Military Service Is An Ideal Background For A Cybersecurity Career

The UK's critical infrastructure - those sectors that provide the country with safe drinking water, electricity, communications, transport and financial networks, and internet connectivity - are under threat like never before. 

In its latest Annual Review published in November 2023, the National Cyber Security Centre (NCSC)—part of the UK's GCHQ intelligence, security and cyber agency—warned that the UK needs to accelerate work to keep pace with the changing threat landscape. And that includes the recruitment and retention of cybersecurity professionals to help keep the UK safe from outside threats.   

The NCSC Annual Review 2023 estimates that the UK cybersecurity sector employs more than  58,000 people – an increase of over 5,000 jobs over the past year. But despite the increase, it reports that while the sector is growing, it is “in need [of] talented professionals”. 

This may explain why the NCSC spends much of its time “cultivating talent and developing young minds to future-proof our national security” regardless of whether they work in the public or private sector. 

But inspiring young people to take up a career in cybersecurity is only part of the solution. Forward-thinking recruiters are also looking to tap into the rich diversity of skills offered by veterans of the Armed Forces.  

Through their unique skills, discipline, and unmatched experience, veterans from the Royal Navy, British Army, and Royal Air Force are ideally suited to help address the talent gap and the growing cyber threats we face. 

But what makes these former service personnel such a perfect match for a career in cybersecurity? 

Adaptability:   Showing initiative—and the ability to adapt to ever-changing environments—is a key part of being in the military. And it’s the same in cybersecurity. The ability to adapt and learn quickly is a skill that makes veterans a highly valuable asset to any recruiter—especially in an industry where technology and situations are evolving rapidly.

Problem-solving:   In IT, we often encounter technical problems that require creative, critical thinking. This is exactly what military personnel are trained to do. Whether it's finding new ways to approach a problem—or devising a solution under high-stakes pressure—problem-solving is ingrained in all military personnel. 

Strong work ethic and discipline:   Meeting deadlines, paying attention to detail, and working diligently are all qualities that run through our Armed Forces. Thankfully, this strong work ethic is also one of the most important aspects of succeeding in IT. 

Technical knowledge:   Today’s Armed Forces rely on technology. That means the military has to train people to operate and maintain increasingly sophisticated equipment. When service members leave, many already possess the technical skills that are so sought after in IT. And even if they don’t, many have the technical mindset and core skills for a role in cybersecurity. 

Security clearances:   Due to the nature of the work, some veterans have obtained high-level security clearances. This makes them valuable to organisations dealing with sensitive information. Arriving on day one with an existing clearance is a huge leg up.

Security-minded:   Security is one of the most important issues we face in IT and the technology industry today. Veterans have an in-built focus on security and defence; they understand the importance of building a secure system. 

For me, these qualities point to one thing: veterans offer a rich pool of talent, ideally suited to working in cybersecurity. With global threats increasing every day, we need a workforce that understands the importance of a strong culture of security and defence. 

That’s why we need government and private companies to step up and create the right pathways for veterans to enter the cybersecurity workforce. I am heartened by the comments of Johnny Mercer MP, the Minister for Veterans’ Affairs. He’s determined to make the UK the “best place in the world to be a veteran” and that includes bringing former military personnel and employers together for the benefit of both parties. 

In October 2023, Mercer launched An Employers' Guide to Hiring Veterans, which, as he wrote in the introduction, “Showcases best practice developed in the UK to support our veterans and Armed Forces community into employment, providing employers…with the tools, information and guidance they need to make the most of what our veterans have to offer.”

As we face some of our greatest cyber adversaries yet, we need a skilled workforce to meet this challenge. While it’s right that we encourage the next generation of young talent into cybersecurity, we would be missing a trick if we failed to seek out other avenues for recruitment. 

Veterans are the ideal candidates to quickly close the cybersecurity skills gap and create the skilled industry needed to meet these threats head-on.

Chip Daniels isVP of Government Affairs at SolarWinds:

Image: @RoyalAirForce

You Might Also Read: 

Cyber Security Jobs In 2024:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« On Trend - Hybrid Cloud Strategies
Cyber Attack On Georgia's State Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.