Military Service Is An Ideal Background For A Cybersecurity Career

The UK's critical infrastructure - those sectors that provide the country with safe drinking water, electricity, communications, transport and financial networks, and internet connectivity - are under threat like never before. 

In its latest Annual Review published in November 2023, the National Cyber Security Centre (NCSC)—part of the UK's GCHQ intelligence, security and cyber agency—warned that the UK needs to accelerate work to keep pace with the changing threat landscape. And that includes the recruitment and retention of cybersecurity professionals to help keep the UK safe from outside threats.   

The NCSC Annual Review 2023 estimates that the UK cybersecurity sector employs more than  58,000 people – an increase of over 5,000 jobs over the past year. But despite the increase, it reports that while the sector is growing, it is “in need [of] talented professionals”. 

This may explain why the NCSC spends much of its time “cultivating talent and developing young minds to future-proof our national security” regardless of whether they work in the public or private sector. 

But inspiring young people to take up a career in cybersecurity is only part of the solution. Forward-thinking recruiters are also looking to tap into the rich diversity of skills offered by veterans of the Armed Forces.  

Through their unique skills, discipline, and unmatched experience, veterans from the Royal Navy, British Army, and Royal Air Force are ideally suited to help address the talent gap and the growing cyber threats we face. 

But what makes these former service personnel such a perfect match for a career in cybersecurity? 

Adaptability:   Showing initiative—and the ability to adapt to ever-changing environments—is a key part of being in the military. And it’s the same in cybersecurity. The ability to adapt and learn quickly is a skill that makes veterans a highly valuable asset to any recruiter—especially in an industry where technology and situations are evolving rapidly.

Problem-solving:   In IT, we often encounter technical problems that require creative, critical thinking. This is exactly what military personnel are trained to do. Whether it's finding new ways to approach a problem—or devising a solution under high-stakes pressure—problem-solving is ingrained in all military personnel. 

Strong work ethic and discipline:   Meeting deadlines, paying attention to detail, and working diligently are all qualities that run through our Armed Forces. Thankfully, this strong work ethic is also one of the most important aspects of succeeding in IT. 

Technical knowledge:   Today’s Armed Forces rely on technology. That means the military has to train people to operate and maintain increasingly sophisticated equipment. When service members leave, many already possess the technical skills that are so sought after in IT. And even if they don’t, many have the technical mindset and core skills for a role in cybersecurity. 

Security clearances:   Due to the nature of the work, some veterans have obtained high-level security clearances. This makes them valuable to organisations dealing with sensitive information. Arriving on day one with an existing clearance is a huge leg up.

Security-minded:   Security is one of the most important issues we face in IT and the technology industry today. Veterans have an in-built focus on security and defence; they understand the importance of building a secure system. 

For me, these qualities point to one thing: veterans offer a rich pool of talent, ideally suited to working in cybersecurity. With global threats increasing every day, we need a workforce that understands the importance of a strong culture of security and defence. 

That’s why we need government and private companies to step up and create the right pathways for veterans to enter the cybersecurity workforce. I am heartened by the comments of Johnny Mercer MP, the Minister for Veterans’ Affairs. He’s determined to make the UK the “best place in the world to be a veteran” and that includes bringing former military personnel and employers together for the benefit of both parties. 

In October 2023, Mercer launched An Employers' Guide to Hiring Veterans, which, as he wrote in the introduction, “Showcases best practice developed in the UK to support our veterans and Armed Forces community into employment, providing employers…with the tools, information and guidance they need to make the most of what our veterans have to offer.”

As we face some of our greatest cyber adversaries yet, we need a skilled workforce to meet this challenge. While it’s right that we encourage the next generation of young talent into cybersecurity, we would be missing a trick if we failed to seek out other avenues for recruitment. 

Veterans are the ideal candidates to quickly close the cybersecurity skills gap and create the skilled industry needed to meet these threats head-on.

Chip Daniels isVP of Government Affairs at SolarWinds:

Image: @RoyalAirForce

You Might Also Read: 

Cyber Security Jobs In 2024:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« On Trend - Hybrid Cloud Strategies
Cyber Attack On Georgia's State Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.