Looks like security researcher @mikko has been doing some investigations recently … this time in job openings instead of malware. No, he doesn’t seem to be looking for a new position but instead analyzing the number of open infosec positions that have skyrocketed for the Pentagon and their contractors. Mmm … continued validation of OPM’s 2x growth estimate… Mikko further found that many of these opportunities fall into the “offensive cyberwarfare” category. So if you have the right clearances and skills, you may be able to demand a salary of up to $175,000! And that was in 2011… Looks like I need to get my hack on instead of drudging along in security engineering.
Mikko Hypponen enjoys his position as the chief research officer at the Helsinki-based security firm F-Secure. He has no intention of leaving. But lately, he’s been spending a lot of time looking at job openings.
Over the past few months, Hypponen has been periodically visiting the “careers” section of defense contractors’ websites and online job listings, particularly those targeted at candidates with secret clearances, and searching for words like “exploit,” “offensive,” and “vulnerability.” And the positions he’s been seeing show a new recruiting focus–or newly explicit focus–among the Beltway firms that serve the Pentagon: offensive cyberwarfare.
“This exciting and fast-paced Research and Development project will plan, execute, and assess an Offensive Cyberspace Operation (OCO) mission,” reads a posting for a job with the bland title “Cyber Software Engineer” at defense firm Northrop Grumman. Booz Allen Hamilton seeks a “Target Digital Network Analyst” capable of “exploit development for personal computer and mobile device operating systems, including Android, Blackberry, iPhone and iPad.”
What do you think about offensive cyberwarfare? Are the salary predictions realistic? Post your comments below. Today’s post pic is from Phillihp.com.