Skip to content
  • About PBC
  • About Hogan
  • Blog
  • About PBC
  • About Hogan
  • Blog
Cart(0)
  • Our Services
  • Assessments
  • Certifications
  • Resources
  • Contact Us
  • Get Certified
  • Our Services
  • Assessments
  • Certifications
  • Resources
  • Contact Us
  • Get Certified
All Services
Selection
Development
Teams
Organisation
Coaching
Research
Cancel
Our Services
All Services
Selection
Development
Teams
Organisation
Coaching
Research
  • Our Services
  • Assessments
  • Certifications
  • Resources
  • Contact Us
  • Get Certified
  • Our Services
  • Assessments
  • Certifications
  • Resources
  • Contact Us
  • Get Certified
Cart(0)
  • About PBC
  • About Hogan
  • Blog
  • About PBC
  • About Hogan
  • Blog
BLOG

The 8 Personality Traits to Succeed in Cybersecurity

Cybersecurity threats are on the rise. With the rapid increase of security breaches, company hacks and data leaks, cybercrime has become one of the most significant threats to global business. Skilled cybersecurity professionals are key for the safety of companies and governments, but there is an anticipated skills shortage of 1.8 million workers by 2022. The demand for talent in this space is at an all-time high, and there are some unique personality traits that recruiters and companies need to look out for.

Hogan Assessments have helped some of the world’s top IT and cybersecurity firms recruit the right individuals and their science-based assessments and 30 years of validated research found that there are eight personality characteristics best suited to a successful career in cybersecurity.

1. Modesty. Those that tend to excel in cybersecurity typically prefer to avoid the spotlight. A successful cybersecurity agent is not egotistical or fame hungry, and instead favors a more low-key lifestyle. After all, most of the well-known names in cybersecurity are notorious cyber-criminals.

2. Altruism. Cybersecurity professionals should want to help people. While they are working all day with systems and programming, protecting and helping people is at the core of this profession. They should work well with others and avoid isolating themselves. Fighting threats will require cooperation and trust between colleagues as they are striving together towards the same security goals.

3. Composure. The enterprise systems they are protecting from attacks are always under threat. Cybersecurity agents naturally need to have a sense of urgency, but it is crucial that they stay composed handling cyberthreats. Unnecessary outbursts when the pressure is rising can be counterproductive and shift their attention away from what is at stake.

4. Scientific. The perfect cybersecurity professional wants to solve problems using data and analytic skills. Cyber criminals are increasingly sophisticated in their attacks and this requires individuals who are highly technical and value evidence-based decision making.

5. Inquisitive. The world of cybersecurity is ever changing. When threats are prevented, new ones emerge which can require a completely different set of skills than the ones needed previously. A successful cybersecurity candidate is imaginative, curious and creative. They need to figure things out quickly, show motivation to learn and be open to new ideas.

6. Skeptical. ‘Trust no one’ would be a useful motto for a cybersecurity worker. To get ahead of the game and prevent attacks means sometimes having to think like a hacker. This means maintaining suspicion about what’s going on around you, because in a world of constant threats, naivety can be a dangerous thing.

7. Responsive. In cybersecurity, things can go wrong quickly, and you might be blamed for breaches that weren’t your fault. If someone in the company opens a phishing email and exposes sensitive information, you might be held accountable. It is thus very important for a cybersecurity worker to be open and responsive to criticisms and avoid being passive-aggressive.

8. Diligent. In a pressured environment with a firm’s security at stake, a successful candidate needs to be detail-oriented and constantly pushing projects to completion. One small oversight could lead to attacks, so cybersecurity specialists need to scrutinize every detail. They also need to value achievement and making an impact.

  • Dr. Ryne Sherman, Chief Science Officer at Hogan Assessments, adds: “Traditional recruiting practices often overlook personality and focus on education, experience and a set of hard skills. While these are important, it is crucial to remember that personality characteristics play a huge role. A candidate with the suitable personality can be easily trained into the right role. This is especially true in the cybersecurity world where companies struggle to find the experienced individuals they need. To recruit top talent, companies should direct their attention to the power of personality.”

References

  • This article originally appeared on Hogan Assessments.

TOPIC AREA

DATE POSTED

May 7, 2019

SHARE ON YOUR SOCIALS

Latest blog posts

Loading...

Team Effectiveness and Domino Derailers

The Hidden Cost of a Toxic Workplace Environment

How to Identify Leadership Potential in Private Equity Acquisitions

Unlocking Leadership Potential Through Neurodiversity

Charismatic Leadership in Politics

Questions?

We’re here
to help.

Contact Us

Get certified
today

Gain comprehensive training on how to use Hogan’s personality assessments

Get Certified Now

Related Articles

Team Effectiveness and Domino Derailers

Teams are more than just the sum of their parts. They’re complex systems in which individual behaviours can trigger chain…
Read More

The Hidden Cost of a Toxic Workplace Environment

We’ve all experienced the colleague who brings the mood down, the boss who thrives on chaos, or the team member…
Read More

How to Identify Leadership Potential in Private Equity Acquisitions

Private equity firms excel at finance and technology but too often lag in talent strategy, particularly in portfolio company management.…
Read More
View All

Stay connected

Copyright 2024 Peter Berry Consultancy.

Sydney

Level 8/201 Miller Street,
North Sydney, NSW 2060 Australia

Phone: +61 2 8918 0888

Peter Berry Consultancy wishes to acknowledge the Traditional Custodians the Cammeraygal and their Country on which we work today.

See map

Melbourne

Suite 303, 430 Little Collins Street, Melbourne, VIC, 3000 Australia

Phone: +61 3 8629 5100

Peter Berry Consultancy wishes to acknowledge the Traditional Custodians the Boon Wurrung and Woiwurrung (Wurundjeri) peoples of the Kulin Nation and their Country on which we work today.

See map

Auckland

11 Britomart Place, Auckland CBD,
Auckland 1010, New Zealand

Phone: +64 9 941 9790

See map

Ireland

Suite 301, 53 Merrion Square South, Dublin 2, D02 PR63, Ireland

Phone: +353 1 578 3607

See map
  • TERMS & CONDITIONS
  • PRIVACY POLICY – AU
  • PRIVACY POLICY – NZ
  • COOKIES POLICY
  • EU COMPLIANCE
  • TERMS & CONDITIONS
  • PRIVACY POLICY – AU
  • PRIVACY POLICY – NZ
  • COOKIES POLICY
  • EU COMPLIANCE
  • TERMS & CONDITIONS
  • PRIVACY POLICY – AU
  • PRIVACY POLICY – NZ
  • COOKIES POLICY
  • EU COMPLIANCE
  • TERMS & CONDITIONS
  • PRIVACY POLICY – AU
  • PRIVACY POLICY – NZ
  • COOKIES POLICY
  • EU COMPLIANCE
Peter Berry Consultancy
Manage Consent

PBC uses cookies. Learn more about our policies by clicking the links below.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}