<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cybersecurity Notes: Situational Awareness]]></title><description><![CDATA[This sections covers the most important changes in Cybersecurity and AI.]]></description><link>https://notes.techimpossible.com/s/situational-awareness</link><image><url>https://substackcdn.com/image/fetch/$s_!Vt0i!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764ddc30-2787-4432-9853-4962e1b70c16_1280x1280.png</url><title>Cybersecurity Notes: Situational Awareness</title><link>https://notes.techimpossible.com/s/situational-awareness</link></image><generator>Substack</generator><lastBuildDate>Sun, 05 Apr 2026 14:39:13 GMT</lastBuildDate><atom:link href="https://notes.techimpossible.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Peter Skaronis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybersecuritynotes@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybersecuritynotes@substack.com]]></itunes:email><itunes:name><![CDATA[Peter Skaronis]]></itunes:name></itunes:owner><itunes:author><![CDATA[Peter Skaronis]]></itunes:author><googleplay:owner><![CDATA[cybersecuritynotes@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybersecuritynotes@substack.com]]></googleplay:email><googleplay:author><![CDATA[Peter Skaronis]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Cybersecurity Career Playbook Broke in 2025]]></title><description><![CDATA[Work arrangements, market mechanics, and what comes next]]></description><link>https://notes.techimpossible.com/p/cybersecurity-now-and-after-agi</link><guid isPermaLink="false">https://notes.techimpossible.com/p/cybersecurity-now-and-after-agi</guid><dc:creator><![CDATA[Peter Skaronis]]></dc:creator><pubDate>Tue, 06 Jan 2026 15:17:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cRIh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cRIh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cRIh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cRIh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2315635,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://notes.techimpossible.com/i/146379243?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cRIh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cRIh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F930e6a70-081d-4d1b-bfc4-3f02669f9928_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After a decade as a permanent full time employee in cybersecurity, I was in debt. Then I got made redundant along with 24 other people.</p><p>That redundancy was the best thing that happened to my career.</p><p>Within months of crossing over to contract work, I was earning 3 to 5 times what I made as a permanent employee. I was doing the exact same tasks. The difference wasn&#8217;t my skills. It was understanding how companies actually spend money on security.</p><h2>The Diagram</h2><p>Over 20 years working in IT and cybersecurity across Greece, the UK and Canada, I&#8217;ve worked every arrangement on this spectrum.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p1Mf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p1Mf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 424w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 848w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 1272w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p1Mf!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png" width="1200" height="773.0769230769231" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:938,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:412990,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://notes.techimpossible.com/i/146379243?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p1Mf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 424w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 848w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 1272w, https://substackcdn.com/image/fetch/$s_!p1Mf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F057156ad-0910-49b8-91b1-cbb9dc3aa324_2452x1580.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>On the left you have the Employee arrangements. Stable, predictable, not tax efficient. On the right you have Business Owner arrangements. Variable, flexible, and where the real money is.</p><p>The center is the pivot point. Most cybersecurity professionals never cross it.</p><h2>The Permanent Employee Years</h2><p>I started on the left side of that diagram. Junior Security Analyst, part of an InfoSec team, doing vulnerability scans, phishing tests, endpoint deployments, policy updates.</p><p>The pay was entry level. Raises depended on annual objectives. I got a bonus a few times when I was working in the UK. Nobody told me it was taxable.</p><p>The pace was slow. The ceiling was low. After a decade of this, including on call rotations, I was still in debt.</p><p>Then came the redundancy notice.</p><h2>Crossing Over to Contract Work</h2><p>When I started applying for permanent roles again, recruiters were suddenly helpful. Redundancy makes you a sympathetic candidate. But after two rounds of interviews with no offers, I took my first contract role.</p><p>That&#8217;s when I learned what contractors had known all along.</p><p>Every company has buckets of money called OPEX and CAPEX. These stand for Operating and Capital Expenses. Some departments have allocated project budgets they must spend each year or they lose it. That&#8217;s where external consultants come in.</p><p>When I worked in UK government, every January we had to find contractors to use up the remaining budget. If we didn&#8217;t spend it, next year&#8217;s allocation would drop.</p><p>Now, companies don&#8217;t find contractors randomly. They partner with recruitment agencies. Smaller companies work with multiple agencies but larger companies have only 2 or 3 agencies that they work with exclusively. Sometimes there&#8217;s a Managed Service Provider in between who has the contract with the end client but needs bodies to deliver it.</p><p>Here&#8217;s where you come in. To work as a contractor, you need a few things:</p><ul><li><p>A business incorporated</p></li><li><p>A business bank account</p></li><li><p>Liability insurance</p></li></ul><p>From the company&#8217;s perspective, engaging a business with its own liability insurance is a risk mitigation strategy. It&#8217;s often easier for them than hiring you as an employee.</p><p>Once you have these set up, you can start applying for contract roles. An example workflow goes like this. You find a contract role on LinkedIn. The job posting will be titled something like &#8220;Cybersecurity Analyst 6 Month Contract&#8221;, fully remote or hybrid.</p><p>The decision cycle is way faster than permanent job applications. I have been offered contract roles after a single 20 minute phone interview. Sometimes after two rounds, but never the drawn out permanent hire process.</p><p>The money goes into the business and you have flexibility on how to pay yourself. Usually this is through a combination of minimum salary and dividends. It&#8217;s tax efficient in ways that permanent employment never is.</p><p>The pros of this arrangement is that you might be doing the exact same task that you were doing as a permanent employee but being paid 3 to 5 times more.</p><h2>UK Business Tax Reform</h2><p>After 4 years of working on contract roles through my UK limited company, the government introduced IR35 legislation. This put the onus on the clients hiring small business owners like myself and made them liable for additional tax if they were audited and my engagement was deemed to be that of an employee rather than a contractor.</p><p>My contracts were written correctly. I could provide replacement resources if needed. That didn&#8217;t make a difference. Most companies hired the Big 4 (KPMG, PWC, Deloitte, E&amp;Y) to assess their contractor arrangements, and overnight nobody wanted to hire anyone with a limited company.</p><p>If you wanted to keep working as a contractor, you had to register as an employee of an umbrella company that could subcontract you to the client. The daily rate was still better than being a permanent employee but all the income was now taxable. I didn&#8217;t have paid holiday or sick days. Over the coming months the daily rates dropped even further.</p><p>The timing of the global pandemic made remote working mandatory and this made the situation more bearable. But the UK contractor market was permanently changed. I started looking at North American markets instead.</p><h2>Direct Clients and Partnerships</h2><p>Since I still had a business I started working directly with clients. This is the best arrangement. It is not easier as you have to be the marketing, sales, project and delivery person.</p><p>At the same time as remote work became the norm, it became possible to work with people globally. While working on moving and starting another company in Canada, I found consulting companies that had an overflow of clients they couldn&#8217;t serve. Instead of going through recruitment agencies, they partnered with other small business owners like myself and worked on SOW (Statement of Work) projects. These would be one off 40 hour engagements or longer term projects.</p><p>This arrangement provides a stream of leads and you can focus on delivery.</p><h2>The Cycle</h2><p>Here&#8217;s what nobody tells you. Until you have your own clients, you&#8217;re caught between a wheel of contract roles and permanent roles. Sometimes the contract market is slow and you have to take a permanent role. Sometimes it&#8217;s the opposite.</p><p>In January 2024 I went back into permanent employment. In March 2025 I was laid off for no reason. There just wasn&#8217;t enough work. In VC funded startups, higher paid roles go first. This was the second time in my career I was laid off in 22 years. Not bad.</p><p>But 2025 was different. Neither market worked. The AI hype, tariffs, economic uncertainty. Everything combined to freeze hiring. Contract roles that used to need 1 or 2 interviews now wanted to take you through 3 or 4 rounds. And they still couldn&#8217;t decide.</p><p>It was unreasonably hard to land even another contract role. That&#8217;s when I focused on getting my own clients.</p><h2>What This Means For You</h2><p>I don&#8217;t have a playbook anymore.</p><p>Everything I described above worked for 20 years. The permanent to contractor jump. The wheel between contract and permanent roles when one market went cold.</p><p>In 2025, all of it stopped working at the same time.</p><p>If you&#8217;re a permanent employee in cybersecurity wondering why contractors doing the same work earn multiples of your salary, now you know the mechanics. But knowing the mechanics doesn&#8217;t help when the machine is broken.</p><p>One thing still works: partnerships with larger consultancies. Building real relationships has been more beneficial in the long run than getting a higher contract rate or higher billable hours.</p><p>Another thing that&#8217;s worked at every level: don&#8217;t give textbook answers. When you&#8217;re interviewing for a contract role or pitching a client, understand the problem they&#8217;re trying to solve. Explain how you&#8217;d approach it as if you&#8217;re already part of the team. Take something you did elsewhere and apply it to their environment in real time, using whatever detail they&#8217;ve shared. Make them see you already solving their pain points.</p><p>Throughout all this I learned what amazing consultants look like. Naval Ravikant talks about these traits in an interview: talent, curiosity, good nature, low ego, high drive, and vision. Earned respect, not networked connections. He says the best way to match with people is through work, not just networking. Deeply understand and admire their work. Offer help. Ask good questions. Contribute.</p><p>That&#8217;s been my north star for a long time. Find people you deeply respect. Do good work with them. Build trust over time.</p><p>This isn&#8217;t a playbook. It&#8217;s a map of where the roads used to go, and a compass for what might come next.Cybersecurity Notes is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Talent Landscape and LLMs]]></title><description><![CDATA[Insights for Aspiring Consultants]]></description><link>https://notes.techimpossible.com/p/cybersecurity-talent-landscape</link><guid isPermaLink="false">https://notes.techimpossible.com/p/cybersecurity-talent-landscape</guid><dc:creator><![CDATA[Peter Skaronis]]></dc:creator><pubDate>Sat, 06 Jul 2024 21:15:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IWrb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IWrb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IWrb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IWrb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg" width="1152" height="640" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:640,&quot;width&quot;:1152,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IWrb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IWrb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db7237-899e-4125-8f4b-0e655be3d5bc_1152x640.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cybersecurity Talent Landscape and LLMs</figcaption></figure></div><p>Interviews have always been a necessary evil of the recruitment process. It is a performance. Nobody is their real self and can easily pretend to be whatever you want them to be for those 30&#8211;45 minutes. With the addition of Zoom interviews, it has become even more difficult to draw meaningful conclusions after the interaction.</p><p>You always get a gut feeling within the first 5 minutes, and that is important, but assessing the level of understanding a candidate possesses is both an art and a science. I have interviewed candidates throughout my career for various roles, but it has always been face-to-face interviews.</p><p>The pandemic made virtual interactions the new standard. In October 2022, the advent of ChatGPT, a publicly available large language model, changed the world. On the flip side, this elevated the meaning of the phrase &#8220;fake it till you make it&#8221; to a new stratospheric level.</p><p>In the context of interviews, the issue is not entirely with candidates but with the outdated hiring workflow. For years, your chances of being screened through to an interview have relied on keywords within your resume. So, making sure your resume matches the job title of the role you are applying for helps recruiters who do not have a technical understanding to match you with the job description.</p><p>I&#8217;ve had to do this too until I realized how this game works and learned to deal with recruiters.</p><p>Over the past year, every industry has been affected by the use of LLMs, and hiring and interviewing are no exception. Every few months, the iteration of large language models approaches the capabilities of human intellect. The latest models from OpenAI, ChatGPT-4.0, and Claude 3.5 have the reasoning skills of a teenager, and at some point, AGI will be smarter than 8 billion brains combined.</p><p>These are useful and amazing tools that can simplify tasks and amplify our capacity. The one thing they can&#8217;t do, for the time being at least, is sound human. The output is mechanical, and if you read it out verbatim, pretending that these are your thoughts, you sound like a smart assistant reading a Wikipedia article. In the past year, companies have been using AI to triage resumes, and candidates have been leveraging AI to pass through that triage.</p><p>There is nothing wrong with utilizing LLMs where it makes sense, but if you are trying to build a whole other persona through LLMs that manufacture a resume for you based on a job description with no basis in reality, then this is misrepresentation. It is actually a felony in 11 states in the US, in the UK, and other countries.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://notes.techimpossible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cybersecurity Notes is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Over the past 2 months, I&#8217;ve had the experience of interviewing candidates for various levels of cybersecurity roles, all the way from the C-suite to analyst level.</p><p>I was shocked to discover that 70% of the candidates were following the same playbook. Specifically, there were 2 playbooks.</p><p>The first strategy appeared to be using an LLM to tailor the resume based on the job description and using words like senior, experienced for a work history of 3 years in total.</p><p>The second strategy was using a really impressive resume that had a work experience of 15 years and company names like Deloitte, PWC, Accenture. The strategy was to read through the made-up resume and then repeat each question with a pause and then start every response with, &#8220;Let me answer that for you.&#8221;</p><p>In either case, when I looked up a LinkedIn profile, the work experience matched the resume, but the roles on LinkedIn were in a completely different department than what was listed on the resume. For example, someone working as an Assistant Store Manager in a retail company had replaced that with Cybersecurity Analyst but had nothing to do with that.</p><p>Some candidates had a resume listing senior roles with the Big 4 but no online presence whatsoever.</p><p>Having LinkedIn is not a prerequisite, but I find it odd for someone to have spent 15 years with the Big 4 and not have any voice online.</p><p>During the interview, the candidates would blatantly read from the screen and in most cases repeat variations of the same answers regardless of the question.</p><p>There was no understanding of any of the domains in cybersecurity for the obviously fake resumes, but even the ones that did work in existing cybersecurity roles did not have any understanding outside of their day-to-day tasks.</p><p>The next striking observation was the correlation between certifications and actual knowledge. As with most industries, most people are split 50/50 on whether it makes sense to pursue certifications or not. I have obtained various certifications over the years, but I don&#8217;t do that anymore. I haven&#8217;t stopped developing my knowledge and understanding, just approach it differently.</p><p>Some of the candidates I interviewed had a list of certifications as long as my arm but couldn&#8217;t explain anything.</p><p>One candidate had just passed his CISSP exam. I congratulated him and proceeded to ask what some common domains across frameworks are that we would look to implement policies, processes, and controls in a small business.</p><p>The answer was, &#8220;I know I just passed the exam, but I don&#8217;t remember any domains.&#8221;</p><p>This relates to a concept called &#8220;The Map is not the territory.&#8221; This phrase was coined by Polish-American scientist and philosopher Alfred Korzybski in 1931. It means that looking at a map of a city is not the same as walking in it and experiencing it yourself.</p><p>The first 3 years of my career in cybersecurity, I was limiting myself to the tasks and activities of my job. As soon as I started getting exposed to other functions and started connecting the dots, I began creating a map in my head after walking through all the domains in cybersecurity. I put in my 10,000 hours and keep going.</p><p>Most candidates have a narrow field of vision and understanding of the big picture, and in some cases have no desire to do so, so they turn to ChatGPT as a shortcut.</p><p>The instant gratification promised by internet gurus gives people the false hope of going from 5 figures to 6 figures in 30 days, just because they went through a bootcamp or completed a certification.</p><p>Now, the current advice is to not even do that. The TikTok influencers are showing people that by using LLMs, you can pass technical interviews even in industries like aerospace without prior knowledge. I watched someone interviewing for Boeing as an engineer, answering questions on material strength, and passing the interview.</p><p>This is criminally dangerous. Imagine getting a job at Boeing and being the reason that planes start flying out of the sky.</p><p>If you haven&#8217;t heard it already, LLMs lie.</p><p>Specifically, they hallucinate. This is all to do with their original programming. The goal in most cases is to provide an answer. It is not to provide a truthful or factual answer but a complete answer, even if the LLM has to manufacture details that are untrue.</p><p>As these models evolve and become more capable, we will always look for people to build relationships based on honesty, integrity, and character. You cannot build these things by repeating words spit out from code. Have more honest conversations. It&#8217;s okay to say, "I don&#8217;t know this." Be honest. Be human. People appreciate that.</p><p>Put in the hours. Ask ChatGPT questions but then go and actually work on a hands-on project. Write a policy document. Use VMs to create a lab. Build a domain, configure group policies, and harden the OS following CIS guides.</p><p>ChatGPT can help with brainstorming project ideas, but you have to actually work on the project. Create something you can talk about and write about. Figure out what interests you and then apply for jobs in that field.</p><p>Don&#8217;t waste other people&#8217;s time. Do something you are proud to talk about to others.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://notes.techimpossible.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cybersecurity Notes is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>