Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Today’s NYT Connections: Sports Edition Hints, Answers for April 20 #574
    • Will Humans Live Forever? AI Races to Defeat Aging
    • AI evolves itself to speed up scientific discovery
    • Australia’s privacy commissioner tried, in vain, to sound the alarm on data protection during the u16s social media ban trials
    • Nothing Phone (4a) Pro Review: A Close Second
    • Match Group CEO Spencer Rascoff says growing women’s share on Tinder is his “primary focus” to stem user declines; Sensor Tower says 75% of Tinder users are men (Kieran Smith/Financial Times)
    • Today’s NYT Connections Hints, Answers for April 20 #1044
    • AI Machine-Vision Earns Man Overboard Certification
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, April 20
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Tech Analysis»Why so many military veterans move into cybersecurity
    Tech Analysis

    Why so many military veterans move into cybersecurity

    Editor Times FeaturedBy Editor Times FeaturedMay 22, 2025No Comments6 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Joe Fay

    Know-how Reporter

    Getty Images A female soldier of 1st Battalion London Guards takes part in a training exercise on Hankley Common on October 16, 2024 in Farnham, England.Getty Photos

    The vigilance wanted within the army will be an asset in cybersecurity

    Main a foot patrol by means of an empty village in a battle zone may appear a world away from working in a safety operations centre (SOC) in a serious enterprise.

    However, says former infantryman James Murphy, if you see a garbage can by the aspect of the highway, and you recognize no-one is gathering garbage that day: “The spider hairs on the again of your neck begin tingling.”

    And that vigilance, says Mr Murphy, now director of veterans and households on the Forces Employment Charity, is exactly the kind of intuition the cybersecurity business covets.

    Cyberattacks are a reality of life for organizations worldwide, whether or not simple cybercrime or politically motivated.

    The UK’s armed forces not too long ago launched an accelerated coaching program for recruits to bolster its cyber capabilities, with profitable candidates in line for one of many highest armed forces beginning salaries.

    However there has lengthy been a gradual march within the different path.

    Within the UK, the Forces Employment Charity’s TechVets programme sometimes helps 15 to twenty folks a month into employment, with between 40 and 60% of these head into cybersecurity.

    And that could be a a lot wanted provide of staff – there’s a world shortfall of 4 million cyber professionals, according to the World Economic Forum.

    The necessity for these staff has been underlined within the UK, the place operations at two main retailers have been disrupted by hackers.

    Mo Ahddoud Mo Ahddoud sits on an armoured vehicle with six other soldiers.Mo Ahddoud

    Mo Ahddoud (left) spent ten years within the Royal Artillery

    The route between the army and cybersecurity isn’t all the time direct.

    Interim chief info safety officer Mo Ahddoud spent 10 years within the Royal Artillery, serving excursions in Northern Eire, Bosnia and Germany earlier than leaving in 1999.

    The “pure transition” on the time was into different uniformed organizations, such because the police or the jail service.

    Nevertheless, he says: “I spotted the world was altering.” As a part of his resettlement course of, he took on-line programs in pc functions, then studied PC restore.

    From there he moved into help desk work, and located his method into cyber safety, with organizations resembling BAE Methods and Common Studios.

    Mr Ahddoud’s army coaching has all the time knowledgeable his strategy to cybersecurity. He recollects being informed by an officer, that it isn’t so essential how deep a solider can dig. “Whenever you’re being fired on, you will have the motivation to dig a extremely huge gap.”

    The actual talent is coping with issues, resembling fixing damaged provide chains, or coping when communications go down.

    “That mindset was all the time across the course of. How do you repair it?” As well as, he says, army personnel all the time suppose by way of “threat, defence in depth, layers of defence”.

    That matches “very neatly” with cybersecurity, the place threat is ever-present and have to be monitored.

    Responses to potential assaults are ready prematurely, whereas accepting no plan “survives first contact” with an adversary.

    “You must work and be agile round it, as a result of it by no means performs out the way you count on it to,” says Mr Ahddoud.

    Former army personnel are significantly suited to roles in so-called blue groups, says Catherine Burn, affiliate director at cybersecurity recruitment agency, LT Harper.

    These are roles resembling safety operations, incident response and forensics, in distinction to purple teamers – the moral hackers who search for vulnerabilities and infrequently desire to function alone.

    In addition to being “grafters”, Ms Burn says, vets are typically sturdy group gamers and might maintain their cool below stress. Afterall: “A whole lot of these conditions are disasters.”

    Sysdig Crystal Morin smiles and looks into the camera.Sysdig

    Crystal Morin has discovered the camaraderie in cybersecurity matches the army

    However the cybersecurity world has a lot to supply veterans too. Crystal Morin joined the US Air Drive, partially, as a result of she needed to study a language.

    She was assigned to study Arabic, across the time of the Arab spring, and labored on counter menace finance and counter terrorism.

    After leaving the service, Ms Morin joined a defence contractor, once more engaged on counterterrorism, finally transitioning to cyber terrorism then cyber menace intelligence. She’s now a cybersecurity strategist at US safety agency, Sysdig.

    “All of my coaching has been palms on,” she says. However she provides, different vets had “cross-trained” whereas within the service from different roles resembling artillery or logistics, whereas others nonetheless used their GI Advantages to review safety formally.

    No matter their path into cybersecurity, she says, it is a pure transition. “A SOC [security operations centre] is strictly the identical because the safety fields we had been working in. The adrenaline, the issue fixing, proper? It is the retaining the peace. Combating the dangerous guys.”

    However, Mrs Morin provides, “The camaraderie is strictly just like the army, the busy weeks, the quiet weeks, the jokes that no one will get until you’ve got been there carried out that…It is only a actually tight knit neighborhood.”

    Terry Benson Photography James Murphy in a white shirt addresses a conferenceTerry Benson Pictures

    It is essential to discover a appropriate employer for ex-forces workers says James Murphy

    Mr Murphy says employers have turn out to be extra conscious of the abilities that veterans convey.

    “As soon as an employer picks up somebody from the ex-Forces neighborhood, they are going to wish to come again for one more one.”

    That is to not say some changes aren’t obligatory. Onboarding processes can differ between organizations, whereas a scarcity of standardization and job titles could be a distinction with the extremely organized army world.

    The hot button is pinpointing the kind of organisation they wish to work in, Mr Murphy says.

    “The place you rise up within the morning and also you’re already wanting ahead to going to work, and also you’re working in a group the place you’re feeling you belong, the place you’re feeling you are having an influence.”

    Though the character of the “influence” is perhaps totally different to what they’re used to. As Mrs Morin says, working within the non-public world is totally different to straight tackling terrorism.

    “I do miss with the ability to take down the dangerous guys and defend the world… I can not a lot put people in jail anymore.”

    Extra Know-how of Enterprise



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Francis Bacon and the Scientific Method

    April 19, 2026

    Efficient Design and Simulation of LPDA-Fed Parabolic Reflector Antennas

    April 17, 2026

    IEEE Connects Hardware Startups With Investors

    April 16, 2026

    From RSA to Lattices: The Quantum Safe Crypto Shift

    April 15, 2026

    Stealth Satellite TV Defeats Iran’s Internet Blackout

    April 15, 2026

    Tech Life – Sharing the road with driverless cars

    April 14, 2026

    Comments are closed.

    Editors Picks

    Today’s NYT Connections: Sports Edition Hints, Answers for April 20 #574

    April 20, 2026

    Will Humans Live Forever? AI Races to Defeat Aging

    April 20, 2026

    AI evolves itself to speed up scientific discovery

    April 20, 2026

    Australia’s privacy commissioner tried, in vain, to sound the alarm on data protection during the u16s social media ban trials

    April 20, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Munich-based ARX Robotics unveils combat-capable UGV developed with Ukrainian frontline input

    August 25, 2025

    Nevada files to block Polymarket from offering ‘unlicensed wagering’ in the state

    January 20, 2026

    I gave my DNA to tracking company

    November 10, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.