Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

AI Algorithms Could Undermine Your Security Job Hunt

Use of AI is a double-edged sword for both job seekers and the companies looking to hire them.

By Jerry J. Brennan, Joanne R. Pollock
Customer retention concept
Sorbetto / DigitalVision Vectors / Via Getty Images
August 15, 2025

Over the last 30 days, you’ve sent out more than 100 job applications, tailoring your resume and cover letter for each, regardless of whether the job matched your experience level. Yet, the response has consistently been the same: crickets.

There are many reasons you might not be receiving responses from the companies you’re applying to. Increasingly, however, artificial intelligence (AI) is likely playing a key role in what you are experiencing. AI is being used by both security job seekers and the companies that hire them. Often with unsatisfactory results for all parties.

Key areas where AI has the potential to affect your job search:

  • Job seekers are increasingly using AI to craft resumes tailored for specific roles, ensuring all relevant keywords from the job description, those likely to be scanned by a company’s applicant tracking system, are included. However, recruiters are on top of this trend and can quickly detect when a resume or cover letter has been generated by AI. Once recruiters identify such content, they tend to disregard the application.
  • Candidates using AI systems to generate resumes do so far more quickly than a human can. This means job openings that used to receive 100 resumes can now be deluged by more than 1,000 in an extremely abbreviated time. When this occurs, companies shut down the application portal for that role because their recruiters are overwhelmed.
  • Companies program their applicant tracking systems and other AI-driven tools to scan resumes before a human recruiter sees them. You may be automatically rejected by AI, and your resume may never be seen by a person. Additionally, companies often cap the number of applicants they will accept for any given search, regardless of whether those resumes match the job. If your resume is sent past the arbitrary cap, you won’t be considered unless they re-open the search.
  • AI doesn’t always create correct job descriptions. Companies use their internal AI systems to generate position profiles. Their systems are customized to reflect the terminology and style commonly used by the organization in its business operations. For roles that are less often recruited — such as security positions — language specific to those positions might be drawn from an external AI system. If the recruiter doesn’t regularly recruit for security roles, does not review the output, and relies solely on AI to generate the description, the language describing the role may not be correct or even make sense.
  • LinkedIn, widely used by job seekers, extensively utilizes AI to change the algorithms recruiters use on its site. Recruiters posting into job slots attached to their company page can screen for various candidate pluses and minuses not based on the recruiter’s choices but based solely on options LinkedIn has concluded are broadly most effective. These options are significantly limited as far as security industry skills and competencies. Your specialized security industry experience is likely underrepresented or not present in LinkedIn’s databases.
  • LinkedIn also uses AI to surface candidates for recruiters. When the recruiter posts a job in a job slot, LinkedIn’s AI system instantly delivers all the candidates in its database who meet the requirements based on an ever-changing algorithm that considers many varied factors. For instance, when we post a position in our LinkedIn job slot, it’s common to immediately be served between one thousand and two thousand “ideal candidates.” LinkedIn’s security categories are marginal; therefore, the AI response is often wildly off target.
  • If a recruiter posts a job listing on LinkedIn that is not in a job slot, the recruiter is relying on followers to respond to the job after seeing it in their feed. LinkedIn’s AI algorithms determine what posts you see and when you see them. If you have thousands of posts in your feed, you may never see that security job that’s perfect for you.
  • If you have created a profile on platforms like LinkedIn, Indeed, or Glassdoor, you will be served jobs that the AI algorithms these services use think you are a match for. Again, if your specialized security ability is not included in the databases of these providers, they are not going to send you the jobs you are looking for.

Use of AI is a double-edged sword for both job seekers and the companies looking to hire them. What has the appearance of an invaluable aid may turn out to be a handicap. There is still no substitute for using your own efforts and judgment when searching for your next security job.

KEYWORDS: career development security career security career planning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Job Search Strategy

    Do security job titles affect your job search strategy?

    See More
  • Security Job Search

    Mistakes to avoid in your security job search

    See More
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing