{"id":58235,"date":"2025-03-03T16:10:41","date_gmt":"2025-03-03T16:10:41","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/"},"modified":"2025-03-03T16:10:41","modified_gmt":"2025-03-03T16:10:41","slug":"cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/","title":{"rendered":"Cybersecurity not the hiring-&#8217;em-like-hotcakes role it once was"},"content":{"rendered":"<p><span class=\"label\">Analysis<\/span> It&#8217;s a familiar refrain in the security industry that there is a massive skills gap in the sector. And while it&#8217;s true there are specific shortages in certain areas, some industry watchers believe we may be reaching the point of oversupply for generalists.<\/p>\n<p>It seems every year there&#8217;s another warning about a shortage for security talent \u2013 the first warning we found on <em>The Register<\/em> is <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2009\/07\/22\/federal_cybersecurity_shortage\/\" rel=\"noopener\">from 2009<\/a> \u2013 yet lately this reporter has run into more and more people in the field who are recounting that even getting an interview can be tough.<\/p>\n<p>Speaking to <em>The Reg<\/em>, Mary McHale, who works as a careers advisor for UC Berkeley Master&#8217;s in Cybersecurity, said: &#8220;I kind of joke with my students that when I started, I felt like if you could spell cybersecurity you would get an interview. Now a lot of things have changed.<\/p>\n<blockquote class=\"pullquote\" readability=\"7\">\n<p>There has been a tendency for those recruiting security professionals to ask for a lot of experience and offer not much in the way of compensation, which turns off many applicants<\/p>\n<\/blockquote>\n<p>&#8220;During COVID, there was huge hiring. Then after that, the companies said &#8216;Oh my gosh, we have too many people. We need to do some downsizing.&#8217; And what happened then was a lot of very talented tech people were laid off and began flooding the market in all sorts of areas and began trying to reposition themselves.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2024\/12\/19\/shutterstock_red_team_aib.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" width=\"174\" height=\"115\" alt=\"red team AI\"><\/p>\n<h2 title=\"Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence\">Infosec experts divided on AI&#8217;s potential to assist red teams<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2024\/12\/20\/gen_ai_red_teaming\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The problem is also exacerbated by the latest generation of AI products coming onto the market, McHale explained, and not just in security. AI agents now <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/11\/08\/ico_finds_ai_tools_can\/\" rel=\"noopener\">routinely<\/a> make decisions about a person&#8217;s resume and many applicants lack the skills to game such software and bag an interview.<\/p>\n<p>There&#8217;s also the problem of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/11\/03\/ghost_job_epidemic\/\" rel=\"noopener\">ghost jobs<\/a> bedeviling recruitment websites, she added. The majority of HR people surveyed in multiple studies report filing job adverts for positions that don&#8217;t exist. Reasons vary from trying to give the impression a business is growing to both insiders and onlookers, and to motivate staff to work harder because &#8220;they think they are replaceable.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>According to data on the market from <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cyberseek.org\/heatmap.html\">Cyber Seek<\/a>, a partnership between the National Institute of Standards and Technology, Computing Technology Industry Association, and recruitment consultant Lightspeed, the number of security vacancies peaked in 2022 and the number of people working in the sector has plateaued.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>The most in-demand skills are oversight and governance, which is mostly suited to more experienced practitioners. Florida, California, and Texas remain key job markets, although Virginia is also high on the list, as are Maryland and New York.<\/p>\n<h3 class=\"crosshead\">To cert or not to cert, that is the question<\/h3>\n<p>Experience in the field is by far the most attractive thing for employers, McHale told us. Yet qualifications are useful in both demonstrating knowledge and getting around automatic HR filtering systems.<\/p>\n<p>A CompTIA Security+ certificate is de rigueur these days and being a Certified Information Systems Security Professional (CISSP) doesn&#8217;t hurt either &#8211; and without them HR software will bin an application for a cybersecurity role almost without fail, she said. But once you actually get an interview certificate collections are less important than practical experience and a more formal education.<\/p>\n<p>&#8220;Our research indicates that cybersecurity professionals are finding other educational and experience opportunities more valuable when landing a job in cybersecurity,&#8221; said Andy Woolnough, executive vice president of corporate affairs at International Information System Security Certification Consortium (ISC2).<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;Our 2024 research found that 19 percent of professionals entering the field for the first time first prioritized a bachelor&#8217;s or post-bachelor degree in cybersecurity or other related field, 16 percent received a cybersecurity certification, and 4 percent got a cyber internship, and surprisingly zero of the 7,000+ respondents got an apprenticeship before landing a job in cybersecurity.&#8221;<\/p>\n<p>Woolnough told <em>The Reg<\/em> there has been a tendency for those recruiting security professionals to ask for a lot of experience and offer not much in the way of compensation, which turns off many applicants. He recommended that when recruiting new team members HR should sit down with existing security staff and work out realistic requirements.<\/p>\n<p>Overall Woolnough still sees demand for more cybersecurity staff, but budget cuts have led to shifting patterns of hiring and many potential employers are betting on AI as a low-cost way to plug the gaps among generalist security staff. Nine out of ten companies ISC2 surveyed said they had an incomplete security team with skill holes in some areas.<\/p>\n<p>&#8220;While the full impact of AI is still unknown, we are hearing that hiring managers are not rushing to hire specialized workers, instead preferring generalists who can cover a range of areas while managers figure out what skills will be most beneficial to meet future demand,&#8221; he said.<\/p>\n<p>&#8220;It&#8217;s also worth noting that most of the skills needed for entry-level jobs aren&#8217;t technical. Problem-solving, communication, analytical thinking and critical thinking are all skills that come from fields outside of just cybersecurity. For junior-level staff, it is more important to find those with the aptitude to succeed in cyber (rather than focus on unrealistic experiential requirements) and train them up to take on the lower-level tasks to free up senior staff for advanced work.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8XoxKYUvaeXijhnlpddMQAAAkE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>He noted that there are some notable skills gaps by industry segment, in part driven by attack trends. For example, manufacturing and critical infrastructure firms are currently facing a shortage of specialists in operational technology after a <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/02\/25\/new_ics_malware_dragos\/\" rel=\"noopener\">spate of attacks<\/a>. And government and education sectors need more zero-trust experts, he opined.<\/p>\n<p>One area where McHale and Woolnough definitely agreed was that networking is absolutely key in the security field. Succeeding in the job market is increasingly about who you know as much as what you know. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/03\/03\/cybersecurity_jobs_market\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ghost positions, HR AI no help \u2013 biz should talk to infosec staff and create &#8216;realistic&#8217; job outline, say experts Analysis\u00a0 It&#8217;s a familiar refrain in the security industry that there is a massive skills gap in the sector. And while it&#8217;s true there are specific shortages in certain areas, some industry watchers believe we may be reaching the point of oversupply for generalists.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":58236,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-58235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity not the hiring-&#039;em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity not the hiring-&#039;em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-03T16:10:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2024\/12\/19\/shutterstock_red_team_aib.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybersecurity not the hiring-&#8217;em-like-hotcakes role it once was\",\"datePublished\":\"2025-03-03T16:10:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/\"},\"wordCount\":972,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/\",\"name\":\"Cybersecurity not the hiring-'em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg\",\"datePublished\":\"2025-03-03T16:10:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity not the hiring-&#8217;em-like-hotcakes role it once was\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity not the hiring-'em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity not the hiring-'em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-03-03T16:10:41+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2024\/12\/19\/shutterstock_red_team_aib.jpg?x=174&amp;amp;y=115&amp;amp;crop=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybersecurity not the hiring-&#8217;em-like-hotcakes role it once was","datePublished":"2025-03-03T16:10:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/"},"wordCount":972,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/","url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/","name":"Cybersecurity not the hiring-'em-like-hotcakes role it once was 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg","datePublished":"2025-03-03T16:10:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-not-the-hiring-em-like-hotcakes-role-it-once-was\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity not the hiring-&#8217;em-like-hotcakes role it once was"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58235"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/58236"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}