Big Four accountancy firms top list of cyber security employers

Consultancies and insurers make up most of the rest of the top 10

Office workplace security

The UK's 'Big Four' accountancy firms PwC, KPMG, EY and Deloitte are the largest recruiters of cyber security talent, job Site Indeed has revealed.

According to a survey by the company, 5.95% of new hires at KPMG and 5.08% at PwC are in cyber security roles. Similar roles make up 1.99% and 1.47% of new hires at EY and Deloitte respectively.

Making up the rest of the top 10 are Vodafone (1.46%), Hastings Direct (1.43%), Aviva (0.78%), Capita (0.75%), Barclays (0.66%) and Capgemini (0.66%).

RankCompanyCyber roles as % of job postings
1KPMG5.95
2PwC5.08
3EY1.99
4Deloitte1.47
5Vodafone1.46
6Hastings Direct1.43
7Aviva0.78
8Capita0.75
9Barclays0.66
10Capgemini0.66

Between 2017 and 2018, Indeed saw an increase of 14.58% job postings for security roles per one-million vacancies. This period saw a significant change in information security regulations, with GDPR coming into force in May 2018 across the EU and enshrined in law in the UK under the Data Protection Act 2018.

These roles are also rather lucrative, with IT auditors earning on average 58,328 per year. The most commonly advertised job IT security specialist attracts salaries of around 45,722, while even the least well-paid job in the rankings security engineer still commands a salary over 4,000 higher than the national average of 34,423. 

"Every aspect of a modern company relies on its IT and the growing threat of cyber attack and tightening of privacy laws means demand is rising fast for professionals who are able to protect companies' most precious information," said Bill Richards, UK MD at Indeed. 

"The critical importance of their work, the skill and discretion it requires, and strong demand from employers have combined to drive up cyber professionals' salaries. Cyber security is both a hot topic and a lucrative profession right now."

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

TikTok vulnerability exposed private user data
data protection

TikTok vulnerability exposed private user data

26 Jan 2021
SonicWall hacked via zero-day flaw in remote access tools
Security

SonicWall hacked via zero-day flaw in remote access tools

25 Jan 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
WhatsApp could face €50 million GDPR fine
General Data Protection Regulation (GDPR)

WhatsApp could face €50 million GDPR fine

25 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021