Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 2025

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Military Veterans May Be What Cybersecurity Is Looking For
Cyber Risk

Military Veterans May Be What Cybersecurity Is Looking For

Staff WriterBy Staff WriterJuly 14, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


As the cybersecurity shortage becomes more evident with demand for roles increasing, those at MyComputerCareer believe they have found the solution: utilizing veterans’ talent and setting them up on cybersecurity and IT certification journeys.

Each year, the ISC2 Cybersecurity Workforce Study looks at the cybersecurity field and assesses its workforce to understand concerns of professionals, the economic landscape, and the composition of the talent and skills base. In their review last year, researchers there found that talent shortages and skills gaps in the field are growing, thanks to uncertain economic conditions that have impacted the workforce. All of this is happening at a time when cybersecurity professionals are needed more than ever: in a survey of nearly 16,000 international cybersecurity professionals, ISC2 found that many respondents don’t believe their cybersecurity teams are staffed adequately or are trained enough to meet their goals.

“We have seen an increase in the number of people needed globally to adequately secure organizations, yet employers are cutting back on hiring and the professional development of their cybersecurity teams,” the researchers wrote. “Almost 60% of respondents agree that skills gaps have significantly impacted their ability to secure the organization, with 58% stating it puts their organizations at a significant risk.”

Related:Google Gemini AI Bug Allows Invisible, Malicious Prompts

The pathways to enter the cybersecurity workforce are changing, according to the study, and potential candidates from different, more diverse backgrounds may prove to be invaluable to success in cybersecurity.

This is where MyComputerCareer comes in with an alternate option for veterans.

Veterans Joining the Cybersecurity Line of Defense

There are five specialized programs for veterans that MyComputerCareer offers for those interested in the cybersecurity field, most of which can be completed within six to 10 months. 

The programs include: Information Technology Security & Administration, Cyber Warrior Program, Cyber Security Specialist, Cyber Security Engineer, Associate of Applied Science in Network Administration and Cyber Security. 

Students can earn up to 14 certifications within IT, from vendors like Microsoft, Linux, Cisco, CompTIA, and the EC-Council’s Certified Ethical Hacker.

For the Cyber Warrior Program in particular, students are trained for a variety of positions, including security operations center (SOC) analyst, network operations center (NOC) analyst, systems administrator, and IT analyst.

“For the most part, our veteran graduates report feeling not just prepared, but often more prepared than their peers who have come through more traditional academic routes,” says Grant Gibson, lead instructor in MyComputerCareer’s Cyber Warrior Program. “The hands-on, practical skills learned in our 12-week program translate directly to the daily tasks in a security operations environment. They feel a strong sense of readiness because the curriculum is designed to mimic the real-world challenges they will face.”

Related:ConnectWise to Rotate Code-Signing Certificates

For students who want to go further, an associate’s degree is also available to them through the program. 

“For many, our program solidifies their passion for cybersecurity and provides them with the confidence and practical experience to excel in a university setting,” says Gibson. “Some have gone on to pursue bachelor’s or even master’s degrees in cybersecurity, IT, or computer science. This program can act as a powerful bridge, validating their career choice before they commit the time and financial resources to a full degree program.”

“A Broken Pipeline”

The “military to cyber pipeline” does suffer due to a lack of cyber-specific training, Gibson notes; military veterans possess many of the necessary qualities that would allow them to flourish in the cybersecurity field but often don’t necessarily have the technical skills.

Related:China-Backed Hackers Target SentinelOne in ‘PurpleHaze’ Attack Spree

“Many service members have security clearances and a deep understanding of operational security, which are incredibly valuable,” he explains. “However, the military’s own training programs may not always align with the needs of the civilian cybersecurity industry.”

So, when these service members transition out of the military into veterans, they lack specific certifications and hands-on experiences that private companies may be looking for.

“Our program is designed to bridge that exact gap,” Gibson says, “taking their inherent strengths and layering on the technical expertise needed to be successful.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTargeted Threat: New PHP Interlock RAT Uses FileFix to Strike Multiple Industries
Next Article Interlock Ransomware Unleashes Malware via FileFix Method
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Oracle Fixes Critical Bug in Cloud Code Editor

July 16, 2025

Malicious Open Source Packages Spike 188% YoY

July 8, 2025

DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms

July 7, 2025
Leave A Reply Cancel Reply

Latest Posts

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 20250 Views

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 20250 Views

Dell Declares Data Leak a Hoax

July 22, 20250 Views

"Reclaiming Control: Fixing Broken Security Operations"

July 22, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 2025

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20256 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.