MSgt April Monthie1056492<div class="images-v2-count-0"></div><a target="_blank" href="https://www.linkedin.com/pulse/lifes-breach-shawn-leonard?trk=hp-feed-article-title-share">https://www.linkedin.com/pulse/lifes-breach-shawn-leonard?trk=hp-feed-article-title-share</a><br /><br />The global economy takes an estimated $400 billion hit every year as a result of cyber attacks. That’s bad for employers but good news for cyber security workers, who can command an average salary premium of nearly $6,500 per year, or 9% more than other IT workers. <a target="_blank" href="http://burning-glass.com/research/cybersecurity/">http://burning-glass.com/research/cybersecurity/</a><br /><br />What are your thoughts?The trend of Cyber Security IT jobs vs. Normal IT jobs and the associated pay scales. Thoughts?2015-10-21T19:32:18-04:00MSgt April Monthie1056492<div class="images-v2-count-0"></div><a target="_blank" href="https://www.linkedin.com/pulse/lifes-breach-shawn-leonard?trk=hp-feed-article-title-share">https://www.linkedin.com/pulse/lifes-breach-shawn-leonard?trk=hp-feed-article-title-share</a><br /><br />The global economy takes an estimated $400 billion hit every year as a result of cyber attacks. That’s bad for employers but good news for cyber security workers, who can command an average salary premium of nearly $6,500 per year, or 9% more than other IT workers. <a target="_blank" href="http://burning-glass.com/research/cybersecurity/">http://burning-glass.com/research/cybersecurity/</a><br /><br />What are your thoughts?The trend of Cyber Security IT jobs vs. Normal IT jobs and the associated pay scales. Thoughts?2015-10-21T19:32:18-04:002015-10-21T19:32:18-04:00GySgt Wayne A. Ekblad1056501<div class="images-v2-count-0"></div>Cyber security professionals are certainly in high demand <a class="dark-link bold-link" role="profile-hover" data-qtip-container="body" data-id="769290" data-source-page-controller="question_response_contents" href="/profiles/769290-msgt-april-monthie">MSgt April Monthie</a>!Response by GySgt Wayne A. Ekblad made Oct 21 at 2015 7:36 PM2015-10-21T19:36:13-04:002015-10-21T19:36:13-04:00SSgt Alex Robinson1056503<div class="images-v2-count-0"></div>Thanks for sharingResponse by SSgt Alex Robinson made Oct 21 at 2015 7:36 PM2015-10-21T19:36:57-04:002015-10-21T19:36:57-04:00SGT Private RallyPoint Member1056623<div class="images-v2-count-0"></div>I think it backs up what I've seen and heard many times before. Cyber Security professionals are needed.Response by SGT Private RallyPoint Member made Oct 21 at 2015 8:34 PM2015-10-21T20:34:26-04:002015-10-21T20:34:26-04:00LTC Private RallyPoint Member1056713<div class="images-v2-count-0"></div>Its a relatively new slant to the network/computer security field. Companies are finally realizing that they are exposed and there are lots of bad guys out there looking to pick their bones.<br /><br />With the right experience and credentials you can write your own ticket in this arena.Response by LTC Private RallyPoint Member made Oct 21 at 2015 9:07 PM2015-10-21T21:07:31-04:002015-10-21T21:07:31-04:00LTC John Shaw1056843<div class="images-v2-count-0"></div>Increased demand drives salaries, many companies are just getting religion in info secResponse by LTC John Shaw made Oct 21 at 2015 9:59 PM2015-10-21T21:59:15-04:002015-10-21T21:59:15-04:00SSG Kenneth Suarez1059160<div class="images-v2-count-0"></div>It's not just limited to the Cybersecurity Line of Business (LOB) within Information Assurance as a whole. The old dichotomy of segregating people, process, and technology, from the nuanced needs of accurate, relevant, shareable, and secure date is frankly, outdated and modal at best.<br /><br />The primary function of security focused jobs is to leverage that expertise against the business needs of the agency while potentially using customer/consumer data. At that level, the individual data element, in all of its potential and kinetic properties, is the most vital.<br /><br />tl;dr - normal jobs, may implement security functions; security focused jobs weave best practices into processes in order to protect the data itself. <br /><br />Real Life trends: DOD IA workforce 8570.01-M; transition from DITSCAP/DIACAP to Risk Management Framework, FISMA^2, FITARA, etc.Response by SSG Kenneth Suarez made Oct 22 at 2015 6:23 PM2015-10-22T18:23:45-04:002015-10-22T18:23:45-04:002015-10-21T19:32:18-04:00