The Tension Nobody Wants to Name
I need to talk about something uncomfortable that I see playing out across security hiring. And I say this as someone who cares deeply about both security excellence and diverse representation.
Here is the pattern: a company needs to hire a security engineer. The hiring manager writes a job description requiring 5+ years of experience in cloud security, specific certifications (OSCP, CISSP), expertise in threat modeling, incident response experience, and proficiency in at least two programming languages. The candidate pool that meets all these criteria is overwhelmingly male, overwhelmingly white or Asian, and overwhelmingly from a narrow set of educational backgrounds.
When someone raises the diversity concern, the response is: “We need a specialist. We cannot lower the bar.”
And that response sounds reasonable until you examine what is actually happening.
How “Specialist Requirements” Filter Out Diversity
Let me break down the mechanics:
1. Certification barriers. OSCP costs $1,600+ and requires weeks of dedicated study time. CISSP requires five years of professional experience and a $749 exam fee. These are not measures of capability — they are measures of access. They disproportionately filter out career changers, people from lower-income backgrounds, and professionals from emerging markets where these certifications are less common.
I did not have an OSCP when I started in security. I broke into the field through bug bounties — finding real vulnerabilities in real systems. My practical skills exceeded many OSCP holders I have met. But a certification-gated hiring process would have excluded me entirely.
2. Years-of-experience inflation. Many security job descriptions require 5-7 years of experience for mid-level roles. But cybersecurity as a defined career path is relatively young. The people with 7+ years of security experience entered the field when it was even less diverse than it is now. By requiring extensive experience, you are selecting from the least diverse talent generation.
3. “Culture fit” in security teams. Security teams often have strong internal cultures — hacker ethos, CTF competition backgrounds, specific communication styles. When hiring managers evaluate “culture fit,” they are often unconsciously selecting for people who match the existing team’s demographics and background.
4. The “tiered hiring” problem. Some companies have adopted tiered hiring approaches where specialized security and AI roles are exempt from broader diversity and inclusion efforts. The logic is: “We apply inclusive hiring practices to our general engineering roles, but security is different — we just need the best person.” This creates a two-tier system where the most high-status, highest-paying technical roles have the least diversity.
The Security Talent Shortage Is a Diversity Opportunity
Here is what frustrates me: the cybersecurity industry has roughly 3.5 million unfilled positions globally. We are facing a massive talent shortage. And our response is to narrow our hiring criteria rather than broaden them?
If there are not enough people with 5+ years of cloud security experience and an OSCP to fill available positions, the rational response is to develop talent, not to leave positions unfilled while waiting for unicorn candidates.
What Actually Works
From my experience building security capacity in Lagos and working with teams at Stripe and CrowdStrike:
1. Skills-based hiring over credential-based hiring. Give candidates a practical security assessment — a CTF challenge, a code review exercise, a threat modeling scenario. Evaluate what they can do, not what certificates they hold.
2. Invest in grow-your-own programs. Take strong engineers from other disciplines — backend, QA, DevOps — and train them in security. These career transitioners often bring domain knowledge that pure security specialists lack, making them more effective at securing the systems they already understand.
3. Recruit from non-traditional markets. The bug bounty community is remarkably diverse — researchers from Nigeria, India, Brazil, Indonesia are regularly finding critical vulnerabilities in Fortune 500 companies. These are world-class security minds who would never pass a traditional credential screen.
4. Separate “nice to have” from “must have.” Most security job descriptions list 15-20 requirements. In reality, 3-4 of those are actually essential for the role. Be honest about which ones matter and which ones are filtering for comfort rather than capability.
The Larger Point
When we say “diversity can wait because we need specialists,” what we are actually saying is “we have defined specialist in a way that excludes diverse candidates, and we prefer to maintain that definition rather than question it.”
That is not a security decision. It is a DEI decision disguised as a security decision. And in an industry with millions of unfilled roles, it is a bad business decision too.