Britain Fast-Tracks Military Recruitment For Cyber Defence

The British Ministry of Defence (MoD) has introduced a new entry route for potential cyber professionals and those with existing digital skills which will reduce basic training from 10 weeks to around one month, after which recruits will undergo 3 months of  specialist cyber training, which will be conducted at the Defence Cyber Academy in Shrivenham.

By the end of 2025, new recruits will be embedded into operational roles, either securing defence’s networks at the digital headquarters in Corsham, or conducting cyber operations to counter those who would do the UK harm as part of the National Cyber Force.

Serving to enhance the UK’s ability to conduct operations in cyberspace, specialist recruits will receive one of the highest armed forces starting salaries of over £40,000, with opportunities for additional skills-based pay as they gain expertise and experience. The launch of the new scheme is the latest action by the government to tackle the recruitment and retention crisis in the armed forces.

The MoD disclosed that it has protected UK networks from an increasing number of ‘sub-threshold’ attacks, more than 90,000 in the last two years.

In an increasingly volatile world where technology is rapidly advancing, the nature of warfare is changing. Cyber capabilities present the threat of hybrid attacks which the UK need to be able to protect a national security and the armed forces are fit to face the threats of the future.

The new recruitment programme has been developed to bolster capabilities in response to these growing threats amid a global shortage of cyber talent. Looking ahead, the government’s Strategic Defence Review is closely assessing the threats we face, including the technological developments of the future. Secretary of State for Defence, John Healey MP, said “Fast tracking cyber warriors into our military will help ensure our Armed Forces are better equipped to face our adversaries in the 21st century and defend the country from the changing threats we face."

Recruitment into cyber roles in 2025 will initially be through the Royal Navy and Royal Air Force, with the British Army joining for subsequent recruitment campaigns from early 2026.

Image: Ideogram

You Might Also Read:

British Navy Combines With The Japanese Military To Counter Cyber Attacks:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« US & Britain Refuse to Sign International AI Declaration

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.