Employers are providing costly and ineffective ‘counter offers’ to retain IT workers in a rebounding market, according to a recruiter. Sean Roocroft, NSW director at Greythorn says counter offering has returned to the market with a bang in 2015 as many employers remain stuck in the defensive mode they adopted last year. “Employers have been caught out by how quickly the market is now moving, particularly around IT projects such as security, mobility and digital,” Roocroft said. “These candidates are in short supply and highly sought after – employers don’t want to let them go. However, relying on a counter offer strategy in this type of market is not effective, and ultimately, very costly.” He added that many employers have not proactively increased salaries for their staff and are reacting to these changed market conditions only when faced with the possible loss of current staff. “This is creating a great deal of frustration among employees,” he said. “Our experience tells us most employees who accept a counter offer will leave the organisation within 6 to 12 months anyway. Counter offering employees is a very short term strategy.” Employers need to find out what motives their IT personnel and then improve satisfaction around those drivers, he said. “By the time you have a resignation letter on your desk or find yourself involved in a counter offer situation, the battle, and the employee, is already lost.” This return to a talent short employment market is not limited to permanent roles, adds Lindsey Greenaway, managing consultant of Greythorn’s contracts division. “IT projects are picking up and we are once again seeing contractors with multiple job offers on the table at any one time. Employers seeking to hire contractors need to be prepared to move quickly,” Greenaway said. Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia Follow Byron Connolly on Twitter:@ByronConnolly Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe