Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay

March 30, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Tech Graduates: The Hidden Challenges They Face
Cyber Updates

Tech Graduates: The Hidden Challenges They Face

Staff WriterBy Staff WriterOctober 13, 2025Updated:October 25, 2025No Comments6 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. AI Job Displacement: Entry-level jobs for workers aged 22-25 have declined by approximately 13% due to the rise of generative AI, particularly in tech sectors like software development and programming.

  2. Skill Adaptation: The study emphasizes the need for young professionals to acquire new skills and adapt, as AI can replace less experienced workers who are still learning.

  3. Shifting Job Landscape: Despite fears of job loss, experts suggest that while the nature of entry-level roles may change, new opportunities will arise in fields such as generative AI and cybersecurity.

  4. Importance of Networking: Successful entry-level applicants, like Mudit Sinha, recommend proactive networking and showcasing relevant projects to improve employment prospects in an AI-dominated job market.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Why Tech Graduates Are At a Disadvantage’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

Entry-level workers from the ages of 22-25 may be finding themselves fresh out of a job these days as artificial intelligence (AI) continues to dominate industries across the world.

This is according to a recent study published by Stanford University, which found that jobs for this age demographic have declined by roughly 13% since the widespread adoption of generative AI (GenAI). And these changes are occurring in jobs most exposed to AI, such as software developers and computer programmers.

One explanation for the findings, according to the researchers, is that AI can replace young workers who are still gaining skills in their respective industries, raising questions as to what these entry-level professionals, particularly those in software, cybersecurity, and technology, should do to gain the skills they need to progress in their careers.

CISOs’ Perspective on AI

Though concerns of AI replacing entry-level technology jobs continue to grow, some feel that AI won’t be as big of an issue compared to other technologies.

“I think the concern about AI tooling possibly replacing entry-level roles should be a little bit less of a concern when it comes to security roles than other basic developer roles,” says Marshall Erwin, chief information security officer (CISO) at Fastly. “The basic reason for that is, even putting aside your sort of new AI trends, any security team is really struggling with volume.”

Related:Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks

He adds that with the challenges cybersecurity professionals face every day, companies can’t just “hire their way out of that problem.” To Erwin, adding automations into daily processes allows organizations to filter through the noise so that real, human professionals can focus on high-risk problems when they’re needed.

“I think AI is really going to be helpful in that respect,” he says. “We need better ways to filter through that noise and manage the volume of what we’re seeing on a day-to-day basis and that’s a problem we’ve had for a long time, and these tools are going to help us with that.”

Jason Manar, CISO at Kaseya, agrees, noting that while change is inevitable, there will still be employment available for those willing to adapt.

“There will be new opportunities, and you see this now with various engineering positions where there are more positions for generative AI and new positions within engineering,” he says. “So, is there consolidation that may take place with entry or junior level jobs? Yes, absolutely. Will there still be some type of junior job or entry level job? There will. I just think that’s going to be redefined as to what that is.”

Related:Deepfake Awareness High at Orgs, But Cyber Defenses Badly Lag

But according to Jessica Sica, CISO at Weave Communications, when reflecting on her personal experience while hiring entry-level professionals, the field is already getting increasingly harder to break into, and this may be regardless of AI’s influence.

“Everybody says the security industry is growing rapidly, but it’s getting harder and harder to get in,” she says. “And I think part of that is maybe more and more people want to get into security, but the entry level jobs I think are getting more difficult. Companies are getting more demanding.”

She adds that AI is only going to make it even more difficult to get into the field, particularly with entry-level jobs.

“I think some of those tasks are going to be replaced with AI,” she notes. “Not sure that we’re there yet, but when that happens, how do you get in and how do you move up if those entry-level jobs are getting harder to find?”

AI Raises the Bar for Entry-Level Tech Careers

Mudit Sinha, AI lead at Lineaje, is familiar with these concerns of how AI may affect employment. He graduated just two years ago with a bachelor of Science from the University of Massachusetts at Amherst. Sinha landed his first job through networking — specifically, reaching out to the chief technology officer (CTO) of the company.

Related:Fastly CISO: Using Major Incidents as Career Catalysts

“I was looking more into data analytics and a mix of AI back in the day, and the company had just started doing AI,” he says. “I did about three to four rounds of interviews, most of them with the CTO, the one with the CEO.”

This is exactly what Sinha recommends to fresh graduates or individuals looking for entry-level positions in the field — reaching out, introducing yourself, and showcasing a project that the company might be interested in.

 

As for how AI will reshape the cybersecurity industry Sinha describes as “growing,” he believes that the tool will only enhance the field.

“Everyone is expected to perform at a level higher than they previously were expected to perform,” Sinha says. “Juniors are now expected to do the same output as, let’s say, senior SDEs (software development engineer) or senior researchers because they have access to this really powerful tool. So, entry level people should not have the expectation that they are going to be treated as entry level applicants.”

While this may be a hard pill to swallow, Sinha advises entry-level applicants to accept the challenge, prepare to understand the latest advancements in AI, maintain a genuine interest in cybersecurity, and not underestimate the value of soft-skills in this industry.

“Ultimately people like interacting with other people, and that interaction piece is not really going away with AI, as far as I’ve seen,” Sinha adds. “Be sociable, be open to opportunities, and if you have the opportunity, keep talking to upper management or whoever you can.”

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Expand Your Tech Knowledge

Stay informed on the revolutionary breakthroughs in Quantum Computing research.

Stay inspired by the vast knowledge available on Wikipedia.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAstaroth Banking Malware Exploits GitHub for Hosting Threat Configurations
Next Article Cyber Threats Uncovered: Worms, Zero-Days, Ransomware & More
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Securing the Future: Google’s Quantum-Safe Encryption Plan by 2029

March 29, 2026

Thrive Logic: Advanced AI-Powered Security Solutions

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

Comments are closed.

Latest Posts

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay

March 30, 2026

Top 10 Fraud Detection Tools to Watch in 2026

March 30, 2026
Don't Miss

Securing the Future: Google’s Quantum-Safe Encryption Plan by 2029

By Staff WriterMarch 29, 2026

Top Highlights Google is fast-tracking its transition to post-quantum cryptography (PQC), aiming for full adoption…

Thrive Logic: Advanced AI-Powered Security Solutions

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Critical Vulnerability in Fortinet FortiClient EMS Under Attack
  • Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices
  • VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay
  • Top 10 Fraud Detection Tools to Watch in 2026
  • Top 10 Spam Filter Tools for 2026
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay

March 30, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.