Cybersecurity threats are on the rise. With the rapid increase of security breaches, company hacks and data leaks, cybercrime has become one of the most significant threats to global business. Skilled cybersecurity professionals are key for the safety of companies and governments, but there is an anticipated skills shortage of 1.8 million workers by 2022. The demand for talent in this space is at an all-time high, and there are some unique personality traits that recruiters and companies need to look out for.
Hogan Assessments have helped some of the world’s top IT and cybersecurity firms recruit the right individuals and their science-based assessments and 30 years of validated research found that there are eight personality characteristics best suited to a successful career in cybersecurity.
1. Modesty. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful cybersecurity agent is not egotistical or fame hungry, and instead favors a more low-key lifestyle. After all, most of the well-known names in cybersecurity are notorious cyber-criminals.
2. Altruism. Cybersecurity professionals should want to help people. While they are working all day with systems and programming, protecting and helping people is at the core of this profession. They should work well with others and avoid isolating themselves. Fighting threats will require cooperation and trust between colleagues as they are striving together towards the same security goals.
3. Composure. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity agents naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyberthreats. Unnecessary outbursts when the pressure is rising can be counterproductive and shift their attention away from what is at stake.
4. Scientific. The perfect cybersecurity professional wants to solve problems using data and analytic skills. Cyber criminals are increasingly sophisticated in their attacks and this requires individuals who are highly technical and value evidence-based decision making.
5. Inquisitive. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge which can require a completely different set of skills than the ones needed previously. A successful cybersecurity candidate is imaginative, curious and creative. They need to figure things out quickly, show motivation to learn and be open to new ideas.
6. Skeptical. ‘Trust no one’ would be a useful motto for a cybersecurity worker. To get ahead of the game and prevent attacks means sometimes having to think like a hacker. This means maintaining suspicion about what’s going on around you, because in a world of constant threats, naivety can be a dangerous thing.
7. Responsive. In cybersecurity, things can go wrong quickly, and you might be blamed for breaches that weren’t your fault. If someone in the company opens a phishing email and exposes sensitive information, you might be held accountable. It is thus very important for a cybersecurity worker to be open and responsive to criticisms and avoid being passive-aggressive.
8. Diligent. In a pressured environment with a firm’s security at stake, a successful candidate needs to be detail-oriented and constantly pushing projects to completion. One small oversight could lead to attacks, so cybersecurity specialists need to scrutinize every detail. They also need to value achievement and making an impact.
Dr. Ryne Sherman, Chief Science Officer at Hogan Assessments, adds: “Traditional recruiting practices often overlook personality and focus on education, experience and a set of hard skills. While these are important, it is crucial to remember that personality characteristics play a huge role. A candidate with the suitable personality can be easily trained into the right role. This is especially true in the cybersecurity world where companies struggle to find the experienced individuals they need. To recruit top talent, companies should direct their attention to the power of personality.”
This article originally appeared on Hogan Assessments.