2014
DOI: 10.7249/rr430
|View full text |Cite
|
Sign up to set email alerts
|

Hackers Wanted: An Examination of the Cybersecurity Labor Market

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 13 publications
0
19
0
Order By: Relevance
“…The problem with this tactic is the danger of creating a revolving door. Highly qualified military personnel can leave the service and then get hired as civilians, doing the same jobs for more money (Libicki, Senty, and Pollak 2014). The DOD is given end strength authorization by Congress annually through a Defense Authorization Act.…”
Section: Introductionmentioning
confidence: 99%
“…The problem with this tactic is the danger of creating a revolving door. Highly qualified military personnel can leave the service and then get hired as civilians, doing the same jobs for more money (Libicki, Senty, and Pollak 2014). The DOD is given end strength authorization by Congress annually through a Defense Authorization Act.…”
Section: Introductionmentioning
confidence: 99%
“…During the past decade, the demand for cyber security specialists has increase sharply, but the supply of qualified workers remains insufficient to respond to the needs of government agencies and the private sector in the United States and abroad (Evans and Reeder 2010;Libicki, Senty and Pollack 2014). Despite the fact that thousands of positions are still unfilled in 2015, and thousands more will be created in the years ahead, most developed countries have not developed a comprehensive strategy to prepare the cyber security workforce.…”
Section: Emerging Challengesmentioning
confidence: 98%
“…378 Perhaps the most convincing argument, however, is that DHS is already using them. A 2012 Homeland Security Advisory Council report submitted by the Cyber Skills Task Force stated that DHS has used cybersecurity contractors to fill such jobs as security engineers, reverse engineers, and penetration testers.…”
Section: The Benefits Of a Contractor-based Approachmentioning
confidence: 99%
“…373 For more than two decades, the federal government has overcome the difficulty associated with hiring extremely skilled workers by outsourcing their work to private contractors. 374 Contractors, however, can offer market prices to skilled workers who can provide qualified personnel not available within the government. 375 According to Booz Allen Hamilton, private contractors make up the majority of DHS cybersecurity workers.…”
Section: The Benefits Of a Contractor-based Approachmentioning
confidence: 99%