Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //


08:05 AM
Dawn Kawamoto
Dawn Kawamoto
Dawn Kawamoto

AI Is Stealing These IT Security Jobs Now

Besides the current crop of jobs AI is stealing, other InfoSec roles are also potentially next unless professionals safeguard their careers by repositioning their skills, say IT security and careers experts.

Despite a crushing demand for IT security workers, not all InfoSec roles are safe from layoffs or redeployment as more companies turn to artificial intelligence and machine learning, according to IT security and careers experts.

IT security pros may assume their jobs are safe, especially when figures such as a 1.8 million IT security worker shortage is projected by 2022, according to ISC(2). But, like a sailor at sea, IT security professionals may find themselves lamenting a similar woe of "water, water everywhere, nor any drop to drink."

The global AI security market is projected to reach $34.8 billion by 2025 -- nearly a 31.4% jump from 2017, according to a MarketsandMarkets report, as companies seek to use the technology not only to address the IT security worker labor shortage but also deal with the mounting barrage of cybersecurity threats they face.

"Roles like Security Analysts, Intrusion Detection, Vulnerability Assessors are all competing with AI. I think in the next five to ten years a vast majority of these positions see AI replacing humans. There are massive investments in AI to solve cybersecurity issues, this will continue to attract more competition to the market and the rate of innovation will continue to accelerate," predicts Sam Bouso, founder of AI IT security company Precognitive, in an interview with Security Now.

IT security jobs now at risk of replacement
Tier 1 and Tier 2 security analysts and Security Operations Center (SOC) analysts who hold a similar ranking are currently the most at risk of having artificial intelligence technology replacing their position, Nitin Agale, senior vice president of products for AI company Securonix, told Security Now.

Use of machine learning and AI will automate threat detection through use of self-learning algorithms, so this will eliminate the need for manually configuring tools to detect threats, Agale explains. He added that AI-based incident response will eliminate the need for actions by Tier1 and 2 analysts to be performed manually.

Kathleen Smith, chief marketing officer of IT security recruiting company ClearedJobs.Net/CyberSecJobs.com, weighed in on the AI and IT security jobs issue:

In cyber security, we are seeing the blue teams or defensive positions will be impacted by automated processes more so than red team or offensive positions or penetration testing. Defensive tasks such as making sure patches are implemented, identifying and dealing with simple intrusions, and the like. While you can argue that both red team and blue team positions are an art as much as a science, red team is more so.

Indeed. Security architects, security auditors and compliance officers, as well as IT security management roles like chief information security officers, are positions that will likely avoid competition from AI technologies, Agale said.

"Machine learning and AI is focused on optimizing threat detection and response," Agale explains. "You still need strong architects to design your security framework, decide which tools to use, etc. Auditors and compliance teams serve a different purpose and hence won't be impacted. Same with management positions – you need decision makers."

IT security layoffs & redeployments post AI
In some cases, Bouso is aware of companies issuing layoffs after putting their AI and machine learning in place, but he noted more often IT security professionals tasked with previously performing certain IT security functions will oversee and run quality assurance on the AI and machine learning technology that has replaced them.

"It often takes more than a year to 18 months to hire qualified cyber security talent, so smart companies are working to retrain internally and redeploy," Smith said. "This takes some rethinking on the part of companies to instill in their management to pick the best talent on their teams and work with them to enhance their skills to manage the machine learning and AI, or to move into risk management. "

Jeff Weber, executive director for Robert Half Technology, told Security Now that the ability to retrain and redeploy IT security professionals is a key talent goal for most IT organizations that are fighting for talent.

"If the process or activity impacted by AI and related topics is in the area of security and privacy, most organizations would strive to retain that critical skillset," Weber adds.

Certain IT security skills are likely to remain in demand for the near future, despite advancements in AI and machine learning, say careers and security experts.

Soft skills that include effectively working with others, communication skills, curiosity about learning new areas, and listening skills will remain in demand, Smith said.

Bouso provided a more sobering outlook, however.

"We still need humans to supervise the machines. That need will decrease as these (AI and machine learning) technologies mature. But this will open more opportunities for IT security in other areas where AI and machine learning is still not sufficient as a standalone," he said.

However, Bouso, further notes: "The challenge will be for those lesser skilled workers as they may not have the capabilities to step up to more mentality challenging roles that AI cannot yet successfully perform. The problem here though, is that those more difficult tasks will again become automated and level of human intellect required to carry out the next level up in tasks which AI can't perform yet will again go up."

Related posts:

— Dawn Kawamoto is an award-winning technology and business journalist, whose work has appeared in CNET's News.com, Dark Reading, TheStreet.com, AOL's DailyFinance, and The Motley Fool.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 ve...
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version ...
PUBLISHED: 2020-09-30
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.
PUBLISHED: 2020-09-30
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior version...
PUBLISHED: 2020-09-30
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.