{"id":46011,"date":"2022-03-31T21:02:31","date_gmt":"2022-03-31T21:02:31","guid":{"rendered":"https:\/\/www.darkreading.com\/edge-articles\/accelerating-onto-the-on-ramp-for-cybersecurity-jobs"},"modified":"2022-03-31T21:02:31","modified_gmt":"2022-03-31T21:02:31","slug":"companies-going-to-greater-lengths-to-hire-cybersecurity-staff","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/","title":{"rendered":"Companies Going to Greater Lengths to Hire Cybersecurity Staff"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Employers are desperately seeking to fill cybersecurity positions. The number of available cybersecurity jobs coupled with accelerated <a href=\"https:\/\/www.darkreading.com\/edge-articles\/ciso-checklist-for-offboarding-security-staff\" target=\"_self\" rel=\"noopener\">attrition due to the Great Resignation<\/a> has led to companies offering ridiculously high salaries, a bevy of benefits, and free training and certifications to woo candidates. Even so, the candidate pool is limited. Employers are exploring ways to help applicants fill in the gaps in their experience so that they can be hired. <\/p>\n<p>&#8220;The No. 1 thing anyone interested in cybersecurity careers should do is apply,&#8221; says Justine Fox, principal product manager, technical, at NuData Security, a Mastercard company. &#8220;Most technology skills are adjacent to the needed cybersecurity versions, and there is no faster way to learn the role&#8217;s required skills than in the role. Whether you are self-taught or formally educated, I encourage folks to apply.&#8221;<\/p>\n<p>Mitch Ashley, principal at Techstrong Research, echoes that sentiment. &#8220;Cybersecurity is no longer a network-centric skill,&#8221; he says. &#8220;Security hiring is hopelessly behind, while software continues eating the world.&#8221;<\/p>\n<p>Cyber leaders must &#8220;widen the net&#8221; to bring in &#8220;talents beyond only traditional cybersecurity domains,&#8221; he adds, and managers &#8220;must think more like software leaders and less like network engineers.&#8221;<\/p>\n<p>Hiring companies are also becoming more flexible about job requirements and creating opportunities to help fast-track people into the industry. There are also quite a few things people can do to strengthen their job applications and gain the skills they need, even if they don\u2019t have the exact on-the-job experience being requested.<\/p>\n<p>The increasing desperation is undeniably leading employers to &#8220;get creative to help fill roles and stay competitive,&#8221; according to Dan Desko, CEO of Echelon Risk + Cyber.<\/p>\n<p><strong>Get Real, Fast<br \/><\/strong>Given the flux in current hiring guidelines for nontraditional applicants, what skill or experience counts most on a winning resume? Real-world, hands-on experience. But how do you gain experience <em>before<\/em><em> <\/em>you land a job in the field?<\/p>\n<p>&#8220;A well-stocked GitHub page showing contribution to security tools and projects, a blog talking through security research, their bug bounty or vulnerability disclosure Hall of Fame listings \u2013 these are all practical ways to demonstrate and communicate real-world skills to a hiring manager quickly,&#8221; says Casey Ellis, founder and CTO at Bugcrowd.<\/p>\n<p>However you choose to do it, get real-world experience as quickly as you can.<\/p>\n<p>&#8220;In many cybersecurity jobs, education requirements have become a thing of the past,\u201d says Peter Lowe, principal security researcher at DNSFilter. &#8220;Therefore, people looking to get into cyber should prioritize acquiring real-world experience and skills over diplomas.&#8221;<\/p>\n<p><strong>Dive in on Open Source Projects<br \/><\/strong>Indeed, open source projects are a prime place to get hands-on experience on the cheap.<\/p>\n<p>\u201cTwo of the simplest ways to level up are engaging with the infosec community via social media, namely Twitter, and contributing in some small way,\u201d Lowe says.<\/p>\n<p>Picking an open source or open data project to contribute to is &#8220;a fantastic way to connect with others and begin developing techniques and skills required in professional environments,&#8221; he adds. &#8220;Nothing big to start &#8211; just a way of having a thread to follow that will expose you to people and ideas. As a bonus, any public work and\/or conversations you have are great proof points to show potential employers that you have a real passion for cybersecurity.&#8221; <\/p>\n<p><strong>Try to Score an Apprenticeship<br \/><\/strong>Apprenticeships are becoming more popular and more widely available.<\/p>\n<p>&#8220;Apprenticeships are a great opportunity for cyberskills training because they provide practical experience and the opportunity to learn from someone else,\u201d says Demi Ben-Ari, CTO and co-founder of security and risk management company Panorays. &#8220;In addition, operational cybersecurity training, both defensive and offensive, is also a great way to build a broad skill set. Any opportunities for increased networking, programming, and resource utilization is essential to sharpening your cybersecurity knowledge and capabilities.&#8221;<\/p>\n<p><strong>Apply From Within<br \/><\/strong>Consider making a career change to cybersecurity from your current position at the same company. Many companies have programs to assist with training. Further \u201cknown\u201d applicants, in terms of work performance and willingness to learn, are often preferred hires over newcomers.<\/p>\n<p>\u201cAt 1Password, we have several examples of individuals who have joined us and started in our customer support department and then moved into security roles, given the experience they built in front-facing roles with our customers,\u201d says Katya Laviolette, chief people officer of 1Password, a password management company.<\/p>\n<p><strong>Leverage the Technical Skills You Do Have<\/strong><br \/>Cybersecurity is a much bigger field than it used to be and now contains a growing number of specialties. Play up the technical skills you already possess because many of them will likely transfer to cybersecurity.<\/p>\n<p>\u201cToday, cybersecurity skills must be built upon disciplines new to security, coupling security with cloud, software development, scripting, automation, infrastructure-as-code, and [the] Internet of Things,&#8221; says Techstrong&#8217;s Ashley. &#8220;Cisco\u2019s DevNet, for example, helps new and experienced engineers with Python courses, scripting and orchestration training, working with APIs, code exchange, exposure to MLOps, and sandboxes to learn, test, and play utilizing skills new to traditional cybersecurity.\u201d <\/p>\n<p><strong>Upskill Your Self-Taught Program <br \/><\/strong>Self-taught is great but often not enough if that\u2019s all you have.<\/p>\n<p>\u201cWhile [capture-the-flag contests] and other types of self-taught routes can help broaden your skill set as a practitioner, it is not a direct substitute for training and experience in terms of getting into the business,&#8221; says Panorays&#8217; Ben-Ari. &#8220;In other words, the self-taught routes like CTFs or bug-bounty programs help increase knowledge, but in order to excel in the cybersecurity industry, you need practical experience that these exercises don\u2019t often provide.\u201d <\/p>\n<p>Security boot camps have their limits, too.<\/p>\n<p>\u201cThere are many boot camps and programs out there, but these can only get you so far,\u201d Ben-Ari warns. Most only prepare you for junior positions which is problematic because most companies looking to hire want some practical experience so you can excel instantly on the job<\/p>\n<p>The good news is that many security companies offer programs that can help you get more structured training too.<\/p>\n<p>\u201cMany security companies cater to those who are starting their infosec career and offer \u2018pay-what-you-can\u2019 training,&#8221; says Brian Wilson, CISO at analytics software company SAS.<\/p>\n<p><strong>Draw from Free Hacking Resources <\/strong><br \/>It\u2019s often said that cybersecurity is more about mindset and problem-solving because the rest is just teachable skills. So if you possess the mind and the will, there are plenty of free resources where you can pick up the skills. <\/p>\n<p>\u201cThere are a ton of free hacking resources on the Internet and a robust community of people dedicated to curating them,&#8221; Wilson says. One example is <a href=\"https:\/\/github.com\/vitalysim\/Awesome-Hacking-Resources\" target=\"_self\" rel=\"noopener\">Awesome Hacking Resources<\/a> on GitHub.\u201d <\/p>\n<p>There are also several reasonable penetration testing lab websites to virtually test your skills to \u201csee if you have what it takes in different security arenas,\u201d he adds, citing <a href=\"https:\/\/www.hackthebox.com\/\" target=\"_self\" rel=\"noopener\">HackTheBox<\/a> as a popular example. <\/p>\n<p><strong>Find Your Own Mentor<\/strong><br \/>Seasoned mentors are invaluable to aspiring professionals, midcareer pros, and mentors, too. Many companies assign mentors to new hires, and those programs are often worth their weight in gold, or at least in better security for company assets. But if you aren\u2019t yet employed or your employer doesn\u2019t offer a mentorship program, other resources are available.<\/p>\n<p>\u201cA great strategy is to seek out mentorship opportunities via local security organizations like\u202fISC2 or regional Defcon organizations,&#8221; Wilson says. &#8220;Similarly, consider checking out cybersecurity-focused Meetup.com groups, many of which are free. These avenues can help newcomers to the field network while sharpening their skills.&#8221;<\/p>\n<p><strong>The Lowdown on Certs<br \/><\/strong>Wondering about the values of certifications? Almost everyone wants to know where those fit into the new hiring requirements.<\/p>\n<p>\u201cCertifications can certainly help when obtaining initial jobs, [but] they lack importance the longer you remain in the field,&#8221; says Ben-Ari. &#8220;Furthermore, your experience in the industry will quickly become the most valuable aspect of your cybersecurity resume.\u201d <\/p>\n<p>However, some certifications prove your chops better than others.<\/p>\n<p>\u201cMy employer recognized my certification, the eJPT, as a hands-on baseline to demonstrate my skill,&#8221; says Lily Clark, a former communications specialist-turned-cybersecurity consultant at Echelon. &#8220;Pairing that with CTF experience and activity on platforms like HackTheBox and TryHackMe gave me the confidence that I was prepared for the next step.\u201d <\/p>\n<p><strong>Show the Stuff You\u2019re Made of <\/strong><br \/>In the end, the \u201cproof\u201d you need isn\u2019t documented on paper or in pixels.<\/p>\n<p>\u201cOn the talent development side of the house, we look for those who exhibit the underlying values that we see as critical for a firm like us, and couple that with a strong ability to learn,&#8221; says Echelon Risk&#8217;s Desko. &#8220;Once we find those people, we help turn them into cyber superstars. <\/p>\n<p>Clark, he says, is &#8220;an incredible inspiration to us all, but also a great success story that shows others what is possible. Also notably, we have a former family counselor on staff who is now a senior cybersecurity consultant.\u201d <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/accelerating-onto-the-on-ramp-for-cybersecurity-jobs\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity market is red-hot. But with so many still-unfilled positions, companies may be more willing to bend or break some hiring rules. Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/accelerating-onto-the-on-ramp-for-cybersecurity-jobs\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-46011","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-31T21:02:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Companies Going to Greater Lengths to Hire Cybersecurity Staff\",\"datePublished\":\"2022-03-31T21:02:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/\"},\"wordCount\":1483,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt07a3cc4d0480909b\\\/623b703170d9e42ee3cf6dbb\\\/videojobinterview-insta_photos-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/\",\"name\":\"Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt07a3cc4d0480909b\\\/623b703170d9e42ee3cf6dbb\\\/videojobinterview-insta_photos-alamy.jpg\",\"datePublished\":\"2022-03-31T21:02:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt07a3cc4d0480909b\\\/623b703170d9e42ee3cf6dbb\\\/videojobinterview-insta_photos-alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt07a3cc4d0480909b\\\/623b703170d9e42ee3cf6dbb\\\/videojobinterview-insta_photos-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Companies Going to Greater Lengths to Hire Cybersecurity Staff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/","og_locale":"en_US","og_type":"article","og_title":"Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-31T21:02:31+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Companies Going to Greater Lengths to Hire Cybersecurity Staff","datePublished":"2022-03-31T21:02:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/"},"wordCount":1483,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/","url":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/","name":"Companies Going to Greater Lengths to Hire Cybersecurity Staff 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg","datePublished":"2022-03-31T21:02:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt07a3cc4d0480909b\/623b703170d9e42ee3cf6dbb\/videojobinterview-insta_photos-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/companies-going-to-greater-lengths-to-hire-cybersecurity-staff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Companies Going to Greater Lengths to Hire Cybersecurity Staff"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46011"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46011\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}