Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Tuesday, September 2
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Would you hire a hacker?
    Latest News

    Would you hire a hacker?

    TeamBy TeamAugust 17, 2025No Comments10 Mins Read3 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Would you hire a hacker?
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In the wake of four young people being arrested over suspected involvement in the recent Marks & Spencer, Co-op and Harrods ransomware attacks, it is easy to rush to censure those responsible for the disruption caused.

    But are we being too hasty in our condemnation? In an era of ongoing skills shortages, high numbers of security breaches and an ageing cyber security workforce, should we be looking at alternative pools of young talent, which includes hackers, to save the day?

    Mike Gillespie is chief executive of information and physical security consultancy, Advent IM. As he points out: “It’s an ageing profession. I’m 56 and I’m average here. We’re the generation that started all this and created a profession as hobbyist practitioners, but we’re still the biggest part of it.”

    Another challenge is that the industry still lacks diversity and remains predominantly “white and male”, he says. This means most employers are shopping for talent “from the same corner shop and the stock is getting very low”.

    The upshot, Gillespie says, is that: “Organisations just keep poaching off each other and so salaries keep on rising. But we’re getting to crisis point, to a tipping point, where significant numbers of us are moving towards retirement and there aren’t enough young people coming through.”

    Cyber security is misunderstood

    Some of the problem here can be attributed to the movie-driven image of cyber security professionals being “solitary geeks” in hoodies tapping away on keyboards in dimly lit rooms.

    But the lack of alternative role models “is putting a lot of people off”, believes Amanda Finch, chief executive of the Chartered Institute of Information Security (CIISec). It is also narrowing the perception of the variety of roles available within the profession.

    “Where some of the confusion comes from is that everything is now labelled ‘cyber security’ when it’s really information security, which encapsulates the cyber stuff,” Gillespie says. “Information security is governance, risk, compliance and audit but people focus on high-tech jobs, such as penetration testing and offensive hacking, as they appear sexier, even though they’re only a small part of the overall industry.”

    Finch agrees. “Although we, as an industry, are doing a better job, we’re still not doing enough to explain how diverse the profession is in terms of roles and how much we rely on expertise beyond just pure cyber skills,” she says. “People like the idea it’s well paid and there’s work available, but it’s still seen as a bit of a dark art.”

    Chris Wysopal is co-founder of application security company Veracode and a former L0pht hacker. He believes the problem is even more basic.

    “One of the challenges is that high school kids with an aptitude for cyber security aren’t always aware of it as a profession,” he says. “They might be gamers or people who’ve played with different networking and AI tools and don’t know they could turn their interest into a career, so there’s a need for better industry promotion.”

    Alternative talent pool potential

    Another barrier to entry is a lack of clear pathways into the profession beyond going to university. This is important, believes Wysopal, as “many talented people who could be good practitioners aren’t the kind of person who wants to do four years at college”.

    But it seems that some employers at least are recognising they could benefit from taking a punt on alternative talent pools.

    For instance, a recent study by cyber training and certification body ISC2, titled 2025 Cyber security hiring trends, indicated that employers would consider candidates for entry- and junior-level jobs if they had previous IT experience or entry-level cyber security certificates over graduates with no work experience.

    Unhelpfully though, a significant proportion of hiring managers also requested that entry- and junior-level jobseekers with certificates hold qualifications intended for more experienced professionals – a situation that inevitably makes it difficult for them to get a foot in the door.

    As Finch says: “The first step is always really hard because organisations are overloaded and busy and so want experience. But we’re increasingly seeing people investing in raw talent, and organisations – such as IASME [formerly known as the UK Cyber Security Forum] – working with people on the [neurodiverse] spectrum.”

    In a bid to do its bit, the CIIS itself is also offering an entry-level Extended Project Qualification (EPQ) in cyber security. To date, the EPQ has mainly been taken up by private schools, although some progress was made in inner city schools before the Department for Science, Innovation and Technology (DSIT) removed funding.

    As a result, the CIIS is currently in the process of setting up a charitable arm to provide the industry with a legal route to help fill the financial shortfall.

    Sourcing young talent

    But non-traditional sources of employment still remain the exception rather than the rule. ICS2’s report indicates, for example, that recruitment and staffing companies as well as job postings (57% respectively) are still the most favoured hiring route.

    Next on the list are internal internship programmes and colleges and universities (55% respectively). Offering internal cyber security apprenticeship programmes is growing in popularity (46%) though.

    At the bottom of the pile is hiring people from other internal company departments (22%), taking on military veterans (12%), or other members of the military (8%). Another possibility that does not even make it onto the list is the young gamers currently being targeted by black hat hackers and organised crime.

    “Online criminal gangs have to get their talent from somewhere too, so they hire in gaming forums and Discord servers,” Wysopal says. “They look for people with aptitude, and when they see someone dipping their toes into how to break systems or social engineer adversaries, they take an interest and become part of the conversation.”

    Casey Ellis, founder and chief executive of crowdsourced security platform, Bugcrowd, agrees.

    “Hackers are being recruited into cyber crime as young as 13 from multi-player gaming platforms, using the same recruitment methods drug dealers employed in the 1980s, with 12-to-18-year-olds being particular targets,” he indicates. “The idea is to get them when they’re young as they’re easier to manipulate, so the question is how does the industry step up and counter that to divert young people away from crime?”

    It is one of the reasons Ellis set up Bugcrowd in 2012, he says. The company focuses particularly on harnessing the (ethical) hacking skills of millennials and older members of Generation Z to find hidden vulnerabilities in customer software. Between 600,000 and 700,000 have gone through its programme so far.

    Playing black hats at their game

    The Hacking Games, another organisation of which both Ellis and Wysopal are members, describes itself as intent on unlocking “unconventional talent (gamers, builders, rebels, and deep thinkers)” to “plug them into the global cyber security mission”.

    It does this by providing Discord-based communities for young hackers and others from diverse backgrounds to join. This provides them with access to industry figures, mentors, and a jobs board listing open roles. Haptai, a hacking AI recruitment platform, also creates a profile to make it easier for them to explore career paths based on their strengths.

    “The cyber security industry is at a disadvantage compared with the criminal gangs as it’s not hiring talented young people in the places they’re hanging out,” points out Wysopal. “But The Hacking Games is one of the things that can help solve that by getting to young people before they’re recruited by the bad guys. After that, it’s very hard.”

    But the issue is not just about diverting young people from cyber crime today, Ellis believes. It is also about casting the net wider to better outsmart the criminal gangs and “future proof” the industry.

    “There’s much gold in the younger generation,” he says. “It’s not just about finding them a job. It’s about getting their strategic input as they’re native to the tech environment we’re creating right now and so don’t have the assumptions we do – it’s important that we listen to each other and learn.”

    A key challenge today though is the widespread misunderstanding of what a hacker actually is, Ellis says. “The difference between black hat and ethical hackers is the same as between burglars and locksmiths,” he points out. “They have the same skills and curiosity but different moral compasses.”

    Wysopal agrees that “hacker is a loaded term”. On the one hand, he says, when he joined L0pht in 1992, its members were all hobbyists as there was no such thing as a cyber security profession. On the other, there are varying forms of hacking activity.

    “Some people are criminal masterminds and are in it for the money, but there are also those who wrote a tool or tricked someone into handing over a password, who are on the fringes of criminality,” Wysopal indicates. “They may have broken the law, but you have to be careful not to tarnish someone’s entire career as a lot of this happens when people are juveniles.”

    What to do with a convicted hacker?

    As a result, he says, even with a conviction, he would be prepared to hire someone if he thought they had changed.

    “There’s no black and white here,” Wysopal says. “It’s different if there’s a pattern of behaviour and someone’s a hardened criminal, but if they have a conviction for petty theft, it was just one time and it was 10 years ago, do I really not want to take them on as a software engineer?”

    Nonetheless, there would inevitably be limitations on the kinds of work they could do, he says.

    “The biggest challenge in hiring people with convictions is what does it look like to customers, especially if you’re engaging with them to do penetration testing,” Wysopal adds. “It’s an optics issue and putting a convicted hacker on a network and giving them the credentials to do a red attack feels too risky.”

    This means his preference would be to have a convicted hacker work in back-office, non-customer-facing roles, such as researcher or member of the reverse engineering team, where explanations would not be required.

    Gillespie agrees the situation is a tricky one. “If I wanted someone tried and tested, a former hacker might be a good idea,” he says. “But the challenge is that a lot of jobs, particularly if you’re dealing with high security government and defence projects, require clearance, and if someone has a conviction, it may prevent you from getting the job.”

    Ultimately though, Wysopal believes it is time for the cyber security sector to hire more self-taught talent.

    “To some extent, the industry needs to go back to its roots as the world’s a different place now to the 2000s when the industry started growing and graduates became the bulk way of hiring,” he says. “Young people aren’t playing with modems and a PC anymore – they’re playing online games in Discord groups, so you have to go where they are.”

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Teachers Learn the Art of Teaching Civics in a Hot-Button Age

      September 2, 2025

      5 ways to infuse AI into your classroom this school year

      September 1, 2025

      AI supports care of Palestinian refugees in Lebanon hospital

      September 1, 2025

      What Stanford Learned By Crowdsourcing AI Solutions for Students With Disabilities

      August 31, 2025

      3 steps to build belonging in the classroom

      August 31, 2025

      ICO publishes summary of police facial recognition audit

      August 30, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202466 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202429 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Guide to customer Due Diligence in Financial Institutions | Udemy Coupons 2025

      September 2, 2025

      Campaign Content Specialist, Americas

      September 2, 2025

      AML Enforcement in Cryptocurrency and Digital currency | Udemy Coupons 2025

      September 2, 2025

      Senior Application Developer

      September 2, 2025

      Infinite Education: The Four-Step Strategy for Leading Change in the Age of Artificial Intelligence (LeadershipGoals Series)

      September 2, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Teachers Learn the Art of Teaching Civics in a Hot-Button Age

      September 2, 2025

      5 ways to infuse AI into your classroom this school year

      September 1, 2025

      AI supports care of Palestinian refugees in Lebanon hospital

      September 1, 2025

      What Stanford Learned By Crowdsourcing AI Solutions for Students With Disabilities

      August 31, 2025

      3 steps to build belonging in the classroom

      August 31, 2025
      Latest Videos

      Cyber security insights #15/200 by white fortress academy #ethicalhacking

      September 1, 2025

      The HIGHEST PAYING Finance Job AI Can’t Replace!

      August 31, 2025

      www.onlinetrainings.xyz Start Digital Marketing Career #careerindigitalmarketing #digitalmarketing

      August 30, 2025

      Salary range for Cyber Security (Tamil) | cyber security salary

      August 27, 2025

      Elevate Your Career with Digital Marketing by Prayug!

      August 26, 2025
      Latest Jobs

      Campaign Content Specialist, Americas

      September 2, 2025

      Senior Application Developer

      September 2, 2025

      TikTok Shop – Data Scientist – Measurement

      September 2, 2025

      Electrical Reliability Engineer – Brunswick

      September 2, 2025

      Registered Nurse Cath Lab Prep and Recovery PRN

      September 1, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202535 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202522 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views
      Blog

      Finding Purpose in Life –

      August 31, 2025

      How Helya Mohammadian Is Leading the Charge for Accessible Intimates with Slick Chicks –

      August 30, 2025

      Here is MsCareerGirl’s compiled, vetted list of all the major career and job websites you should strongly consider registering for, browsing listings and posting your resume.

      August 29, 2025

      Women Entrepreneurs; DNA or Destiny? –

      August 28, 2025

      How To Answer “What Makes You Unique?” In A Job Interview

      August 23, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT