• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

Articles/ Blue Team/ Careers/ Security Training

Diversifying Cybersecurity Talent Through Aptitude Testing

Deb Radcliff July 20, 2021

With a shortage of four million cybersecurity workers, we need to get more creative in identifying non-technical skills among potential candidates that can be applied to the cybersecurity realm. One way is to test them for aptitude and personality traits, like the career planning tests I took in college.

That’s what the University of Maryland did when testing hundreds of participants working for multiple agencies within the Department of Defense. Testers used the Cyber Aptitude and Talent Assessment (CATA) by Haystack Solutions that evaluates critical thinking, deliberate action, real-time action, and proactive and reactive thinking. Then it maps results against four security domains: offense, defense, analytics/forensics, and design/development.

Pulled from the article, this is what I found most interesting: “Many of the test subjects were determined to be creative thinkers who scored low on many tasks but who performed well in crucial areas such as “Need for Cognition,” “Need for Cognitive Closure,” and “Pattern Vigilance,” and so were well suited for and chosen for cybersecurity roles for which they had not previously applied.”

These are candidates that would have been passed over, but who are suited for very specific cybersecurity needs. They just need training and encouragement.

This type of CATA testing may also be helpful with another overlooked group: The neuro-diverse, such as people with Asperger’s and other forms of autism, which large companies like IBM and SAP are tapping and nurturing through programs like SAP’s Autism at Work program.

I may even ask to take the test myself so I can see what type of SOC position I’d fit into, just in case my industry analyst career takes a nosedive.

—

Deb Radcliff, Strategic Analyst at the Cyber Risk Alliance’s Business Intelligence Group, was the industry’s first investigative reporter to make cybercrime a beat in 1996. She then led the SANS Analyst Program for fifteen years before authoring a top-selling cyberthriller, Breaking Backbones, and joining the CRA.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

uptrend line arrows with bar chart in stock market on blue color background

Articles /

Ransomware Damage Claims Driving Insurance Hikes

Photo of a physical bitcoin and monero coin

Blue Team /

Cryptocurrency: Cybercrime’s New Favorite Tool

AdobeStock_145255314-1013x440

Careers /

Security Awareness Training – Time for a Change in Philosophy?

‹ Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments › How The Best Defense Gets Better: Part 2

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes