Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange  ·  activity timestamp 7 hours ago

I get asked a lot lately what I think people who want to get into cyber security should focus on. My go to answer is incident response, since it seems like the mountains of vibe code and half-assed zero trust architectures is creating galactic scale potential breach energy. Would that be called vibe responders? Or is that for when we figure out how to hand over IR to AI as well?

  • Copy link
  • Flag this post
  • Block
vpz
@vpz@infosec.exchange replied  ·  activity timestamp 6 minutes ago

@jerry My answer for years was to tell folks to build knowledge in how IT works first. Like work as a system admin, network admin, etc. However now a lot of the feeder roles are being offshored. The industries drive for cost cutting is killing the funnel for new folks. I work at a very large US company and I heard that we had ONE college grad hire in the cybersecurity department in 2024! I don’t have college grad numbers for this year, but I know we hired hundreds of offshore folks. My team is now 50% offshore. I don’t know what to tell young people wanting to get into cybersecurity any longer.

  • Copy link
  • Flag this comment
  • Block
Christoffer S.
@nopatience@swecyb.com replied  ·  activity timestamp 1 hour ago

@jerry Just like with the outsourcing craze and the cloud craze, the industry most certainly didn't shrink in terms of workforce.

Each "revolution" brought a shift in workers, but the absolute number of IT professionals never diminished.

I'll venture a not-very-novel guess: the AI craze won't change this either. Here's what I believe will happen:

1. The next 1-3 years will see entry-level programming jobs significantly reduced.
2. A significant amount of terrible SaaS apps will be deployed (very much aligned with slop coding).
3. A significant number of non-trivial incidents will occur.
4. Insurers and regulators will begin mandating human oversight after high-profile failures.
5. After 1-3 years, LLMs will stop improving. Agentic AI will fail to deliver on the promise of doing everything for you.
6. Demand for cybersecurity engineers with decent programming knowledge will increase significantly.
7. Companies will start asking for human developers again because AI code-gen costs finally became untenable due to ridiculous price hikes and massive AI-company failures.
8. Entry-level jobs will reappear, and entry-level salaries will be much higher than normal because there are no entry-level applicants.
9. Senior programmers will have atrophied because they were paid to prompt and correct, but the juniors who would have replaced them never existed.
10. Companies will face years of cleaning up AI-generated technical debt; code that "works" but nobody understands.
11. The junior-to-senior pipeline will be broken, and that takes a decade to repair, not 3 years.
12. Companies/individuals who didn't bet their entire future on AI will win, go to Mars to fuck Elon over, return, and be celebrated like kings and queens.
13. Profits all around.

Or something like that.

  • Copy link
  • Flag this comment
  • Block
hal8999
@hal8999@infosec.exchange replied  ·  activity timestamp 2 hours ago

@jerry Vibe reponse is the only way to handle the volume of alerts from all the things.

Shared a thousand files with a yahoo address? Looks fine. I have a cookie tin to investigate with higher priority.

  • Copy link
  • Flag this comment
  • Block
katzenberger
@katzenberger@tldr.nettime.org replied  ·  activity timestamp 3 hours ago

@jerry

To "get into cyber security", especially in the context you mentioned, would also include lucrative, but illegal work… wouldn't it…?

  • Copy link
  • Flag this comment
  • Block
🅱🅻🆄🅴🅱️
@BlueBee@infosec.exchange replied  ·  activity timestamp 4 hours ago

@jerry

It 'feels' like we created systems that are easily made insecure on accident.

If you leave a lot of bombs laying around that are hair triggered, at some point it's the system architecture that's the problem and not the users.

I mostly avoid certain domains because of this. I don't host services online because I don't know enough about them to keep them secure, though one day I will tackle that, and I have in the past, but I have just found it easier to avoid it for now.

  • Copy link
  • Flag this comment
  • Block
x41h
@x41h@infosec.exchange replied  ·  activity timestamp 5 hours ago

@jerry my go to answer would be to learn shell scripting, networking and Linux terminal commands. People want to jump ahead too fast.

  • Copy link
  • Flag this comment
  • Block
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange replied  ·  activity timestamp 4 hours ago

@x41h The issue is that people are having a hard time finding entry level jobs now and so wanting to know what sorts of jobs are still in demand. Broadly speaking, I agree with you - I think the best security workers have an IT background, but even those roles are hard to get these days.

  • Copy link
  • Flag this comment
  • Block
x41h
@x41h@infosec.exchange replied  ·  activity timestamp 4 hours ago

@jerry ah true. In this case finding an IT job can lead to entry level infosec positions. I support security solutions e.g., vulnerability scanning & EDR. I speak to companies of various sizes. Less sophisticated tools don't require MDR. In-house teams manage these security tools and handle incident response... sometimes better or worse than others.
MSSPs have high churn due to burnout. Places like Arctic Wolf, RQ, etc. provide on the job training for security analysts. Although these roles offer great experience it might turn one into an alcoholic. I notice these positions hiring more frequently. They prefer least experience because the pay doesn't scale well.
So my advice is to search smaller companies with open IT positions because eventually the role will require focus on security. Get with their security folks to learn about org security posture. Ask questions and show interest. If they don't have visibility into their security posture then perfect timing to push budget goals and take lead.
In my time in a SOC I never saw AI being utilized. Though it was claimed. Threat detection engineers leveraged machine learning. Security analysts still used XDR to pivot during investigations.
I think it's still a great time to get in before the market relies on AI in full capacity. I personally have not seen AI taking over blue team roles.

  • Copy link
  • Flag this comment
  • Block
BrianKrebs
@briankrebs@infosec.exchange replied  ·  activity timestamp 5 hours ago

@jerry Word of 2025: Vibe responders. That "Feels" like the way to go. Let's do that!

  • Copy link
  • Flag this comment
  • Block
CybeardSec
@cybeardsec@infosec.exchange replied  ·  activity timestamp 4 hours ago

@briankrebs @jerry I know so many cybersec people that are 100% sold on "vibe coding" and everything associated with it and can't stop talking about it. Makes me kind of nauseous.

I think it's time to start making furniture or something.....

  • Copy link
  • Flag this comment
  • Block
schrotthaufen
@schrotthaufen@mastodon.social replied  ·  activity timestamp 5 hours ago

@jerry @blogdiva I unironically think starting with solid ops skills is a good choice. With that, one can properly deshittify vibed infrastructure.

  • Copy link
  • Flag this comment
  • Block
Hamishthepiper
@hamishthepiper@ioc.exchange replied  ·  activity timestamp 6 hours ago

@jerry DFIR is one of those fields where to be good you need the experience and scars of having investigated human activity in lots of different scenarios/environments. AI by its very nature can’t do this, and I’m tired of folks trying to personify these code-boxes. Like has been said in this thread, AI is a great tool. We’ve seen good success at our firm with helping get some broad strokes with large datasets, and with summarizing what a human has already called “bad”. But you’ll have to convince me that it’ll be able to do things like see Entra Session hijacking, understand it needs to investigate, and eventually find an ESXi in-memory implant that can pull cookies from VMs and proxy the replayed sessions through the hypervisor itself. That’s what human adversaries are doing (probably augmented with AI).

  • Copy link
  • Flag this comment
  • Block
Gato Negro
@crp@infosec.exchange replied  ·  activity timestamp 6 hours ago

@jerry I am glad and congratulate myself for having stopped sticking my nose into cybersecurity and going back to programming in Linux, just for the art. The bugbounty scene, in particular, has been filled with Mac kids playing with AI.

  • Copy link
  • Flag this comment
  • Block
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange replied  ·  activity timestamp 6 hours ago

@crp I think if you ask any open source program, they'll tell you that they are absolutely swamped with AI generated vulnerability report nonsense. So you are probably onto something

  • Copy link
  • Flag this comment
  • Block
Gato Negro
@crp@infosec.exchange replied  ·  activity timestamp 6 hours ago

@jerry That's right. Just today I read about a HackerOne report done with AI on the curl bugbounty program. By the way, @bagder was very upset, and he's right. And this is happening everywhere.

  • Copy link
  • Flag this comment
  • Block
Walker
@Walker@infosec.exchange replied  ·  activity timestamp 6 hours ago

@jerry Vibe Responders = Slop Cleaners.

Contrary to AI marketing, AI will not take IR jobs. Those who say it will do not know all the aspects of IR. AI will enhance IR but will not replace it.

I agree that IR is a great field to get into and can talk for hours about its finer points.

  • Copy link
  • Flag this comment
  • Block
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange replied  ·  activity timestamp 6 hours ago

@Walker In my career, I have been involved in the response to well over 1000 incidents (it's a long story), so I completely agree with you on all points, but I am not sure the reality of the situation is actually going to change where we're headed

  • Copy link
  • Flag this comment
  • Block
Walker
@Walker@infosec.exchange replied  ·  activity timestamp 6 hours ago

@jerry true, AI will change the field, but my one of my fallback responses to those who say AI will replace IR professionals and all aspects of cyber security is that for AI to control everything then AI needs to know about all systems within an environment.

Complete asset management is effectively impossible and massively expensive. There is always shadow IT BYOD, etc, most companies can not afford it. This creates blind spots that could be exploited. The risk of these blind spots could be mitigated but that is also expensive.

Then there is the AI arms race. As good as AI defense becomes the AI attackers will also get better.

Plus IR involves other intangible factors including legal, data privacy, communications, HR, client / vendor relationship management. Those intangibles still require human relationship interactions.

  • Copy link
  • Flag this comment
  • Block
fedops 💙💛
@fedops@fosstodon.org replied  ·  activity timestamp 6 hours ago

@jerry my answer would be architecture as that is least likely to be successfully killed by "ai". Also IR is just a slogging dread that makes you wish to die asap.

  • Copy link
  • Flag this comment
  • Block
kwayk42
@kwayk42@sechtor.social replied  ·  activity timestamp 6 hours ago

@jerry isn't it great how the industry is turning into needing people just to push a button? Soon they won't even need people to push a button and then we'll be living IN THE FUTURE

Your browser does not support the video tag.
GIF
GIF
a cartoon character with the word adult swim on the bottom left
a cartoon character with the word adult swim on the bottom left
  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 6 hours ago

@jerry Security Copilot

  • Copy link
  • Flag this comment
  • Block
Jack
@knapjack@gruntle.cc replied  ·  activity timestamp 7 hours ago

Responding to the vibe is grooving.

  • Copy link
  • Flag this comment
  • Block
XenoPhage :verified:
@XenoPhage@infosec.exchange replied  ·  activity timestamp 7 hours ago

@jerry *is* there a PG answer to what a vibe responder is?

  • Copy link
  • Flag this comment
  • Block
Santa Caws
@cR0w@infosec.exchange replied  ·  activity timestamp 7 hours ago

@jerry The SOAR vendors are already trying to AI-ify IR. It's... not good.

  • Copy link
  • Flag this comment
  • Block
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange replied  ·  activity timestamp 7 hours ago

@cR0w “first, we made a dumpster fire that makes your IT a dumpster fire. now we’ve made a dumpster fire that manages your dumpster fire caused by the dumpster fire “

  • Copy link
  • Flag this comment
  • Block
katie
@k4713@social.xenofem.me replied  ·  activity timestamp 6 hours ago
@jerry @cR0w i'm 99% confident that what's happening is the entire global market is praying that if they start switching to AI now, it'll be ready and actually useful and better than humans before they actually complete the transition. it seems to be guided out of a fear of companies being left behind if they don't switch to AI and it does turn out to be as good as """Open"""AI wants everyone to believe it will be 6 months from now (for the past 5 years)
  • Copy link
  • Flag this comment
  • Block
❄️☃️Merry Jerry🎄🌲
@jerry@infosec.exchange replied  ·  activity timestamp 6 hours ago

@cR0w hopefully it all can run on kubernetes at least.

  • Copy link
  • Flag this comment
  • Block
Santa Caws
@cR0w@infosec.exchange replied  ·  activity timestamp 6 hours ago

@jerry dumpster_fire_gif flan_on_fire dumpster_fire_gif

  • Copy link
  • Flag this comment
  • Block
Santa Caws
@cR0w@infosec.exchange replied  ·  activity timestamp 7 hours ago

@jerry It sure is convenient that the worst ones also provide their own "elite" IR services to clean up all the dumpster fires. But they're expensive because they use humans instead of dumpster igniting software.

  • Copy link
  • Flag this comment
  • Block
Log in

Bonfire community

This is a bonfire demo instance for testing purposes

btfree.social: About · Code of conduct · Privacy ·
Bonfire community · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Public Groups
  • Code of Conduct
Home
Login