costs. It seems clear that the use of artificial intelligence to both make and counter cyberattacks will be one of the most important Cyber Security industry trends going forward.Evolution of Multi-Factor AuthenticationAs ever-increasing numbers of people opt to work from home, the need for Multi-Factor Authentication (MFA) has grown substantially. MFA dramatically increases user security by ensuring that access is granted only after the user has successfully presented two or more factors, or pieces of evidence, for authentication.Valued at over $10bn in 2020, the MFA market is expected to surpass $28bn by 2026.Vulnerability of IoTAccording to the Microsoft Digital Defence Report 2022, IoT (Internet of Things) devices are often targeted by cyberhackers, due to the fact that they serve as entry points to networks and critical infrastructure. The report notes that the security of IOT devices has not strengthened in recent years. Part of the problem is that many IoT devices are not compatible with general Cyber Security tools, leaving them more susceptible to cyberattacks.This is supported by a report issued by Sonic Wall, which found that malware attacks on IoT devices jumped by 77% in the first half of 2022. All indications suggest that cybercriminals will continue exploiting security vulnerabilities in 2023, with action being taken to correct these weaknesses in the midst of escalating attacks. The continued demand for Cyber Security talentIn light of these pressing concerns regarding security threats, Cyber Security professionals are in a strong position to find well-paid work with good security. The number of Cyber Security jobs is expected to increase by 35% between 2021 and 2031 in the USA, and it is estimated that the Cyber Security profession needs to grow by 3.4m people globally to close the global workforce gap.It's a similar story in the UK, where a high proportion of businesses lack staff with the incident response skills that are required to adequately meet their Cyber Security needs. It is estimated that 653,000 businesses (48%) have a basic skills gap in areas such as installing configured firewalls, and that a further 408,000 businesses (30%) have more advanced skills gaps, in areas such as penetration testing, and forensic analysis.It is without doubt that there will be a rapid growth in the demand for Cyber Security professionals globally, with the attractive prospects of generous compensation. Find your next role in Cyber Security, or solve your talent challenges with GlocommsIf youโ€™re looking for the latest job opportunities in Cyber Security, search and apply with Glocomms today. Alternatively, if youโ€™re looking for business-critical talent, request a call back to see how we can help you find the best candidates for the job.โ€‹โ€‹

Read More
Cyber Security Career Path and Progression Image
cyber-security

Cyber Security Career Path and Progression

โ€‹The Cyber Security industry is attracting higher investment year-on-year, with the annual cost of Cyber Security increasing by 22.7% in 2021. Furthermore, the US Bureau of Labor Statistics projects that an Information Security Analyst will be the 8th fastest growing occupation in the next decade. Whilst investors are seeing new opportunities in Cyber Security, there is also an increased demand for Cyber Security professionals, particularly in senior positions, to fill new roles across a broad range of sectors. If youโ€™re a seasoned Cyber Security professional, below are a few key principles to help you navigate the current job market and make a decision thatโ€™s suitable for your goals and aspirations.Senior Cyber Security rolesIn a senior-level role, you would be near or at the pinnacle of your Cyber Security career. The Glocomms Tech Industry Report revealed that over 40% of survey respondents in the Security and Cyber Security sector have been in their current roles for more than two years. However, despite this high retention rate, 46% of respondents are currently seeking new career opportunities.The hiring of Senior Security Specialists is expected to increase by 18% over the next five years. This could rise even further due to the prevalence of technology in the Business sector.A Cyber Security Engineer is one of the fastest growing roles in terms of demand. Itโ€™s projected that there will be 3.5 million job openings in this field by 2025. This enormous demand is driven by the need for increased Cyber Security for businesses in all sectors, as well as a desire to employ professionals that have the ability to lead teams and cope with the demands of both strategic and technical requirements. In terms of the roles available for experienced Cyber Security Engineers, these could include: Senior Manager, Director of IT Security, Senior Manager of IT and Security Compliance, and Senior Director. Whilst Chief Information Security Officer (CISO) is regarded as a senior level position in some companies, other organizations might regard it as mid-level.Mid-level Cyber Security rolesCyber Security professionals, typically spend between five and eight years in mid-level roles before moving on to senior roles. Given the diversity of senior roles, you may find it strategic to move laterally within mid-level roles, gaining additional skills and experience which could open doors to a greater variety of senior-level roles.For example, a Cyber Security Architect is a significant mid-level position that offers different roles on the Cyber Security career path. Those roles include Penetration Testers, Certified Ethical Hackers, and Threat Hunters.Extensive knowledge and experience in these areas is particularly helpful if you are considering a role as a Cyber Security Consultant as a potential next step in your Cyber Security career. You should have good knowledge and understanding of languages such as Python, Linux, Perl, and PowerShell.According to the U.S. Bureau of Labor Statistics, Cyber Security jobs, including that of a Cyber Security Architect, are projected to grow by 35% between 2021 and 2031. This is far greater than average growth in the industry and it highlights the demand for Cyber Security professionals needed to fill these mid-level roles.ย As Cyber Security threats continue to increase, IBM states the average data breach now costs companies $4.35 million. These high costs play a major role in companies seeking to employ Cyber Security talent who can work towards drastically reducing the likelihood of security breaches.Advance your Cyber Security careerThe Cyber Security industry offers significant career progression opportunities to mid-level and senior-level professionals. As a leading specialist talent partner, Glocomms has a range of in-demand roles and opportunities suited to your individual experience and skillset.ย Advance your career by exploring the latest opportunities in Cyber Security with Glocomms. Search and apply today. โ€‹โ€‹

Read More
How to Get Ahead in Cybersecurity Image
cyber-security

How to Get Ahead in Cybersecurity

A career in cybersecurity is one of the most sought after in the tech field and can be a fulfilling and lucrative option for talented and ambitious professionals. Cybersecurity experts play a vital role in keeping their employers and their customers safe while online. But to succeed requires specific qualifications and experience.Here we take a look at how to get ahead in this rewarding field.Where are the jobs?In short, everywhere.From American universities to British Airways and Facebook, hackers have caused havoc for employers throughout 2018. No sector or organization is immune. By 2021 itโ€™s predicted that at current levels of rising demand versus expected candidate availability, there could be a staggeringย 3.5 million open jobs in cybersecurity.Cybersecurity talent is sought after around the globe but in particular:In the UK and Europe, the introduction of the EUโ€™s GDPR (General Data Protection Regulation) more than tripled demand for cybersecurity professionals in 2018. The GDPR is also expected to be one of the top cybersecurity concerns for employers in 2019.Australian and Canadian employers are experiencing serious national skills shortages in the sector.A 28% growth in cybersecurity jobs is predicted from 2016 to 2026 in the US.What about the gender gap?The gender gap is real and not predicted to close any time soon. ย Females are underrepresented in the cybersecurity sector. It is estimated that around 20% of cybersecurity professionals are women but some studies suggest a much lower figure. Deloitteโ€™s global Women in Cyber initiative launched in July 2018 to address this issue and encourage more females to explore a career in the sector. If youโ€™re considering that option, this initiative offers real-life insight from women working in the sector, including advice onย how to build a career in cyber, the potential challenges and the skills needed to succeed.A lucrative careerDemand is pushing up average salaries for cybersecurity professionals, which stands at around c$117,000. Pay forย entry levelย jobs is also soaring. Graduate roles in the US now attract salaries ofย close to $100,000ย per annum, more than in any other sector. Your salary will depend on your level of expertise and experience โ€“ and the specific requirements of a prospective employer. Speak to your recruiter for more detailed advice.A career with securityLike most of the tech sector, cybersecurity is one of the most reliable professions for long-term job security.ย The role ofย Cybersecurityย Engineerย is predicted to become the most in-demand tech job in 2019 but opportunities are varied and numerous. Other roles include security engineer, security analyst, penetration tester, and cryptographer. The emerging role of Chief Cybercrime Officer may also become critical to larger organizations in 2019 as data hacks are expected to rise.The key to success is to stay on top of current trends and develop theย skillsetsย that make you more valuable to employers.ย ย As well as the GDPR, research suggests that theย top cybersecurity concernsย for businesses in 2019 including phishing, ransomware, the cloud and cryptocurrency mining.Have you got what it takes to succeed?If youโ€™re considering a career in this specialistย sector,ย or seeking your next career move, hereโ€™s our advice:A bachelorโ€™s degree in cybersecurity or another field of computer science is essential for most employers. Many cybersecurity professionals move from traditional tech roles, such as systems administratorย intoย more specialized positions through additional training.Forย entry levelย candidates, deciding on your specialization can help to make you more attractive to businesses.Ensure you constantly refresh your skills and invest in your future. Tech is rapidly changing and newย skillsetsย are required constantly.For professionals looking for a leadership role, the same advice applies. Stay ahead of trends in the sector and work on the skills that are needed for your next career move. Acquire the most relevant certifications and training, through online courses or a masterโ€™s degree for example.Networking should be an ongoing strategy to help you to fulfill your long-term career goals. Keep your LinkedIn profile up to date and build professional relationships with people in your field.Speak to a specialist recruiter who knows your sector inside out and is ideally positioned to advise on your next career move.Working with a specialist recruiter like those atย Glocomms,ย can help understand your career options within cybersecurity and make sure you secure a job that is a perfect fit for you. To learn more, get in touch with Glocomms today.โ€‹

Read More

Looking for something specific?

View more blogs