Veterans Day Salute: 6 Reasons Why You Want Vets in Your Cyber Platoon
We commend vets in cyber, with this slideshow look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
November 10, 2022
Security experts and ex-military folks in cybersecurity careers say that veterans offer skills and experience that are well-suited for careers in information security, especially in areas such as security operations, threat intelligence, and analysis.
The message is an important one, amid what appears to be a deepening skills shortage across the industry.
Numerous certification courses are available to help veterans acquire the cybersecurity skills and knowledge they need to enter the field or to bone up on the cyber skills they might have acquired in the military. Among them is a CISA Cybersecurity Training and Education for Veterans guide that includes tools and resources — including free online training, certification prep courses, and info on cybersecurity programs and scholarships. Another is the SANS Institute's VetSuccess Academy, which offers an accelerated training program for veterans seeking to launch careers in cybersecurity.
"Veterans bring a unique combination of experience to the cybersecurity world, whether they served in air, land, sea, space, or cyber operations," says Curt Aubley, a US Army veteran whose last tour was the US Army Information Systems Command.
Aubley, who is currently a detection and response leader with Deloitte Risk & Financial Advisory, adds that the experience and diversity of thought that veterans bring to the table improve the odds of long-term success in the cybersecurity field.
"Veterans bring a unique understanding of mission, importance of intelligence, strategy, physical and cybersecurity, technical and tactical proficiency, and teamwork," he says.
Click through Dark Reading's holiday slideshow using the arrows below to discover six reasons why organizations should consider hiring veterans. And for further reading, explore our related coverage:
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024