SlideShare a Scribd company logo
1 of 6
Cyber Market Insights
Outsource UK
January 2018 Report
• 2017 has had its ups and downs for the cyber security industry, from the WannaCry attack
which hit more than 300,000 computers across the UK, the Equifax breach which affected
694,000 UK customers and has resulted in an FCA investigation and the Uber hack – which
is a lesson in how not to handle a cyber breach!
• It’s also been a year for focus on Government legislation, and we have seen an increase in
roles focussing on cyber security compliance, or GDPR and DPA regulations, as our
customers across all sectors prepare for the impending GDPR legislation that takes affect
from May 25 2018
• Diversity has also been a key focus for our customers, and this year we held two Diversity
Matters events – The 1st in London in June which focussed on Women in Tech, and the 2nd in
November in Manchester which focussed on Diversity & Inclusion of all forms. We have more
events planned in Q2 / Q3 for Bristol, London and Swindon. A short video from our events is
available here https://www.outsource-uk.co.uk/inclusion.asp
• We also exhibited at Cyber UK again in 2017 and were pleased to see the government’s
commitment to making the UK the safest place to do business online and the progress made
so far. CYBERUK 2018 promises to be bigger than ever with a stream planned for Women in
Cyber
• Our Cyber team has also been increased, and welcomes Shirin Fahri who is focussed on
App Sec and Pen Test and we are currently recruiting additional staff. Shirin joins Rosie
Anderson, responsible for Cyber Managers and Senior Appointments and Rebecca Jane
responsible for Identity and Access Management Consultants.
Outsource UK
Cyber Market Update
Rosie Anderson
Cyber Security Manager
Outsource UK
RAnderson@outsource-uk.co.uk
07854 072480
Cyber hiring – 2017 in review
The most in-demand roles in 2017 were Pen Testers and Check Team
Leaders. We have seen these requirements start to change to more Red
Team-focussed activity, or a hybrid of both, and the majority of the roles
need to be customer facing, making them home-based to overcome
location challenges.
The second in-demand roles were unsurprisingly Cyber Security
Management roles. These can be technical management or setting
cyber strategy. We have now separated out these roles from Cyber Risk
Management as this is a different skillset, and a real growth area this year
which we don’t expect to change into 2018.
We are still seeing a large drive in consultancy business (31%) but this
was overtaken in 2017 with Defence taking over 36% of our roles. (It is
worth noting that the CL1 and BAE Systems business is managed from a
different team so isn’t included in these stats)
Our Cyber team also supports Outsource’s key Financial Services
customers (making up 6% of our roles) and has seen an uptake in demand
from Retail Customers (10%).
Most in-demand rolesMost sought after roles
Check Team Leads / Pen Testers 15 %
Cyber Security Managers 13 %
Information Assurance 11 %
Cyber Risk Managers 10 %
SOC 8 %
IAM including CyberArk & Sailpoint 8 %
Security Architects 7 %
Cyber Compliance / Data Privacy 7 %
Security Engineers 6 %
Software Engineers 4.5 %
Vulnerability Analysts 3.5 %
Crypto Engineers 3 %
Cyber Pre-Sales 2 %
ICS Security 2 %
Data taken from no. of roles logged with Outsource UK Jan-Dec 2017
Compliance Spotlight from Vicky
The changes we saw in 2017 to legislation around IR35 in the Public Sector shifted the
responsibility to make an IR35 status assessment for each assignment from a Limited
company to the agency and end client, which has had an impact on government
projects. In the Autumn budget, the government revealed their possible intention to
press ahead with controversial plans to further target perceived tax avoidance by off-
payroll workers by introducing new IR35 assessment rules into the Private sector.
Outsource can help you to understand the rules around IR35 assessments, and offer
practical guidance on how to correctly engage with workers who are genuinely
operating outside of IR35. Schedule a call with our Compliance Manager today!
Job Title Median
Permanent Salary
Contract Day Rate
* Exclusive of agency fees
Identity & Access Management Consultant £65,000 per annum £525 per day
Cyber Ark Consultant £82,500 per annum £550 per day
SOC Analyst £45,000 per annum £463 per day
SOC Manager £75,000 per annum £675 per day
Penetration Tester £67,500 per annum £538 per day
Check Team Leader £80,000 per annum £650 per day
Compliance / Data Privacy Consultant £62,500 per annum £475 per day
Security Engineers £52,500 per annum £475 per day
Vulnerability Analysts £50,000 per annum £463 per day
Cyber Security Manager £75,000 per annum £500 per day
Cyber Threat Manager £80,000 per annum £575 per day
CCP Information Assurance Consultant £57,500 per annum £550 per day
Cyber Security Architect £73,750 per annum £601 per day
Cryptography Engineer £75,000 per annum £510 per day
Cyber Security Risk Manager £70,000 per annum £500 per day
Dates for your
2018 diary
26 Jan Bsides Leeds
10-12 April Cyber UK
Conference
Manchester
19-20 June TriCyCIS
Conference
Royal Holloway
University
Q2 / Q3
Outsource Diversity
& Inclusion events
planned for London /
Bristol / Swindon
Q2 / Q3
Bsides
Manchester &
London
Salary & Rate Survey - UK Averages
• Despite the implementation date being 25 May 2018 for GDPR, this date will creep up on the
majority of UK companies with the prediction being that ¾ SMEs are not ready for GDPR
compliance. Regulators will not audit for GDPR compliance, so organisations are vulnerable to
fines only if there is a breach or an EU citizen files a complaint.
• GDPR regulators (the ICO in the UK) will quickly make an example of an organisation. In
Equifax’s case, under the GDPR regime — the company might have faced a fine of around
$62.9M if it hadn’t reported this data breach multiple weeks sooner than it chose to.
• The Equifax and Anthem breaches were wake up calls for many consumers, who are now
asking questions about the safety of online accounts. This has helped to increase awareness
about password alternatives or enhancements, like Multi factor authentication or risk-based
authentications, and consumers are aware that passwords alone are no longer good enough.
This is important, as companies often cite a lack of demand for stronger authentication as a
reason for not offering it, in case it degrades the customer experience.
• State-sponsored attacks will increase – North Korea, Iran and Russia don’t have much to lose
by continuing their attempts to extort, steal, spy and disrupt by infiltrating information systems.
One area of particular concern is critical infrastructure such as power and communications grids
and the chaos that widespread outages would cause. CRASHOVERRIDE, aka, Industroyer, is
the fourth family of malware publically identified as targeting industrial control systems (ICS). It
uses a modular design, with payloads that target several industrial communication protocols
and are capable of directly controlling switches and circuit breakers. Additional modules include
a data-wiping component and a module capable of causing a denial of service (DoS) to
Siemens SIPROTEC devices.
• Botnets attacks via IOT devices will continue to become more sophisticated. The 3 top botnet
kits – Andromeda, Gamarue and Wauchos are estimated to be responsible for compromising
more than a million devices a month. The Reaper botnet has infected more than a million
devices.
Predictions for 2018
Stats for 2017
Over 4 billion will be online by 2020
58% of UK Businesses sort advice,
information or guidance of cyber
security threats from the past year
200 Billion – The number of IOT
devices that will need securing by
2020, from fridges to thermostats.
140 days is the average number of
days that hackers stay hidden on a
network
59% of employees steal proprietary
corporate date when they quit or
are fired
% of UK businesses that
experienced a cyber breach in the
last 12 months
• 38% of micro firms
• 52% of small businesses
• 66% of medium businesses
• 68% of large organisation
Outsource UK
Taking care of everything
Rosie Anderson
Cyber Security Manager
Outsource UK
RAnderson@outsource-uk.co.uk
07854 072480

More Related Content

Recently uploaded

WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024Hector Del Castillo, CPM, CPMM
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfrach3246
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样qyguxu
 
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样qyguxu
 
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样muwyto
 
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证B
 
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样qyguxu
 
Kathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleenMcBride8
 
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样qyguxu
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfrach3246
 
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样qyguxu
 
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证gkyvm
 
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样qyguxu
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证vflw6bsde
 
Rachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel Ochsenschlager
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样muwyto
 
unit-5-final-cn-unit-5-notes-important-questions.pdf
unit-5-final-cn-unit-5-notes-important-questions.pdfunit-5-final-cn-unit-5-notes-important-questions.pdf
unit-5-final-cn-unit-5-notes-important-questions.pdfradheeshyam1176
 
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样muwyto
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfparaspiyush3
 

Recently uploaded (20)

WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
 
The Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near DunlopThe Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near Dunlop
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
 
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样
如何办理(CSU毕业证书)圣马科斯分校毕业证成绩单原件一模一样
 
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样
如何办理(UdeM毕业证书)蒙特利尔大学毕业证成绩单原件一模一样
 
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
 
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
 
Kathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdf
 
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
 
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
 
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)滑铁卢大学毕业证成绩单原件一模一样
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
 
Rachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docx
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样
如何办理(CQU毕业证书)中央昆士兰大学毕业证成绩单原件一模一样
 
unit-5-final-cn-unit-5-notes-important-questions.pdf
unit-5-final-cn-unit-5-notes-important-questions.pdfunit-5-final-cn-unit-5-notes-important-questions.pdf
unit-5-final-cn-unit-5-notes-important-questions.pdf
 
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样
如何办理(UW毕业证书)西雅图华盛顿大学毕业证成绩单原件一模一样
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Cyber market insights 2018

  • 1. Cyber Market Insights Outsource UK January 2018 Report
  • 2. • 2017 has had its ups and downs for the cyber security industry, from the WannaCry attack which hit more than 300,000 computers across the UK, the Equifax breach which affected 694,000 UK customers and has resulted in an FCA investigation and the Uber hack – which is a lesson in how not to handle a cyber breach! • It’s also been a year for focus on Government legislation, and we have seen an increase in roles focussing on cyber security compliance, or GDPR and DPA regulations, as our customers across all sectors prepare for the impending GDPR legislation that takes affect from May 25 2018 • Diversity has also been a key focus for our customers, and this year we held two Diversity Matters events – The 1st in London in June which focussed on Women in Tech, and the 2nd in November in Manchester which focussed on Diversity & Inclusion of all forms. We have more events planned in Q2 / Q3 for Bristol, London and Swindon. A short video from our events is available here https://www.outsource-uk.co.uk/inclusion.asp • We also exhibited at Cyber UK again in 2017 and were pleased to see the government’s commitment to making the UK the safest place to do business online and the progress made so far. CYBERUK 2018 promises to be bigger than ever with a stream planned for Women in Cyber • Our Cyber team has also been increased, and welcomes Shirin Fahri who is focussed on App Sec and Pen Test and we are currently recruiting additional staff. Shirin joins Rosie Anderson, responsible for Cyber Managers and Senior Appointments and Rebecca Jane responsible for Identity and Access Management Consultants. Outsource UK Cyber Market Update Rosie Anderson Cyber Security Manager Outsource UK RAnderson@outsource-uk.co.uk 07854 072480
  • 3. Cyber hiring – 2017 in review The most in-demand roles in 2017 were Pen Testers and Check Team Leaders. We have seen these requirements start to change to more Red Team-focussed activity, or a hybrid of both, and the majority of the roles need to be customer facing, making them home-based to overcome location challenges. The second in-demand roles were unsurprisingly Cyber Security Management roles. These can be technical management or setting cyber strategy. We have now separated out these roles from Cyber Risk Management as this is a different skillset, and a real growth area this year which we don’t expect to change into 2018. We are still seeing a large drive in consultancy business (31%) but this was overtaken in 2017 with Defence taking over 36% of our roles. (It is worth noting that the CL1 and BAE Systems business is managed from a different team so isn’t included in these stats) Our Cyber team also supports Outsource’s key Financial Services customers (making up 6% of our roles) and has seen an uptake in demand from Retail Customers (10%). Most in-demand rolesMost sought after roles Check Team Leads / Pen Testers 15 % Cyber Security Managers 13 % Information Assurance 11 % Cyber Risk Managers 10 % SOC 8 % IAM including CyberArk & Sailpoint 8 % Security Architects 7 % Cyber Compliance / Data Privacy 7 % Security Engineers 6 % Software Engineers 4.5 % Vulnerability Analysts 3.5 % Crypto Engineers 3 % Cyber Pre-Sales 2 % ICS Security 2 % Data taken from no. of roles logged with Outsource UK Jan-Dec 2017 Compliance Spotlight from Vicky The changes we saw in 2017 to legislation around IR35 in the Public Sector shifted the responsibility to make an IR35 status assessment for each assignment from a Limited company to the agency and end client, which has had an impact on government projects. In the Autumn budget, the government revealed their possible intention to press ahead with controversial plans to further target perceived tax avoidance by off- payroll workers by introducing new IR35 assessment rules into the Private sector. Outsource can help you to understand the rules around IR35 assessments, and offer practical guidance on how to correctly engage with workers who are genuinely operating outside of IR35. Schedule a call with our Compliance Manager today!
  • 4. Job Title Median Permanent Salary Contract Day Rate * Exclusive of agency fees Identity & Access Management Consultant £65,000 per annum £525 per day Cyber Ark Consultant £82,500 per annum £550 per day SOC Analyst £45,000 per annum £463 per day SOC Manager £75,000 per annum £675 per day Penetration Tester £67,500 per annum £538 per day Check Team Leader £80,000 per annum £650 per day Compliance / Data Privacy Consultant £62,500 per annum £475 per day Security Engineers £52,500 per annum £475 per day Vulnerability Analysts £50,000 per annum £463 per day Cyber Security Manager £75,000 per annum £500 per day Cyber Threat Manager £80,000 per annum £575 per day CCP Information Assurance Consultant £57,500 per annum £550 per day Cyber Security Architect £73,750 per annum £601 per day Cryptography Engineer £75,000 per annum £510 per day Cyber Security Risk Manager £70,000 per annum £500 per day Dates for your 2018 diary 26 Jan Bsides Leeds 10-12 April Cyber UK Conference Manchester 19-20 June TriCyCIS Conference Royal Holloway University Q2 / Q3 Outsource Diversity & Inclusion events planned for London / Bristol / Swindon Q2 / Q3 Bsides Manchester & London Salary & Rate Survey - UK Averages
  • 5. • Despite the implementation date being 25 May 2018 for GDPR, this date will creep up on the majority of UK companies with the prediction being that ¾ SMEs are not ready for GDPR compliance. Regulators will not audit for GDPR compliance, so organisations are vulnerable to fines only if there is a breach or an EU citizen files a complaint. • GDPR regulators (the ICO in the UK) will quickly make an example of an organisation. In Equifax’s case, under the GDPR regime — the company might have faced a fine of around $62.9M if it hadn’t reported this data breach multiple weeks sooner than it chose to. • The Equifax and Anthem breaches were wake up calls for many consumers, who are now asking questions about the safety of online accounts. This has helped to increase awareness about password alternatives or enhancements, like Multi factor authentication or risk-based authentications, and consumers are aware that passwords alone are no longer good enough. This is important, as companies often cite a lack of demand for stronger authentication as a reason for not offering it, in case it degrades the customer experience. • State-sponsored attacks will increase – North Korea, Iran and Russia don’t have much to lose by continuing their attempts to extort, steal, spy and disrupt by infiltrating information systems. One area of particular concern is critical infrastructure such as power and communications grids and the chaos that widespread outages would cause. CRASHOVERRIDE, aka, Industroyer, is the fourth family of malware publically identified as targeting industrial control systems (ICS). It uses a modular design, with payloads that target several industrial communication protocols and are capable of directly controlling switches and circuit breakers. Additional modules include a data-wiping component and a module capable of causing a denial of service (DoS) to Siemens SIPROTEC devices. • Botnets attacks via IOT devices will continue to become more sophisticated. The 3 top botnet kits – Andromeda, Gamarue and Wauchos are estimated to be responsible for compromising more than a million devices a month. The Reaper botnet has infected more than a million devices. Predictions for 2018 Stats for 2017 Over 4 billion will be online by 2020 58% of UK Businesses sort advice, information or guidance of cyber security threats from the past year 200 Billion – The number of IOT devices that will need securing by 2020, from fridges to thermostats. 140 days is the average number of days that hackers stay hidden on a network 59% of employees steal proprietary corporate date when they quit or are fired % of UK businesses that experienced a cyber breach in the last 12 months • 38% of micro firms • 52% of small businesses • 66% of medium businesses • 68% of large organisation
  • 6. Outsource UK Taking care of everything Rosie Anderson Cyber Security Manager Outsource UK RAnderson@outsource-uk.co.uk 07854 072480