Abstract
This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling analysis, and semantic content analysis were conducted on 9407 CS job advertisements obtained from Indeed.com. The results of the study revealed a total of 10 job titles and 23 skill sets expected by the business world in CS job postings. The first three titles in terms of volume were “Engineer”, “Analyst” and “Specialist”, while the first three skill sets were determined as “Business/Customer services”, “System engineering”, and “Bachelor degree”. In addition, maps showing the relationships between titles and skills were created with a title-skill set matrix. The results of our study can be expected to contribute to candidates and professionals in the field of cyber security, IT organizations, and educational institutions in the cyber security business world by seeing, evaluating, developing, and expanding the current knowledge, skills, and competencies needed in the field.
Similar content being viewed by others
References
Aftergood, S. 2017. Cybersecurity: The cold war online. Nature 547 (7661): 30–31. https://doi.org/10.1038/547030a.
Aggarwal, C. C., & Zhai, C. X. (2013). Mining text data. In Mining text data, vol. 9781461432. https://doi.org/10.1007/978-1-4614-3223-4.
Aken, A., C. Litecky, A. Ahmad, and J. Nelson. 2010. Mining for computing jobs. IEEE Software 27 (1): 78–85. https://doi.org/10.1109/MS.2009.150.
Alferidah, D.K., and N.Z. Jhanjhi. 2020. Cybersecurity ımpact over bigdata and IoT growth. 2020 International conference on computational ıntelligence, ICCI 2020, 103–108. https://doi.org/10.1109/ICCI51257.2020.9247722.
Bell, S., and M. Oudshoorn. 2019. Meeting the demand: Building a cybersecurity degree program with limited resources. Proceedings—Frontiers in education conference, FIE, 2018-Octob. https://doi.org/10.1109/FIE.2018.8659341.
Blažič, B.J. 2022. Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Education and Information Technologies 27 (3): 3011–3036. https://doi.org/10.1007/s10639-021-10704-y.
Blei, D.M., A.Y. Ng, and M.I. Jordan. 2003. Latent Dirichlet allocation. Journal of Machine Learning Research. https://doi.org/10.1016/b978-0-12-411519-4.00006-9.
Boyd, S.W., and A.D. Keromytis. 2004. SQLrand: Preventing SQL injection attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3089: 292–302. https://doi.org/10.1007/978-3-540-24852-1_21.
Brooks, N.G., T.H. Greer, and S.A. Morris. 2018. Information systems security job advertisement analysis: Skills review and implications for information systems curriculum. Journal of Education for Business 93 (5): 213–221. https://doi.org/10.1080/08832323.2018.1446893.
Calderaro, A., and A.J.S. Craig. 2020. Transnational governance of cybersecurity: Policy challenges and global inequalities in cyber capacity building. Third World Quarterly 41 (6): 917–938. https://doi.org/10.1080/01436597.2020.1729729.
Callen, J., and J.E. James. 2020. Cybersecurity engineer: The growing need. Issues in Information Systems 21 (4): 275–284.
Chowdhury, N., and V. Gkioulos. 2021. Key competencies for critical infrastructure cyber-security: A systematic literature review. Information and Computer Security 29 (5): 697–723. https://doi.org/10.1108/ICS-07-2020-0121.
Craigen, D., N. Diakun-Thibault, and R. Purse. 2014. Defining Cybersecurity. Technology Innovation Management Review 4 (10): 13–21.
Cybersecurity Ventures. 2019. The 2019/2020 official annual cybersecurity jobs report. Cybersecurity ventures and herjavec group. Retrieved from https://www.herjavecgroup.com/2019-cybersecurity-jobs-reportcybersecurity-ventures/. Accessed 01 Feb 2023.
Dawson, J., and R. Thomson. 2018. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in Psychology. https://doi.org/10.3389/fpsyg.2018.00744.
De Mauro, A., M. Greco, M. Grimaldi, and P. Ritala. 2018. Human resources for Big Data professions: A systematic classification of job roles and required skill sets. Information Processing and Management 54 (5): 807–817. https://doi.org/10.1016/j.ipm.2017.05.004.
Debortoli, S., O. Müller, and J. Vom Brocke. 2014. Comparing business intelligence and big data skills: A text mining study using job advertisements. Business and Information Systems Engineering 6 (5): 289–300. https://doi.org/10.1007/s12599-014-0344-2.
Dhawan, S.M., B.M. Gupta, and B. Elango. 2021. Global cyber security research output (1998–2019): A scientometric analysis. Science and Technology Libraries 40 (2): 172–189. https://doi.org/10.1080/0194262X.2020.1840487.
Dunn Cavelty, M., and A. Wenger. 2020. Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41 (1): 5–32. https://doi.org/10.1080/13523260.2019.1678855.
Farooq, A., A. Hakkala, S. Virtanen, and J. Isoaho. 2020. Cybersecurity education and skills: Exploring students’ perceptions, preferences and performance in a blended learning initiative. IEEE global engineering education conference, EDUCON, 2020-April, 1361–1369. https://doi.org/10.1109/EDUCON45650.2020.9125213.
Fischer, E.A. 2015. Cybersecurity issues and challenges: In Brief. In Cyberspace threat landscape: Overview, response authorities, and capabilities, 45–54.
Furnell, S. 2021. The cybersecurity workforce and skills. Computers and Security. https://doi.org/10.1016/j.cose.2020.102080.
Furnell, S., and M. Bishop. 2020. Addressing cyber security skills: The spectrum, not the silo. Computer Fraud and Security 2020 (2): 6–11. https://doi.org/10.1016/S1361-3723(20)30017-8.
Furnell, S., P. Fischer, and A. Finch. 2017. Can’t get the staff? The growing need for cyber-security skills. Computer Fraud and Security 2017 (2): 5–10. https://doi.org/10.1016/S1361-3723(17)30013-1.
Gardiner, A., C. Aasheim, P. Rutner, and S. Williams. 2018. Skill requirements in Big Data: A content analysis of job advertisements. Journal of Computer Information Systems 58 (4): 374–384. https://doi.org/10.1080/08874417.2017.1289354.
Graham, C.M., and Y. Lu. 2022. Skills expectations in cybersecurity: Semantic network analysis of job advertisements. Journal of Computer Information Systems 63: 937–949.
Gupta, B.B., A. Tewari, A.K. Jain, and D.P. Agrawal. 2017. Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications 28 (12): 3629–3654. https://doi.org/10.1007/s00521-016-2275-y.
Gurcan, F., and N.E. Cagiltay. 2019. Big Data software engineering: Analysis of knowledge domains and skill sets using LDA-based topic modeling. IEEE Access 7: 82541–82552. https://doi.org/10.1109/ACCESS.2019.2924075.
Gurcan, F., and C. Kose. 2017. Analysis of software engineering industry needs and trends: Implications for education. International Journal of Engineering Education 33 (4): 1361–1368.
Gurcan, F., O. Ozyurt, and N.E. Cagiltay. 2021. Investigation of emerging trends in the E-learning field using latent Dirichlet allocation. International Review of Research in Open and Distance Learning 22 (2): 1–18. https://doi.org/10.19173/irrodl.v22i2.5358.
Hajny, J., S. Ricci, E. Piesarskas, O. Levillain, L. Galletta, and R. De Nicola. 2021. Framework, tools and good practices for cybersecurity curricula. IEEE Access 9: 94723–94747. https://doi.org/10.1109/ACCESS.2021.3093952.
Haney, J.M., and W.G. Lutters. 2021. Cybersecurity advocates: Discovering the characteristics and skills of an emergent role. Information and Computer Security 29 (3): 485–499. https://doi.org/10.1108/ICS-08-2020-0131.
Indeed. 2021. No Title. https://www.indeed.com/about.
(ISC)2. 2018. Hiring and Retaining Top Cybersecurity Talent. Isc2, 17. https://www.isc2.org/-/media/Files/Research/ISC2-Hiring-and-Retaining-Top-Cybersecurity-Talent.ashx.
Jang-Jaccard, J., and S. Nepal. 2014. A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences 80 (5): 973–993. https://doi.org/10.1016/j.jcss.2014.02.005.
Jesse, G.R. 2017. One university’s approach to developing a cybersecurity degree and earn NSA Cae-Cd certification. Issues in Information Systems 18 (3): 170–183. https://doi.org/10.48009/3_iis_2017_170-183.
Jones, K.S., A.S. Namin, and M.E. Armstrong. 2018. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Transactions on Computing Education. https://doi.org/10.1145/3152893.
Kim, D.J., B. Love, and S. Kim. 2020. A comparison study of cybersecurity workforce frameworks and future directions. Advances in Intelligent Systems and Computing. https://doi.org/10.1007/978-3-030-31239-8_8.
Kondrad, M. 2017. No Title. Tmtoolkit—Text mining and topic modeling toolkit for python. https://pypi.org/project/tmtoolkit/0.6.1/.
Kügler, D. 2003. “Man in the middle” attacks on bluetooth. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2742: 149–161. https://doi.org/10.1007/978-3-540-45126-6_11.
Lallie, H.S., L.A. Shepherd, J.R.C. Nurse, A. Erola, G. Epiphaniou, C. Maple, and X. Bellekens. 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security. https://doi.org/10.1016/j.cose.2021.102248.
Li, S., L.. Da. Xu, and S. Zhao. 2015. The internet of things: A survey. Information Systems Frontiers 17 (2): 243–259. https://doi.org/10.1007/s10796-014-9492-7.
Marquardson, J., and A. Elnoshokaty. 2020. Skills, certifications, or degrees: What companies demand for entry-level cybersecurity jobs. Information Systems Education Journal 18 (1): 22–28.
Mimno, D., H.M. Wallach, E. Talley, M. Leenders, and A. McCallum. 2011. Optimizing semantic coherence in topic models. EMNLP 2011—Conference on empirical methods in natural language processing, proceedings of the conference, 262–272.
Miranda, L.C.M., and C.A.S. Lima. 2012. Trends and cycles of the internet evolution and worldwide impacts. Technological Forecasting and Social Change 79 (4): 744–765. https://doi.org/10.1016/j.techfore.2011.09.001.
Ozyurt, O., and A. Ayaz. 2022. Twenty-five years of education and information technologies: Insights from a topic modeling based bibliometric analysis. Education and Information Technologies 27: 11025–11054.
Ozyurt, O., F. Gurcan, G.G.M. Dalveren, and M. Derawi. 2022. Career in cloud computing: Exploratory analysis of in-demand competency areas and skill sets. Applied Sciences 12 (19): 9787.
Papastergiou, S., H. Mouratidis, and E.M. Kalogeraki. 2019. Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE). Communications in Computer and Information Science 1000: 476–487. https://doi.org/10.1007/978-3-030-20257-6_41.
Peslak, A., and D. S. Hunsinger. 2019. What is cybersecurity and what cybersecurity skills are employers seeking?. Issues in Information Systems, 20 (2).
Rahman, N.A.A., I.H. Sairi, N.A.M. Zizi, and F. Khalid. 2020. The importance of cybersecurity education in school. International Journal of Information and Education Technology 10 (5): 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393.
Rainie, L., J. Anderson, and J. Connolly. 2014. Cyber attacks likely to increase. Pew Research Center, October, 63. http://www.pewinternet.org/2014/10/29/cyber-attacks-likely-to-increase/.
Sarker, I.H., A.S.M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng. 2020. Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data. https://doi.org/10.1186/s40537-020-00318-5.
Scala, N.M., A.C. Reilly, P.L. Goethals, and M. Cukier. 2019. Risk and the five hard problems of cybersecurity. Risk Analysis 39 (10): 2119–2126. https://doi.org/10.1111/risa.13309.
Shaw, A. 2010. Data breach: From notification to prevention using PCI dss. Columbia Journal of Law and Social Problems 43 (4): 517–562.
Sigler, K. 2018. Crypto-jacking: How cyber-criminals are exploiting the crypto-currency boom. Computer Fraud and Security 2018 (9): 12–14. https://doi.org/10.1016/S1361-3723(18)30086-1.
Simsim, M.T. 2011. Internet usage and user preferences in Saudi Arabia. Journal of King Saud University - Engineering Sciences 23 (2): 101–107. https://doi.org/10.1016/j.jksues.2011.03.006.
Smith, K.J., G. Dhillon, and L. Carter. 2021. User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. https://doi.org/10.1016/j.ijinfomgt.2020.102123.
Srinivas, J., A.K. Das, and N. Kumar. 2019. Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems 92: 178–188. https://doi.org/10.1016/j.future.2018.09.063.
Sun, N., J. Zhang, P. Rimba, S. Gao, L.Y. Zhang, and Y. Xiang. 2019. Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys and Tutorials 21 (2): 1744–1772. https://doi.org/10.1109/COMST.2018.2885561.
Sussman, L.L. 2021. Exploring the value of non-technical knowledge, skills, and abilities (Ksas) to cybersecurity hiring managers. Journal of Higher Education Theory and Practice 21 (6): 99–117. https://doi.org/10.33423/jhetp.v21i6.4379.
Švábenský, V., P. Čeleda, J. Vykopal, and S. Brišáková. 2021. Cybersecurity knowledge and skills taught in capture the flag challenges. Computers and Security. https://doi.org/10.1016/j.cose.2020.102154.
Smith, T.D., and A. Ali. 2014. Analyzing computer programming job trend using web data mining. Issues in Informing Science and Information Technology 11: 203–214. https://doi.org/10.28945/1989.
Von Solms, R., and J. Van Niekerk. 2013. From information security to cyber security. Computers and Security 38: 97–102. https://doi.org/10.1016/j.cose.2013.04.004.
Warkentin, M., and R. Willison. 2009. Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18 (2): 101–105. https://doi.org/10.1057/ejis.2009.12.
Yang, S.C. 2021. A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schools. Journal of Education for Business 96 (2): 99–110. https://doi.org/10.1080/08832323.2020.1757594.
Yang, S.C., and B. Wen. 2017. Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States. Journal of Education for Business 92 (1): 1–8. https://doi.org/10.1080/08832323.2016.1261790.
Yusif, S., and A. Hafeez-Baig. 2021. A conceptual model for cybersecurity governance. Journal of Applied Security Research 16 (4): 490–513. https://doi.org/10.1080/19361610.2021.1918995.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ozyurt, O., Ayaz, A. Identifying cyber security competencies and skills from online job advertisements through topic modeling. Secur J (2024). https://doi.org/10.1057/s41284-024-00420-w
Accepted:
Published:
DOI: https://doi.org/10.1057/s41284-024-00420-w