Saudi Press

Saudi Arabia and the world
Saturday, Feb 07, 2026

How to get a lucrative job in cybersecurity

How to get a lucrative job in cybersecurity

One of Oscar Anaya's earliest successful hacks was in to a personal computer he shared with his older sister when he was 11 years old.

"My sister wanted to play some weird game on the computer and didn't want me to use it, so she locked it with a password," he says.

Undaunted, he began turning the machine off and on again, which led him to discover Safe Mode in Windows XP. "It allowed me to log in as the administrator of the personal computer and change the password," he says.

"My sister was baffled when she got home," he adds. "She wondered how I got in."

This early hack by Mr Anaya was just the beginning of his circuitous route into his career as an IT security, or cybersecurity, professional. His route took him from music producer to security alarm installer to an apprentice on a hacking programme.

"I've always looked at things and thought, 'How can someone abuse it?'" he says.

"That's the root of a hacker - to find how things can operate in ways they were not intended to."

As much as he wanted to work in cybersecurity, it seemed this would be an unfulfilled dream until he began actively looking for jobs in the field at the urging of his pregnant wife.

Eventually he ended up on a cybersecurity apprenticeship run by IBM in 2019. Based in Texas, he now has a full-time position with the company's X-Force Red team as a hardware hacker - hired to try to deliberately break into company systems and expose vulnerabilities.

Mr Anaya's journey is an example of one of the many diverse paths that might lead you in to a career in cybersecurity.

It's a well-paid profession. The average salary for a cybersecurity professional in Europe is around €62,000 (£54,000; $74,000), according to (ISC)², the US organisation which administers the Certified Information Systems Security Professional (CISSP) certification exam.

The sector is booming but there is still an acute shortage of cybersecurity staff

And there are still many many roles that need filling, although the workforce gap dropped from four million in 2019 to 3.1 million in 2020 according to (ISC)².

"The market is huge," says Ida Byrd-Hill, chief executive and founder of Automation Workz, a Detroit-based re-skilling and diversity consulting firm.

"With all the attacks and data breaches and data leaks, there's a lot of need for cybersecurity people," she says.

This acute demand has begun to drive hiring trends. "What recruiters are looking for is starting to shift," says Clar Rosso, chief executive of (ISC)².

"Organisations are facing the stark reality of the cybersecurity [skills] gap, so they've started thinking differently about who they're recruiting," she says.

"That starts with a mindset shift that is focused on the idea that technical skills can be taught, but there are other critical skills for cybersecurity professionals that are harder to teach," she continues. "Those are things like analytical and critical thinking, problem solving, and the ability to work well as both an individual and in a team."

Ms Rosso says a recent study found that more than half of individuals entering the cybersecurity profession now come from non-IT, or computer science, backgrounds.

A shift in approach to recruitment has been embraced by some very large companies.

"Paths into cybersecurity can vary hugely," says Wil Rockall, UK lead on cyber talent at Deloitte, a global professional services company.

"Some people have a technical education, degree courses and [training] programmes in cybersecurity, but the majority of our hires come from non-technical backgrounds," he says. "We focus on talent development. We have a path within the firm around how we can develop a person's soft skills and technical skills, as a person goes through their career."

He adds: "It's a broad industry. Security encompasses a whole number of different things so there's lots of different industries where people have transferrable skills."

Mr Rockall says the sector has changed a lot in the last two decades. "It's not about guys in hoodies tapping away on keyboards doing technical things. It's a business function so you need people with business skills."

Some common career paths from other industries in to the sector include people who have previously worked in penetration testing (ethical hacking); or as a compliance analyst; security consultant; security operations or threat intelligence analyst.

"These paths range in core competencies. From very technical roles that are a natural fit for someone with an engineering background, to roles that are more process, data and analytics oriented," explains Melanie Kruger, vice president of talent at Red Canary, a cloud-based security services provider.

"When considering which path is right for you," she says, "I would advise creating an inventory of the skills you are most energised using in your current role."

While the cybersecurity labour shortage isn't going to disappear any time soon, experts agree that broadening the candidate pool will be crucial in addressing the shortage.

"What that means now is pulling people out of adjacent disciplines and retraining them, or helping colleges improve their training so there's a better pipeline," explained Paul Farnsworth, Chief Technology Officer at the DHI Group, parent of the Dice high-tech job website.

Companies are retraining staff from other areas to go into cybersecurity says Paul Farnsworth

Jim Johnson, a senior vice president in the technology division of Robert Half, a national professional staffing firm, adds that businesses need to be more proactive in expanding their talent pool.

"Companies need to be engaged in their communities, with their local schools and networking groups and support them and help drive that audience, and help create the talent pool," he says.

"Part of that is offering internships or real world experience for students. It's going to help students ramp up much more quickly."

Heather Ricciuto, academic and talent outreach lead at IBM Security, says several years ago IBM came to the realisation that it could no longer keep looking for staff in the same old places.

IBM had to look in new places for cybersecurity staff says Heather Ricciuto

"We couldn't keep trying to hire folks with bachelors and masters degrees from top-tier universities. We recognised we had to start looking at the non-traditional talent pool," she says.

"We've been hiring people with college certificates, associate degrees, boot camp graduates, free online training, self-learning. And people who come in through apprenticeship programmes.

"There are so many unfilled cybersecurity jobs around the world, we couldn't possibly fill them all with university graduates. There just isn't enough people graduating with the right skills to fill all the open positions."

Diversity will also play an important role in expanding the pool much further and bridging the skills gap.

"Diversity is massively important," says Mr Rockall. "We're not solving a single problem that has a single answer."

"We work in dynamically evolving environment where attackers are trying to find diverse ways of disrupting our clients," he says. "So it's really important that we have a diversity of thought and a diversity of approach to think of new ways of combatting that."

Newsletter

Related Articles

Saudi Press
0:00
0:00
Close
Apple iPhone Lockdown Mode blocks FBI data access in journalist device seizure
Foreign Governments and Corporations Spend Millions with Trump-Linked Lobbying Firm in Washington
KPMG Urges Auditor to Relay AI Cost Savings
Saudi Arabia Quietly Allows Wealthy Foreign Residents to Buy Alcohol, Signalling Policy Shift
US and Iran to Begin Nuclear Talks in Oman
China unveils plans for a 'Death Star' capable of launching missile strikes from space
Investigation Launched at Winter Olympics Over Ski Jumpers Injecting Hyaluronic Acid
U.S. State Department Issues Urgent Travel Warning for Citizens to Leave Iran Immediately
Wall Street Erases All Gains of 2026; Bitcoin Plummets 14% to $63,000
Eighty-one-year-old man in the United States fatally shoots Uber driver after scam threat
German Chancellor Friedrich Merz Begins Strategic Gulf Tour with Saudi Arabia Visit
Dubai Awards Tunnel Contract for Dubai Loop as Boring Company Plans Pilot Network
Five Key Takeaways From President Erdoğan’s Strategic Visit to Saudi Arabia
AI Invented “Hot Springs” — Tourists Arrived and Were Shocked
Erdoğan’s Saudi Arabia Visit Focuses on Trade, Investment and Strategic Cooperation
Germany and Saudi Arabia Move to Deepen Energy Cooperation Amid Global Transition
Saudi Aviation Records Historic Passenger Traffic in 2025 and Sets Sights on Further Growth in 2026
Tech Market Shifts and AI Investment Surge Drive Global Innovation and Layoffs
Global Shifts in War, Trade, Energy and Security Mark Major International Developments
Tesla Ends Model S and X Production and Sends $2 Billion to xAI as 2025 Revenue Declines
The AI Hiring Doom Loop — Algorithmic Recruiting Filters Out Top Talent and Rewards Average or Fake Candidates
Federal Reserve Holds Interest Rate at 3.75% as Powell Faces DOJ Criminal Investigation During 2026 Decision
Putin’s Four-Year Ukraine Invasion Cost: Russia’s Mass Casualty Attrition and the Donbas Security-Guarantee Tradeoff
Saudi Crown Prince Tells Iranian President: Kingdom Will Not Host Attacks Against Iran
U.S. Central Command Announces Regional Air Exercise as Iran Unveils Drone Carrier Footage
Trump Defends Saudi Crown Prince in Heated Exchange After Reporter Questions Khashoggi Murder and 9/11 Links
Saudi Stocks Rally as Kingdom Prepares to Fully Open Capital Market to Global Investors
Air France and KLM Suspend Multiple Middle East Routes as Regional Tensions Disrupt Aviation
Saudi Arabia scales back Neom as The Line is redesigned and Trojena downsized
Saudi Industrial Group Completes One Point Three Billion Dollar Acquisition of South Africa’s Barloworld
Saudi-Backed LIV Golf Confirms Return to Trump National Bedminster for 2026 Season
Gold Jumps More Than 8% in a Week as the Dollar Slides Amid Greenland Tariff Dispute
Boston Dynamics Atlas humanoid robot and LG CLOiD home robot: the platform lock-in fight to control Physical AI
United States under President Donald Trump completes withdrawal from the World Health Organization: health sovereignty versus global outbreak early-warning access
Trump Administration’s Iran Military Buildup and Sanctions Campaign Puts Deterrence Credibility on the Line
Tech Brief: AI Compute, Chips, and Platform Power Moves Driving Today’s Market Narrative
NATO’s Stress Test Under Trump: Alliance Credibility, Burden-Sharing, and the Fight Over Strategic Territory
Saudi Arabia’s Careful Balancing Act in Relations with Israel Amid Regional and Domestic Pressures
Greenland, Gaza, and Global Leverage: Today’s 10 Power Stories Shaping Markets and Security
America’s Venezuela Oil Grip Meets China’s Demand: Market Power, Legal Shockwaves, and the New Rules of Energy Leverage
Trump’s Board of Peace: Breakthrough Diplomacy or a Hostile Takeover of Global Order?
Prince William to Make Official Visit to Saudi Arabia in February
Saudi Arabia Advances Ambitious Artificial River Mega-Project to Transform Water Security
Saudi Crown Prince and Syrian President Discuss Stabilisation, Reconstruction and Regional Ties in Riyadh Talks
Mohammed bin Salman Confronts the ‘Iranian Moment’ as Saudi Leadership Faces Regional Test
Cybercrime, Inc.: When Crime Becomes an Economy. How the World Accidentally Built a Twenty-Trillion-Dollar Criminal Economy
Strategic Restraint, Credible Force, and the Discipline of Power
Donald Trump Organization Unveils Championship Golf Course and Luxury Resort Project in Saudi Arabia
Inside Diriyah: Saudi Arabia’s $63.2 Billion Vision to Transform Its Historic Heart into a Global Tourism Powerhouse
Trump Designates Saudi Arabia a Major Non-NATO Ally, Elevating US–Riyadh Defense Partnership
×