SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Aleta Wilson, Ph.D.
 Clay Wilson, Ph.D.




                      1
◦ This study explores activities required to
  employ cyber security workers for the
   federal government and
   its contractor community
◦ These two sectors comprise an estimated
  500,000 workers
   who must undergo a significant
    background check because
   positions which are labelled as "national
    security positions".


                                                2
3
   DOL Occupational Outlook Handbook does
    not contain a definition for cybersecurity
    professionals
   DOL categories acknowledge positions that
    involve people who
    ◦ plan, coordinate, and maintain an organization's
      information security
    ◦ database administrators plan and coordinate
      security measures with network administrators
    ◦ network engineers "may ... address information
      security issues”


                                                         4
   Department of Homeland Security
    Secretary Janet Napolitano defines
    Cybersecurity professionals as
    ◦ employees responsible for "... cyber risk
      and strategic analysis; cyber incident
      response; vulnerability detection and
      assessment; intelligence and investigation;
      and network and systems engineering“



                                                    5
◦ Frost & Sullivan conducted a survey of
  10,413 information security professionals
  which indirectly defined security
  professionals as those
   employed as Information Security
    professionals and
   those who had cyber security as their
    primary job function.




                                              6
DOD usually takes the lead in defining
 elements related to cyberspace and
 cybersecurity, but according to GAO

 "DOD has defined some key cyber-related
  terms but it has not yet fully identified the
  specific types of operations and program
  elements that are associated with full-
  spectrum cyberspace operations"


                                                  7
   Professionals who have information security
    as a major part of their job;
   those who self-identify as cyber or security
    specialists; and,
   those who build and maintain the national
    critical infrastructure of the computer
    systems on which the public and private
    sectors have come to rely.




                                                   8
Let’s go get them….




                      9
 DHS staffing up to 1,000 positions
  over three years from 2009
 DOD’s recently established Cyber
  Command is also staffing up
 NSA is stealing every human being
  from all sides
 Plus industry has corporate and
  contract needs to fulfill


                                       10
"... there are not enough cybersecurity
  experts within the Federal Government or
  private sector to implement the
  [Comprehensive National Cybersecurity
  Initiative], nor is there an adequately
  established Federal cybersecurity career
  field" (Obama, 2009).




                                             11
 Education   (lack of)
 ◦ Science, Technology, Engineering

 Security   Clearances
 ◦ U.S. Citizens need only apply




                                      12
   Cyber positions are classified as “National
    Security Positions”
   Clearances are required
   Requires extensive background check
   Direct effect on cyber workforce




                                                  13
• Clock starts when there is a “need to know” i.e., job
  offer




• A job search on Monster.com found 882 positions requiring
  a security clearance within 5 miles of DC zip code

• "If you are a Software Engineer and/or Systems
  Administrator with an active TS/SCI clearance and Full
  Scope Polygraph, please read on!"


                                                              14
•   OPM handles 90% of security
    clearances for the feds and contractor
    community
•   Alphabet agencies conduct their own
    clearances
    • CIA, DIA, FBI, NGA, NRO, NSA, DoS
•   Reciprocity is coming (and so is
    Christmas)


                                             15
Figure 1
                                               Security Clearance Flowchart


     Start
                                                                        Yes       Gather ID, etc and
                                                                                 begin hiring process


 PH meets job                                             Is there
                           Issue Contingency
qualifications (is                                        a BI file
                               Hire Letter
    suitable)                                             at OPM
                                                                                    PH submits
                                                                                                              3
                                                                         No
                                                                                     clearance                months
                                                                                  documentation to
                                                                                        HA                    to
                                                                                                              1-year
                                                                                                              ------
                                 HA requests
                     Yes          background                                                                  Goal is
                                 investigation                           Yes
     PH                                                                                    Hire               74
    passes
     HA                                                PH passes                                              days, bu
    suita-
    bility
                                                         inves-
                                                        tigation
                                                                                                        End   t ….
     test
                     No
                                                                         No           Rescind offer
                                 Rescind offer




Legend: BI = background investigation; PH = potential hire; HA = hiring agency

                                                                                                                         16
   Many of current jobs will become vacant over the
    next 10 years
   Workforce must be home-grown due to citizenship
    requirement
   Great news for those with clearances
    ◦   Only 2% of those with clearances are unemployed
   Companies like Booze Allen stockpile cleared
    workers through use of college internships
   Small firms are inhibited from bids requiring
    cleared personnel



                                                          17
   Potential hires are given contingency letter
    pending clearance that can take 3 to 9
    months for TS
   Some government bids require cleared
    personnel be included in bid
   If company cannot fill slot then they can
    lose contract
   Outcome – company with best cyber
    expertise but lacking facility clearance may
    be locked out of bid.


                                                   18
 Increased emphasis on S.T.E.M.
 $260M invested in STEM over next
  decade
 Growth in STEM jobs is 3X non-STEM
  jobs
 Government is certifying Universities
  with Information Assurance programs
  as Centers of Academic Excellence
  (124 and counting)


                                          19
   Feds need to modify security regulations specific to
    cybersecurity professionals
    ◦ Relax the “need to know” rule and run clearance process concurrent
      with last semester of college
       When they graduate… they can immediately begin work
   Grant “facility clearances” to the Centers of Excellence so
    that can submit their IA students for clearances
   Require a work commitment from student who is granted a
    clearance (i.e., student agrees to work for gov for a
    minimum of two years)
   Centers of Excellence can partner with large cleared
    contractors who will agree to hire and clear graduates




                                                                           20
 Effect of security clearance barriers on
  small businesses that sell IT services
  to the government
 Are company’s with strong cyber skill
  sets being eliminated due to lack of
  security clearances




                                             21
FURTHER RESEARCH
   Effect of security clearance barriers on small businesses that
    sell IT services to the government
   Are company’s with strong cyber skill sets being eliminated
    due to lack of security clearances




                   NSA designated National Center of Academic
                   Excellence in Information Assurance Education




                                                                     22

Weitere ähnliche Inhalte

Ähnlich wie Clearance barriers to Cyber Security Profession

Personnel Security Specialist
Personnel Security SpecialistPersonnel Security Specialist
Personnel Security SpecialistRhodaisha Phoenix
 
Deputed Workforce: An Overview
Deputed Workforce: An OverviewDeputed Workforce: An Overview
Deputed Workforce: An OverviewZinnov
 
Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?jsterle
 
Final It Whitepaper For Distribution
Final It Whitepaper For DistributionFinal It Whitepaper For Distribution
Final It Whitepaper For DistributionMJrecruitsIT
 
Final It Whitepaper For Distribution
Final It Whitepaper For DistributionFinal It Whitepaper For Distribution
Final It Whitepaper For DistributionSfordyce
 
Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?HudsonAmien
 
ExL Pharma's 12th Investigator Initiated Trials Conference Brochure
ExL Pharma's 12th Investigator Initiated Trials Conference BrochureExL Pharma's 12th Investigator Initiated Trials Conference Brochure
ExL Pharma's 12th Investigator Initiated Trials Conference BrochureExL Pharma
 
Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Reporttbeckwith
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docxRAHUL126667
 
Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues Armstrong Teasdale
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writingtlinde
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011rnieman
 
The Value of Business Intelligence In Construction Industry
The Value of  Business Intelligence  In Construction IndustryThe Value of  Business Intelligence  In Construction Industry
The Value of Business Intelligence In Construction Industrykelvinlane
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxleonorepour284
 
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docxUNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docxouldparis
 

Ähnlich wie Clearance barriers to Cyber Security Profession (20)

Personnel Security Specialist
Personnel Security SpecialistPersonnel Security Specialist
Personnel Security Specialist
 
Deputed Workforce: An Overview
Deputed Workforce: An OverviewDeputed Workforce: An Overview
Deputed Workforce: An Overview
 
Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?
 
Final It Whitepaper For Distribution
Final It Whitepaper For DistributionFinal It Whitepaper For Distribution
Final It Whitepaper For Distribution
 
Final It Whitepaper For Distribution
Final It Whitepaper For DistributionFinal It Whitepaper For Distribution
Final It Whitepaper For Distribution
 
Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?Too Overwhelmed to Hire Right?
Too Overwhelmed to Hire Right?
 
Background screening
Background screeningBackground screening
Background screening
 
ExL Pharma's 12th Investigator Initiated Trials Conference Brochure
ExL Pharma's 12th Investigator Initiated Trials Conference BrochureExL Pharma's 12th Investigator Initiated Trials Conference Brochure
ExL Pharma's 12th Investigator Initiated Trials Conference Brochure
 
Baughman_Resume
Baughman_ResumeBaughman_Resume
Baughman_Resume
 
Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Report
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
 
Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Preventive IT Audit Case Study
Preventive IT Audit Case StudyPreventive IT Audit Case Study
Preventive IT Audit Case Study
 
Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011
 
The Value of Business Intelligence In Construction Industry
The Value of  Business Intelligence  In Construction IndustryThe Value of  Business Intelligence  In Construction Industry
The Value of Business Intelligence In Construction Industry
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docxUNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
 

Kürzlich hochgeladen

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Clearance barriers to Cyber Security Profession

  • 1. Aleta Wilson, Ph.D. Clay Wilson, Ph.D. 1
  • 2. ◦ This study explores activities required to employ cyber security workers for the  federal government and  its contractor community ◦ These two sectors comprise an estimated 500,000 workers  who must undergo a significant background check because  positions which are labelled as "national security positions". 2
  • 3. 3
  • 4. DOL Occupational Outlook Handbook does not contain a definition for cybersecurity professionals  DOL categories acknowledge positions that involve people who ◦ plan, coordinate, and maintain an organization's information security ◦ database administrators plan and coordinate security measures with network administrators ◦ network engineers "may ... address information security issues” 4
  • 5. Department of Homeland Security Secretary Janet Napolitano defines Cybersecurity professionals as ◦ employees responsible for "... cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering“ 5
  • 6. ◦ Frost & Sullivan conducted a survey of 10,413 information security professionals which indirectly defined security professionals as those  employed as Information Security professionals and  those who had cyber security as their primary job function. 6
  • 7. DOD usually takes the lead in defining elements related to cyberspace and cybersecurity, but according to GAO "DOD has defined some key cyber-related terms but it has not yet fully identified the specific types of operations and program elements that are associated with full- spectrum cyberspace operations" 7
  • 8. Professionals who have information security as a major part of their job;  those who self-identify as cyber or security specialists; and,  those who build and maintain the national critical infrastructure of the computer systems on which the public and private sectors have come to rely. 8
  • 9. Let’s go get them…. 9
  • 10.  DHS staffing up to 1,000 positions over three years from 2009  DOD’s recently established Cyber Command is also staffing up  NSA is stealing every human being from all sides  Plus industry has corporate and contract needs to fulfill 10
  • 11. "... there are not enough cybersecurity experts within the Federal Government or private sector to implement the [Comprehensive National Cybersecurity Initiative], nor is there an adequately established Federal cybersecurity career field" (Obama, 2009). 11
  • 12.  Education (lack of) ◦ Science, Technology, Engineering  Security Clearances ◦ U.S. Citizens need only apply 12
  • 13. Cyber positions are classified as “National Security Positions”  Clearances are required  Requires extensive background check  Direct effect on cyber workforce 13
  • 14. • Clock starts when there is a “need to know” i.e., job offer • A job search on Monster.com found 882 positions requiring a security clearance within 5 miles of DC zip code • "If you are a Software Engineer and/or Systems Administrator with an active TS/SCI clearance and Full Scope Polygraph, please read on!" 14
  • 15. OPM handles 90% of security clearances for the feds and contractor community • Alphabet agencies conduct their own clearances • CIA, DIA, FBI, NGA, NRO, NSA, DoS • Reciprocity is coming (and so is Christmas) 15
  • 16. Figure 1 Security Clearance Flowchart Start Yes Gather ID, etc and begin hiring process PH meets job Is there Issue Contingency qualifications (is a BI file Hire Letter suitable) at OPM PH submits 3 No clearance months documentation to HA to 1-year ------ HA requests Yes background Goal is investigation Yes PH Hire 74 passes HA PH passes days, bu suita- bility inves- tigation End t …. test No No Rescind offer Rescind offer Legend: BI = background investigation; PH = potential hire; HA = hiring agency 16
  • 17. Many of current jobs will become vacant over the next 10 years  Workforce must be home-grown due to citizenship requirement  Great news for those with clearances ◦ Only 2% of those with clearances are unemployed  Companies like Booze Allen stockpile cleared workers through use of college internships  Small firms are inhibited from bids requiring cleared personnel 17
  • 18. Potential hires are given contingency letter pending clearance that can take 3 to 9 months for TS  Some government bids require cleared personnel be included in bid  If company cannot fill slot then they can lose contract  Outcome – company with best cyber expertise but lacking facility clearance may be locked out of bid. 18
  • 19.  Increased emphasis on S.T.E.M.  $260M invested in STEM over next decade  Growth in STEM jobs is 3X non-STEM jobs  Government is certifying Universities with Information Assurance programs as Centers of Academic Excellence (124 and counting) 19
  • 20. Feds need to modify security regulations specific to cybersecurity professionals ◦ Relax the “need to know” rule and run clearance process concurrent with last semester of college  When they graduate… they can immediately begin work  Grant “facility clearances” to the Centers of Excellence so that can submit their IA students for clearances  Require a work commitment from student who is granted a clearance (i.e., student agrees to work for gov for a minimum of two years)  Centers of Excellence can partner with large cleared contractors who will agree to hire and clear graduates 20
  • 21.  Effect of security clearance barriers on small businesses that sell IT services to the government  Are company’s with strong cyber skill sets being eliminated due to lack of security clearances 21
  • 22. FURTHER RESEARCH  Effect of security clearance barriers on small businesses that sell IT services to the government  Are company’s with strong cyber skill sets being eliminated due to lack of security clearances NSA designated National Center of Academic Excellence in Information Assurance Education 22