Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

10/18/2018
02:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

60% of IT Security Professionals Looking to Leave Current Job: Mondo

Top reasons for leaving are tied between lack of growth opportunities and job satisfaction, the tech recruiter reports.

NEW YORK CITY, Oct. 10, 2018 — Mondo (mondo.com) today reported on the findings of its latest survey on IT security job trends, with 60 percent of professionals reporting that they are looking to leave their current job. Lack of growth opportunities and job satisfaction are tied as the top reasons to leave a job, according to the survey. Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent.

According to the survey, other top reasons why IT security experts leave a job are: unhealthy work environment (53%); lack of IT security prioritization from C-level or upper management (46%); unclear job expectations (37%) and lack of mentorship (30%).

To help retain IT security experts, benefits such as work-life balance (67%), taking their security concerns seriously (55%), and increased sponsorship of certifications/courses (48%) are cited as compelling reasons talent reported they would consider staying in a job longer. In addition, increased investment in emerging tech (34%) and CISO leadership/defined ownership of security needs (31%) were important job satisfaction considerations for IT security professionals, according to the survey.

“In 2018, IT security experts are some of the most in-demand IT professionals given the increased risk of cyberattacks, making it a candidate-driven market,” said Tim Johnson, CEO of Mondo. “Because of the extremely competitive job market and the current talent shortage, it’s important for employers to be aware of the specific needs of these professionals to help attract and retain them.”

The Mondo survey also reported on highest security priorities for 2019 among IT security professionals, with the following ranked in order as top concerns: InfoSecurity, network/infrastructure security, application security, and cloud security. Overall, 84% of IT security decision-makers reported their company could be more secure.

Mondo gathered this data by surveying more than 9,000 IT security professionals and decision-makers.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...