What Exactly Is Talent? Part 2, Cybersecurity Manager Talent
Boss man. Boss lady. Your cybersecurity manager is the lynchpin that makes your cyber-operations work.
We previously discussed cybersecurity technician talent, and now it's time for cybersecurity manager talents.
Cybersecurity technician talent is the foundation for cybersecurity manager talent. Unfortunately, and we see this all the time, high-performing technicians are more likely to be promoted to manager.
Promoting high-performing technicians to management makes sense in many ways, some good and some bad. It's critical for the cybersecurity manager to know cybersecurity. Also, and we all understand this, we're not going to promote people who are poor performers at a lower level.
This is the argument about minimum competence again. Sure, technician performance is a sign that the person is minimally competent, and yes that counts.
But there are too many differences in the demands on managers versus technicians for competence at a lower level to predict performance at a higher level. One difference in talent between technicians and managers is in the ways they can fail. Cybersecurity technicians primarily fail through not being up to the technical demands of the job. In some high-powered organizations, failure comes from lack of team-player talent. Managers can fail any which way you like: can't build and manage a team, can't delegate, can't coordinate with other managers, doesn't understand the work to be done. The last one is tricky because it's the final act for most failed managers who think that managing a technical function such as cybersecurity is like managing any other technical function. That ignores what's different about cybersecurity from other fields.
An easy rubric, especially for organizations that are new to hiring, is this: attaining certifications, having a degree, or cybersecurity experience in the military or at another company, are signs of past behavior; talent is about future behavior.
We at Pythia carried out a study of over 150 10-K filings in 2025 (soon to be updated to 2026), along with reviews of position descriptions across the Internet and in the NIST CSF. We also tapped into our significant experience with talent-based studies from organizations across the world. This review process identified a conceptual model of five clusters that are required for effective performance as a cybersecurity professional: Direction, Drive, Influence, Relationship, and Execution. They are defined as follows:
- Direction – where do you want to lead?
- Drive – what motivates you?
- Influence – how do you shape the beliefs and thoughts of others?
- Relationship – how do you prefer to work with others?
- Execution – how do you shape the work goals of others and self?
For a cybersecurity manager role, a talent-based approach means that you will hire someone who "gets it," wants to engage with your systems and processes, manages a team for growth, can identify the different signals within the noise, creates value for organizational partners, and is looking to advance.
Question 1: Did you have other goals for this person?
Question 2: Can you manage that person's performance?
We'll have posts later on ways we measure these talents, and how they differ from competencies. Also, we will post about cybersecurity executive talent.
Ask us how we can help you clarify the talent you need at any level of your cybersecurity function.

Comments
Post a Comment