WANTED: Cyberwarriors

We need you! According to experts, the face of war has changed, terrorists have traded in their bombs for computers and corporations are now hiring employees to protect them from the onslaught of hackers and terrorists who are in cyber training camps around the world. The military will require thousands of highly trained soldiers, but most new cyberwarriors will not be expected to don a uniform.

In a January 4th article, Sean Gallagher, the information technology editor at Ars Technica, reported, “A sampling of computer security professionals at the recent Information Systems Security Association conference found that a majority of them believe there will be a “major” cyberterrorism event within the next year.” He further stated that, “That sentiment is supported by the data from the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which responded to 198 cyberincidents in the 2012 fiscal year, with 41 percent of them occurring in the energy sector.”
Meet the new mantra words: Cyberterrorism, cyberwarrior, cyberattacks, cyberweapons, cybersecurity, cyberteam, cyberarms and others.
In a recent Reuters article, Robert Windrem, senior investigative producer for NBC news, reported, “The United States is locked in a tight race with China and Russia to build destructive cyberweapons capable of seriously damaging other nations’ critical infrastructure.”
Scott Borg, CEO of the U.S. Cyber Consequences Unit, a non-profit institute that advises the U.S. government and businesses on cybersecurity, said all three nations have built arsenals of sophisticated computer viruses, worms, Trojan horses and other tools that place them atop the rest of the world in the ability to inflict serious damage on one another or lesser powers. “Russia is best at military espionage and operations. That’s what they have focused on for a long time. China is looking for crucial business information and technology. China’s main focus is stealing technology. These things are quite separate. You use different tools on critical espionage and different tools again on stealing technology.”
Corporations are now sharing intel and data, which they did not do before, they have begun proactively gathering intelligence about what the bad guys are up to. They are doing this by stepping up the use of cutting edge tech security systems. ThreatConnect is an online exchange where 150 security researchers and 45 organizations meet 24/7 to share data and brainstorm.
To combat these threats, a new slew of job descriptions has been created that did not exist a few years ago. “White hat hackers”, “certified ethical hackers” or “penetration tester” were never heard of before but are in great demand now. These cybersecurity jobs are expected to expand by 50% by 2016. Graduates from colleges and institutions that prepare them for this new field can expect almost guaranteed employment upon graduation.
In 2012 Maryland Cyber Security Jobs report by CyberMaryland, the top five cybersecurity markets measured by job openings are:
Palo Alto, Calif.: 17,570 jobs
San Francisco: 13,710 jobs
Baltimore region: 13,393 jobs, Maryland total: 19,413 jobs
Boston: 11,683 jobs
Denver: 6,924 jobs
Although the search for recruits has begun, the list of qualified applicants is dismally short. The Pentagon is planning to expand its cybersecurity force nearly fivefold over the next several years. The plan is to add about 4,000 more military and civilian employees to existing 900 staffers in the Defense Department’s Cyber Command.
But if the government wants to expand to meets its goals it will have to find new and innovative ways to find talent. Raytheon, a major defense and aerospace systems contractor, has 250 positions open for engineers, information security professionals and business development managers. According to its website, “Our Raytheon cyberwarriors play offense and defense, and know how the adversary thinks and can adopt their perspective. They understand the real engineering beneath the interfaces. They also can design and create new software, as well as reverse-engineer and analyze software and hardware created by someone else.”
Raytheon offers this challenge: “Code breaking excites you. Reverse-engineering seems pretty straightforward. And you like to break down information security systems just to build them back, stronger and better. You seem to be the kind of person we look for at Raytheon: a cyberwarrior who can help us protect the world’s most critical data from breach, fraud, theft and sabotage.” Think you have what it takes? Raytheon offers a challenging test at Raytheon Test “Conquer these hidden challenges and crack the code to gain access to a secret message-just for cyberwarriors like you.”
These websites disclose thousands of cybersecurity job openings.
Cybersecurity schools, where you can find the training to become a cyberwarrior at Education Portal. Here you can find the top cybersecurity schools in the U.S.
Leading the list are UCLA, University of Iowa at Ames. Online programs are offered by many other universities and schools are also listed on the portal.com website, such as, Walden University, Capella College, Baker College, Southern New Hampshire University, Kaplan College and Colorado Technical University among others. In Las Vegas, Phoenix University offers bachelor’s degrees in information system security and criminal justice administration cybercrimes. IIT Technical Institute has bachelor’s degrees in cybersecurity and information systems/cybersecurity.
With a generation raised on laptops, Iphones, XBox and online games, your dream job may just turn out to be cyberwarrior and you didn’t know you were training for it-all along.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s