Advertisement

Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa

  • Amaanullah ParkerEmail author
  • Irwin BrownEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 973)

Abstract

With cybercrime increasing at a rapid rate due to the improvement in technologies, cyber security has become a global matter of interest. Cyber security professionals protect organisations from cybercrime and other cyber threats. A shortage of skills has increased the demand for cyber security professionals. This research study examines the skills, knowledge and qualification requirements that are required of a cyber security professional in South Africa. 196 unique job advertisements from 5 job portal websites were collected. A content analysis of the advertisements show that cyber security professionals require technical and interpersonal skills amongst others. Organisations looking to employ cyber security professionals require most professionals to have a Bachelor degree in either Computer Science, Information Systems or Engineering as a minimum qualification along with industry certifications. This paper is an initial exploratory study that can serve as a basis for more specific studies in future.

Keywords

Cyber-security Qualifications Skills Roles Cyber-security South Africa 

References

  1. 1.
    Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)CrossRefGoogle Scholar
  2. 2.
    Patrick, H., Fields, Z.: A need for cyber security creativity. In: Collective Creativity for Responsible and Sustainable Business Practice, pp. 42–61. IGI Global (2017)Google Scholar
  3. 3.
    Fourie, L., Sarrafzadeh, A., Pang, S., Kingston, T., Watters, P.: The global cyber security workforce - an ongoing human capital crisis. In: Global Business and Technology Association Conference, pp. 173–184 (2014)Google Scholar
  4. 4.
    Potter, L.E., Vickers, G.: What skills do you need to work in cyber security? In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015, pp. 67–72 (2015)Google Scholar
  5. 5.
    Newhouse, W., Keith, S., Scribner, B., Witte, G.: National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2017)Google Scholar
  6. 6.
    Hsiao, D.R., Kerr, D.S., Madnick, S.E.: Computer Security. Academic Press, New York (2014)Google Scholar
  7. 7.
    Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, New York (2011)Google Scholar
  8. 8.
    Andress, J.: The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd edn. Elsevier Inc., Amsterdam (2014)Google Scholar
  9. 9.
    Disterer, G.: ISO/IEC 27000, 27001 and 27002 for information security management. J. Inf. Secur. 4, 92–100 (2013)Google Scholar
  10. 10.
    Cherdantseva, Y., Hilton, J.: A reference model of information assurance & security. In: 2013 International Conference on Availability, Reliability and Security, pp. 546–555, September 2013Google Scholar
  11. 11.
    Walls, A., Perkins, E., Weiss, J.: Definition: Cybersecurity, Gartner, pp. 1–5, June 2013Google Scholar
  12. 12.
    Bai, Y., Wang, X.: Teaching offensive security in a virtual environment. J. Comput. Sci. Coll. 31(1), 140–142 (2015)Google Scholar
  13. 13.
    Engebreston, P.: The Basics of Hacking and Penetration Testing, 2nd edn. Syngress, USA (2013)Google Scholar
  14. 14.
    Yeo, J.: Using penetration testing to enhance your company’s security. Comput. Fraud Secur. 2013(4), 17–20 (2013)CrossRefGoogle Scholar
  15. 15.
    Timchenko, M., Starobinski, D.: A simple laboratory environment for real-world offensive security education. In: SIGCSE 2015 – Proceedings of the 46th ACM Technical Symposium on Computer Science Education, pp. 657–662 (2015)Google Scholar
  16. 16.
    Grobler, M., Van Vuuren, J.J.: Broadband broadens scope for cyber crime in Africa. In: Proceedings of the 2010 Information Security South Africa Conference, ISSA 2010 (2010)Google Scholar
  17. 17.
    Kent, C., Tanner, M., Kabanda, S.: How South African SMEs address cyber security: the case of web server logs and intrusion detection. In: 2016 International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies, EmergiTech 2016, pp. 100–105 (2016)Google Scholar
  18. 18.
    Flynn, A., Davis, P.: Investigating the effect of tendering capabilities on SME activity and performance in public contract competitions. Int. Small Bus. J. 35(4), 449–469 (2017)CrossRefGoogle Scholar
  19. 19.
    Mbelli, T., Dwolatzky, B.: Cyber security, a threat to cyber banking in South Africa: an approach to network and application security. In: 2016 IEEE 3rd International, pp. 1–6 (2016)Google Scholar
  20. 20.
    Irons, A., Ophoff, J.: Aspects of digital forensics in South Africa. Interdiscip. J. Inf. Knowl. Manag. 11(2014), 273–283 (2016)Google Scholar
  21. 21.
    Kritzinger, E.: Short-term initiatives for enhancing cyber-safety within South African schools. South African Comput. J. 28(1), 1–17 (2016)CrossRefGoogle Scholar
  22. 22.
    Ben-Asher, N., Gonzalez, C.: Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48, 51–61 (2015)CrossRefGoogle Scholar
  23. 23.
    Sonteya, T., Seymour, L.: Towards an understanding of the business process analyst: an analysis of competencies. J. Inf. Technol. Educ. Res. 11, 43–63 (2012)Google Scholar
  24. 24.
    Tanner, M., Seymour, L.: The range and level of software development skills needed in the Western Cape, South Africa. In: Proceedings of the e-Skills for Knowledge Production and Innovation Conference 2014, pp. 487–505 (2014)Google Scholar
  25. 25.
    De Jager, T., Brown, I.: A descriptive categorized typology of requisite skills for business intelligence professionals. In: ACM International Conference Proceeding Series, 26–28 September (2016)Google Scholar
  26. 26.
    Alexander, A., Cummings, J.: The rise of the chief information security officer. People Strateg. 39(1), 10–13 (2016)Google Scholar
  27. 27.
    Caldwell, T.: Plugging the cyber-security skills gap. Comput. Fraud Secur. 2013(7), 5–10 (2013)CrossRefGoogle Scholar
  28. 28.
    Park, J., Lu, C., Mario, L.: Cataloging professionals in the digital environment: a content analysis of job descriptions. J. Am. Soc. Inf. Sci. Technol. 60(4), 844–857 (2009)CrossRefGoogle Scholar
  29. 29.
    Ndwandwe, S.C., Onyancha, O.B.: Job functions and requirements for knowledge managers: lessons for Library and Information Science (LIS) schools in South Africa. Mousaion 2(29), 211–226 (2011)Google Scholar
  30. 30.
    Parez, M., Silva, K., Harvey, D., Bosco, S.: Linked into a job? the ethical considerations of recruiting through linkedin. In: Proceedings for the Northeast Region Decision Sciences Institute, pp. 953–961 (2013)Google Scholar
  31. 31.
    Labadarios, D., et al.: The National Food Consumption Survey (NFCS): South Africa, 1999. Public Health Nutr. 8(05), 533–543 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information SystemsUniversity of Cape TownCape TownSouth Africa

Personalised recommendations