Industry Expert Interview – Exploring Career Paths and Industry Trends

 

Introduction

For this project, I had the opportunity to interview Aisha Lalli, a CSUMB alumna who has established herself as a cybersecurity engineer and security-focused software developer. She holds a Master’s degree in Cybersecurity from New York University as part of the Cyber Fellows program and an NSA-certified Cyber Operations and Defense professional. In addition to her technical expertise, she has published research and built a strong portfolio of projects in areas such as penetration testing, static code analysis, and secure system design.

I chose Aisha for several reasons. First, she is a fellow CSUMB alumna, which made her both approachable and highly relevant to my own educational path. Second, her background in cybersecurity connects directly to the parts of computer science that interest me most—where software engineering intersects with real-world issues of trust, privacy, and safety. Finally, I wanted to gain insights from someone who has not only built technical expertise but also navigated academic and professional transitions that I am likely to face in the coming years.

Summary of Insights

Our conversation began with her educational journey. Aisha explained that she started at community college before transferring to CSUMB’s computer science program. While completing her undergraduate degree, she explored various areas of computing, but it was cybersecurity that truly captured her attention. This passion eventually led her to pursue advanced studies at NYU. She emphasized that her career path was not preplanned, but shaped gradually through deliberate choices, persistence, and openness to opportunities.

Aisha identified several challenges that continue to shape her career. One of the most pressing is the rapid evolution of cyber threats. Unlike some fields where knowledge remains stable, cybersecurity demands constant adaptation because adversaries innovate continuously. She described the tension between software development speed and security, explaining that engineers often see security requirements as unnecessary roadblocks. Her job frequently involves bridging that gap—helping developers and managers understand that security is not optional but fundamental to sustainable innovation.

She also discussed industry trends that are shaping the field. She emphasized the increasing importance of application security, particularly as organizations increasingly depend on complex software systems that must be designed securely from the ground up. She also noted that cloud environments present new challenges as more companies migrate critical systems to distributed platforms. While traditional practices like penetration testing remain valuable, she pointed out that the field requires constant evolution to keep pace with changing technologies and threats.

When talking about skills for success, Aisha highlighted two main areas: technical depth and communication. On the technical side, she encouraged me to develop strong foundations in secure software development and related areas that directly influence how systems resist attacks. She emphasized the importance of anticipating vulnerabilities from multiple perspectives, since this mindset helps identify weaknesses before they can be exploited. Equally important, however, are communication skills. She explained that cybersecurity professionals often serve as translators between technical and non-technical teams, which means being able to explain risks in clear and convincing ways.

Finally, When I asked Aisha what advice she would give to students preparing to enter the field, her response focused on building visibility and confidence through projects. She emphasized that it is not enough to simply complete coursework and assignments; students should take the extra step of sharing their work publicly, whether through a personal website, GitHub, or another platform. By doing so, projects become more than class exercises—they become professional artifacts that demonstrate skills to potential employers.

She also encouraged me to use past projects from both my associate’s degree and current university work as part of my portfolio, rather than waiting to create entirely new ones. According to her, these projects already show growth and technical ability, and when presented well, they can carry significant weight. Most importantly, she recommended continuously adding to and refining a portfolio, treating it as a living document of one’s development rather than a finished product.

Reflection

This interview was eye-opening in several ways. First, it gave me a much clearer picture of cybersecurity as a career. Before this conversation, I thought of the field mostly in terms of technical tasks—penetration testing, encryption, and securing systems. Aisha helped me see the broader reality: cybersecurity is as much about people and communication as it is about technology. I had not fully appreciated how often security professionals need to persuade others, manage resistance, and advocate for practices that are not always popular but are absolutely essential.

Second, I was struck by her honesty about the difficulties. She admitted that it can be frustrating to be perceived as the “obstacle” when enforcing security measures. Yet she described this challenge with a sense of purpose, emphasizing that protecting people and systems makes the effort worthwhile. This resonated with me because it highlighted the importance of resilience in career development and made me reflect on the persistence I will need in my own journey.

I also found myself inspired by how she shaped her career path. It was reassuring to hear that she did not have everything figured out at the start, but rather discovered her direction step by step. That perspective helped me feel less pressure to have a perfect plan right now. Instead, I can focus on building skills, exploring opportunities, and trusting that my path will become clearer as I gain experience.

Most importantly, the interview gave me confidence that I can succeed in this field. Seeing someone who came from the same program, navigated similar challenges, and went on to build an impactful career helped me imagine myself following a similar trajectory. It made the industry feel less abstract and more accessible.

Future Steps

After reflecting on this conversation, I see several steps I want to take to align my studies with my career goals. First, I plan to focus more intentionally on secure coding practices in both coursework and personal projects. This will help me build the technical foundation that Aisha emphasized.

Second, I want to act on her advice about portfolio-building. I will begin compiling past and current projects into a professional portfolio and make them publicly available on platforms like GitHub. I will treat this portfolio as a living document, regularly updating it to show growth and new capabilities.

In addition, I plan to explore certifications to complement her advice. While Aisha specifically highlighted the value of showcasing projects, I see certifications as another way to demonstrate my commitment to continuous learning and industry standards. This will allow me to combine her guidance on visibility with a structured plan for building credibility.

Finally, I want to adopt her mindset of adaptability. Rather than seeing cybersecurity as a static set of tools to master, I now understand it as an evolving challenge that requires curiosity, resilience, and the ability to anticipate change.

Conclusion

Interviewing Aisha Lalli provided me with practical advice, honest insights, and a sense of inspiration about my future career in technology. She demonstrated that success is built on both technical excellence and the ability to communicate and collaborate effectively. This experience not only broadened my understanding of the cybersecurity field but also gave me clear steps I can take to prepare myself academically and professionally. Most of all, it showed me that the journey is not about having every detail figured out today, but about building steadily toward the opportunities of tomorrow.


Comments

Popular posts from this blog

Week 4 - My CSUMB Journey