Layoffs to Opportunity: How Tech Pros Can Pivot to Cybersecurity in 2025
As the tech industry grapples with over 61,000 layoffs in 2025, including significant cuts at companies like Walmart and Microsoft, a beacon of opportunity shines in cybersecurity.
With 750,000 unfilled cybersecurity positions in the U.S. alone and salaries ranging from $97,000 to $159,000 for engineers, the field offers a stable and lucrative career path, according to Cybersecurity Ventures and SimpliLearn’s 2025 reports.
Amid economic uncertainty, tech professionals—software engineers, IT specialists, and even non-technical roles like project managers—are eyeing cybersecurity as a viable pivot.
We reached out to tech leaders, industry experts, and business executives to answer a critical question:
Which professionals are best positioned to train for cybersecurity roles, and what practical steps can they take to make the transition?
From upskilling strategies to navigating the skills gap, their insights reveal how laid-off workers can seize this moment to forge resilient careers in a field where demand far outstrips supply.
Read on!
Chongwei Chen
After spending years helping organizations recover from data disasters, I’ve seen firsthand how cybersecurity failures lead to catastrophic data loss. This gives me unique insight into which tech professionals can most effectively transition into cybersecurity roles.
Best positioned for cybersecurity transitions:
Software Developers are prime candidates – they already understand system vulnerabilities and can quickly learn secure coding practices.
Network Engineers have a natural advantage since they already work with the infrastructure that cybersecurity professionals must protect. Their understanding of protocols and network architecture translates directly.
Database Administrators possess critical skills around data protection and access controls that are fundamental to cybersecurity roles.
My recommendations for career changers:
- Start with data protection fundamentals – understanding how data moves, where it’s vulnerable, and recovery procedures gives you credibility when discussing prevention strategies.
2. Get hands-on with incident response – volunteer to help with data breach recoveries to understand the full lifecycle of security incidents.3. Focus on compliance frameworks – many cybersecurity roles require knowledge of GDPR, HIPAA, and other regulations that govern data protection.
The data recovery industry has taught me that prevention is always more cost-effective than recovery, making cybersecurity professionals invaluable investments for any organization.

Chongwei Chen
President & CEO, DataNumen
Geraldine Olea
The recent wave of tech layoffs has understandably created uncertainty, but it has also opened the door to new opportunities. With over 750,000 unfilled cybersecurity roles in the U.S. and strong earning potential, this field presents a promising path forward.
Speaking from my own experience of pivoting into tech without a traditional background, and now coaching others through similar transitions, I can confidently say that it’s entirely possible. It may seem daunting at first, but it’s more achievable than many people think.
I’ve seen individuals from all kinds of backgrounds (teachers, administrative professionals, creatives, etc.) successfully transition into tech and cybersecurity.
For those already in tech, such as software developers, systems administrators, help desk analysts or QA testers, the move can be even more straightforward. Many of the skills used in these roles, such as critical thinking, problem-solving, and technical troubleshooting, directly apply to cybersecurity.
Here are a few tips I share with those I coach:
- Start small, but start now. Entry-level certifications like CompTIA Security+ or ISC2’s Certified in Cybersecurity are designed for beginners and provide a clear foundation. They are well recognised and demonstrate your commitment to the field.
2. Build hands-on experience. Cybersecurity is a practical discipline, and showing what you can do is just as important as what you know. Use platforms like TryHackMe or Hack The Box, or set up a virtual lab at home to practise common tools and techniques. These experiences build confidence and are great talking points in interviews.3. Get involved in the community. Building your network can unlock opportunities and provide ongoing support. In the U.S., organisations such as (ISC)2, ISACA, InfraGard, OWASP and Women in CyberSecurity (WiCyS) offer local chapters, events, mentoring and learning resources. Engaging with others in the field helps you stay up to date and connected.
Cybersecurity continues to grow and evolve, and the industry needs people who are curious, proactive and willing to learn. If you’re considering the switch, know that there is a place for you. The pathway is there, you just need to take that first step.

Geraldine Olea
Founder & Owner, Academy Olea
Supratim Sircar
Given the current tech layoffs and cybersecurity’s $97,000-$159,000 salary range with 750,000 unfilled U.S. positions, several tech professionals can successfully pivot to this high-demand field.
Software Developers are ideal candidates for cybersecurity roles. Their programming knowledge, vulnerability understanding, and debugging skills directly translate to application security engineer, DevSecOps, and penetration testing positions.
IT Support Professionals possess foundational technical skills perfect for Security Operations Center (SOC) analyst roles. Their troubleshooting experience and user behavior understanding provide valuable incident response insights.
Systems Engineers can leverage infrastructure knowledge for cybersecurity architect positions. Their enterprise systems understanding makes them ideal for securing complex IT environments.
Network Engineers naturally transition into network security specialist roles, utilizing their protocols, firewalls, and network architecture expertise.
Essential Transition Tips:
- Leverage Existing Skills: Software developers understand vulnerabilities, IT professionals know systems – each background offers unique cybersecurity advantages.
2. Target Strategic Certifications: CompTIA Security+ provides foundation knowledge, while CISSP demonstrates advanced commitment.
3. Gain Hands-On Experience: Use TryHackMe and HackTheBox for practical skills. Set up personal security labs using VirtualBox or Docker.
4. Build a Portfolio: Document your cybersecurity learning journey, contribute to open-source security projects, showcase skills through LinkedIn articles.
5. Network Strategically: Join cybersecurity communities, attend virtual conferences, connect with professionals. The community values knowledge sharing and mentorship.
6. Use Downtime Productively: Layoffs provide intensive skill development opportunities. Create structured learning schedules focusing on continuous improvement.
The 3.4 million global cybersecurity workforce gap ensures strong job security for successful transitioners. With 30% year-over-year growth and higher salaries, displaced tech workers can transform setbacks into advancement opportunities by strategically leveraging existing technical foundations.

Supratim Sircar
Software Engineer, Cisco
Amir Husen
In today’s shifting tech landscape, several roles can pivot into cybersecurity: network administrators who understand routing and firewalls, software developers familiar with secure coding, system or DevOps engineers versed in infrastructure, and help-desk or support staff with troubleshooting expertise.
Tips for aspiring cyber pros:
Build foundational knowledge: Start with CompTIA Security+ or Cisco’s CCNA Security to grasp core concepts.
Hands-on practice: Use platforms like TryHackMe or Hack The Box to sharpen skills on real-world scenarios.
Earn specialized certs: Pursue CEH for ethical hacking or CISSP as you gain experience—these boost credibility and salary potential.
Showcase your work: Contribute to open-source security tools, write blog posts on vulnerabilities you’ve researched, or present at local meetups.
Network strategically: Join cybersecurity forums, attend virtual conferences, and find a mentor to navigate career paths and stay current on threats.
By leveraging your existing domain expertise and complementing it with targeted training and certifications, you can transition smoothly into a high-demand cybersecurity role.

Amir Husen
Content Writer, SEO Specialist & Associate, ICS Legal
Chris Brewer
Tech professionals facing layoffs can transition to cybersecurity by leveraging their existing skills like coding, networking, or system administration. Roles in cybersecurity value problem solving, attention to detail, and continuous learning.
To prepare, focus on foundational certifications such as CompTIA Security+ or Certified Ethical Hacker. Build hands-on experience through labs and capture-the-flag challenges. Networking with industry professionals and joining online communities helps stay updated on trends. Emphasize patience and persistence because cybersecurity is a growing field that rewards dedication.

Chris Brewer
Managing Director, Best Retreats
Amarandhar Kotha
Many tech professionals from software, QA, or network backgrounds already have a strong foundation needed for cybersecurity. They understand systems, write scripts, work with cloud environments, and manage networks. That’s a solid starting point.
The next step is to make your intent visible. And for that, certifications matter.
According to the Fortinet 2024 Cybersecurity Skills Gap Report, 91% of employers prefer hiring candidates who have cybersecurity certifications. Still, 72% say they struggle to find people with technology-focused certifications.
That is your edge. Start with a domain that overlaps with your background—maybe cloud, endpoint security, or network defense. Then go after a vendor certification that matches that path. It could be Palo Alto, Fortinet, or even a foundational cert like CompTIA Security+.
These certifications aren’t just lines on a resume. They close a hiring gap that companies are actively trying to solve. Get certified and pair it with some hands-on practice with labs and simulation tools.
When you prepare like this, you are walking into an interview with exactly what the market needs.

Amarandhar Kotha
Managing Director, Datacipher
Kevandre Thompson
Cybersecurity is one of the few sectors still experiencing strong demand despite tech layoffs.
Professionals from adjacent roles, like IT support, systems administration, or even project management, can successfully pivot into cybersecurity by leveraging their transferable skills.
My advice would be for professionals, to start by showcasing your interest and evolution on platforms like LinkedIn; Sharing articles, engaging with thought leaders, and documenting your learning journey.
Offline, attend local meetups, chamber events, and cybersecurity conferences to build relationships that open doors. Joining professional organizations such as ISACA or local InfraGard chapters can also provide exposure, mentorship, and job leads.
Cybersecurity is a community-driven field, and visibility and networking often matter just as much as technical knowledge.

Kevandre Thompson
Full Cycle Talent Acquisition Specialist, Innomotics
Jeff Le
There is a significant wave of layoffs across Big Tech, most recently thousands from Meta, Amazon, Microsoft and Crowdstrike. This has been a regular occurrence post-pandemic as companies look to recalibrate technical staff, AI investments, and understand that targeted layoffs have a positive correlation with stock market rewards.
According to the Office of the National Cyber Director, in 2024 there were at least 500,000 cybersecurity roles open. Many of these roles could be filled by Big Tech transitioning staff, so long as they are more fluent in the use of key AI LLM tools and practices as well as fluency in upcoming regulatory requirements from the EU AI Act. GRC and privacy teams could also benefit from additional technology resources.
An area of opportunity also comes from federal employees who were let go as part of the DOGE process and the Trump administration. Thousands come from federal agencies, such as the Department of Defense, Department of Homeland Security, and the Cybersecurity Infrastructure and Security Agency. Having cyber and dual use digital skills with security clearances would clearly help industry cyber roles but also could help state and local governments struggling with growing cyber challenges and lack of capacity.
The best advice I have for cyber professionals entering a different organization is to understand three things:
- Be fluent in the mission of the organization, its culture and values. This is important for bigger picture fit.
2. Understand how organizations are organized and recognize that within a new structure there are clear reporting lines and invisible lines that influence the work and results. This helps recognize who a key stakeholder is, which is different in any organization.
3. Apply the latest AI tools and understand how any new role must incorporate some key AI practices into deliverables and any business imperatives.

Jeff Le
Managing Principal, 100 Mile Strategies
Wendi Reuter
Tech professionals affected by layoffs—such as software developers, network administrators, and IT support specialists—can successfully transition into cybersecurity roles. Their existing technical skills provide a strong foundation for learning security principles.
To pivot effectively, they should pursue certifications like CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP, and gain hands-on experience through labs or internships. Staying updated on current threats and participating in cybersecurity communities can also boost their readiness.
With high demand and competitive salaries, cybersecurity offers a promising path for tech workers seeking stability and growth.

Wendi Reuter
Senior IT Recruiting Consultant, Carex Consulting Group
Roberto Popolizio
Based on U.S. data, in 2024 there were 347,419 cybersecurity job ads. Here’s a breakdown:
Security Engineer: 64,300 postings (18.5%)
Best fit: Software Engineers, thanks to their coding, system-design, and DevOps know-how.
Security Analyst: 45,496 postings (13.1%)
Best fit: Network Administrators / IT Support Specialists, who already handle monitoring, system administration, and incident triage.
DevSecOps: 36,020 postings (10.4%)
Best fit: DevOps / Build-Release Engineers, with their CI/CD and automation expertise.
According to 1000+ cybersecurity experts that I have interviewed on Safety Detectives, the major caveat is time.
Transitioning to cyber can take up to 4 years, but the right combination of networking, and certs like CompTIA Security+ or CEH can fast-track to entry-level roles in 6–12 months.
Setting up a home lab, joining Capture The Flag (CTF) challenges and platforms like TryHackMe or Hack The Box are also recommended.

Roberto Popolizio
Managing Editor, Safety Detectives
On behalf of the Techronicler community of readers, we thank these leaders and experts for taking the time to share valuable insights that stem from years of experience and in-depth expertise in their respective niches.
If you wish to showcase your experience and expertise, participate in industry-leading discussions, and add visibility and impact to your personal brand and business, get in touch with the Techronicler team to feature in our fast-growing publication.