As more of the Federal government’s operations become increasingly dependent on the Internet, the need to protect the nation’s digital infrastructure has never been more urgent. U.S. Cyber Security initiatives are putting the spotlight in the growing number of risks.

In fact, the Department of Defense logged 360 million hacking attempts in 2008, up from just six million two years earlier, and has spent $100 million in the past six months alone to repair cyber attack damage, according to The Wall Street Journal. It was the Journal that broke the news cyber spies had breached the nation’s electricity grid and the Pentagon’s $300 billion Joint Strike Fighters weapon program this spring.

The White House Assessment

On May 29, the White House released a 60-day, 76-page Cyberspace Policy Review subtitled Assuring a Trusted and Resilient Information and Communications Infrastructure. The report, which makes for fascinating reading, shines a spotlight on the issue of national cybersecurity and proposes a number of measures to bolster it. “Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat of cybercrime and state-sponsored intrusions and operations,” it says.

Because “the Federal government is not organized to address this growing problem effectively now or in the future,” the report suggests centralization of security efforts and partnerships with the private sector and academia be developed to coordinate its ultimate security objectives. In addition, the report recommends investment ” in processes, technologies, and infrastructure that will help prevent cyber incidents.”

So the questions arise: Where will it invest? Will new jobs be created? Who will get them?

“Public-private partnerships are critical to the success of a comprehensive cybersecurity public service campaign,” said Shannon Kellogg, director of information security policy at EMC and a member of the National Cyber Security Alliance board of directors. “A true collaboration among government agencies, nonprofits, and private companies will enable us to empower our citizens to protect themselves and, in turn, make our country’s overall cyber defenses stronger.”

Security Job Security?

In other words, security experts are sitting pretty. “The demand for specific skills involved in information security is greater than ever and, at least for the foreseeable future, looks like a very good career investment,” says Andrew Storms, director of Security Operations at nCircle, a San Francisco-based provider of automated security and compliance solutions. “The strongest demand for information security professionals is from sectors bound by the greatest number of regulations. Government agencies and contractors are always looking for professionals with strong IT security skills.”

More Money, More Jobs

Given that the Federal government plans to spend at least $75.8 billion on IT in 2010, a 7.2 percent increase over expected 2009 spending, there is clearly money to be made in both the public and private sector IT security arenas.

One place to take your security-rich resume is large defense contractors, such as Lockheed Martin, the biggest supplier of IT to the federal government. It currently employs 146,000 people and is hiring 16,000 people annually, including 4,000 to 5,000 new college graduates, according to U.S. News & World Report. Northrop Grumman, Raytheon, and General Dynamics also have huge security contracts with government agencies.

While the White House report doesn’t lay out a detailed prescription for addressing the nation’s overall cybersecurity, it does hint at where efforts will be focused. Read between the lines, and you’ll uncover some potentially interesting security career tracks. A couple examples:

* “Investment in systems that automate or centralize network management.” (Network Management)

* “The government needs a reliable, consistent mechanism for bringing all appropriate information together to form a common operating picture.” (Networking Infrastructure)

Related News