survey on cybersecurity workforce for the industry in malaysia€¦ · survey on cybersecurity...
TRANSCRIPT
1
Survey on CyberSecurity Workforce for the Industry in Malaysia
The demand for cybersecurity talents is growing exponentially. This is driven by the proliferation of
technology and greater connectivity that created an environment which is vulnerable digitally. There
is a renewed focus on addressing the digital vulnerability in the organisation, hence the demand for
competent talent in the field of cybersecurity.
CyberSecurity Malaysia is taking a proactive step by conducting a survey which focuses on
cybersecurity roles and domain expertise as well the demand forecasted by the organisations.
By conducting this survey, CyberSecurity Malaysia will be able to identify not only the supply and
demand but also the gaps that prevails and potentially initiate solutions in the form of skills
development programmes. This will complement the existing programmes that are currently running,
which is coordinated by CyberSecurity Malaysia.
We believe that this survey is crucial to enhance the capability of organisations and track the critical
parameter which is the right talent and capability that can manage cyberthreats that are growing and
impact the business performance.
We assure you that the information provided will be used only for research purposes and will be kept
highly confidential. All responding participants will be given the exclusive summary of the research
report for reference.
We thank you in advance for your assistance and participation in this Survey to help CyberSecurity
Malaysia in its endeavour of building cybersecurity capability in Malaysia.
Warm regards,
Dato' Ts. Dr. Haji Amirudin bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
2
Survey on Cybersecurity Workforce for the Industry in Malaysia
Company Name :
Contact Person :
Designation :
Industry Sector :
Year Established :
Current Staff Strength :
Questionnaire Guide:
1. Use the following table below to identify the roles you would like to have available (at a given competence level) in your organisation.
a. “Expert” defined as individuals with more than 5 years of experience and possess certification in the relevant skillset,
b. “Competent” defined as individuals with more than 3 – 5 years of experience and possess the relevant skills stated,
c. “Entry” defined as fresh graduates between 1-3 years.
2. You are also asked to indicate existing number of staff and potential vacancies in the cybersecurity domains in the next 12-18 months.
Note: All information is treated with the strictest confidence and no respondent (or organisation) will be individually identified but participating companies will be acknowledged in a general list of contributors.
A: General Operational Structure
Please provide an overview of the existing cybersecurity function operational structure.
1 YES NO
2 If yes, how many people in the team?
B: Cybersecurity/IT Security Roles
1 CISO
2 Cyberlaw/Policy Advisor
3 Compliance Manager
4 Information Security Manager
5 Disaster Recovery Manager
6 Cyber Risk Manager
7 IT Systems Auditor
8 Security Architect
9 Security Consultant
10 Intrusion Detection Specialist
11 Security Analyst
12 Cyber Intelligence Analyst
13 Cryptographer/Cryptanalyst
14 Firewall Administrator
15 Forensic Analyst
16 Systems Administrator
17 Systems Engineer
18 Security Administrator
19 Security Engineer
20 Penetration Tester
21 Software Developer
22Security Information & Event Management
(SIEM) Operator
Other roles :
23
24
25
26
27
No
Please indicate the current number of employees based on their primary roles in the organisation in
accordance to their level & projected demand (in the event the organisation is expanding and planning to hire
more cybersecurity/IT Security Personnel). You may leave it blank if the role is not applicable at your
organisation.
Current
No
Projected
No
Projected
No
Expert Competent Entry
Does your organisation have a dedicated
cybersecurity team/personnel?
Current
No
Projected
No
Current
No
Primary Roles
C: Cybersecurity/IT Security Domain
1 Business Continuity & Disaster Recovery
2 Business Continuity Management
3 Cloud Security
4 Common Criteria Certifier and Evaluator
5 Cryptography
6 Database Security
7 Digital Forensic First Responder
8 Incident Handling
9 Information Security Awareness
10 Intrusion Detection, Monitoring & Prevention
11 IoT Security
12 ISMS Internal Auditor
13 Malware Investigation & Analysis
14 Mobile Security
15 Network Security
16 Operating Systems Security
17 Penetration Tester / Vulnerability Assessment
18 Secure Software Development Life Cycle
19 Smart Card Reader Security
20 Web Application Security
21 Windows Forensics
22 Operating Systems Security
Other Domains :
23
24
25
26
Fundamental
Training
Intermediate
Training
Advanced
Training
As we embark on expanding the cybersecurity domain training offerings, we would like to gauge the
organisation’s demand for the training levels as listed below. Please select the domain in demand at
the respective level sought for. You may choose more than one level for the respective domain.
No Domain Expertise
D: Critical Roles That are Difficult to be Filled
1
2
3
4
5
6
-- End of Survey --
Thank you for taking the time to complete this survey.
We truly value the information you have provided.
All responding participants will be given the exclusive summary
of the research report for reference.
You may email the completed survey to [email protected] by 6th March 2020
Please contact Yaslinda Yassin, Cyber Security Professional Development Department at
[email protected] if further clarification is needed.
Please list any critical cybersecurity roles that your organisation finds challenging to hire.
No Role Expert Competent Entry