Discussion in 'Intelligence & Support Operations' started by goon175, Jun 5, 2012.
See below message that was put out.
I guess this means MI has proponency for cyber now.
How does this effect the 29 series guys? or does EW not cover the cyber/digital realm?
No, it's been out for a few months now. INSCOM is looking for any 35-series willing to reclass and attend JCAC. Huge bucks on the outside.
POST AN INTRO BEFORE YOU POST ON THE BOARD AS PER THE RULES YOU SIGNED.
I'm still waiting for your intro post.
Can anyone explain in layman's terms what the major duties are? I am interested in reclassing and am curious if this job would be a fit.
35Q's learn all things cyber.
The US Department of Defense defines computer network operations (CNO) as comprising three types of operations: computer network attack, computer network defense, and related computer
network exploitation-enabling operations.
Computer network attack (CNA) refers to operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Computer network exploitation (CNE) consists of enabling operations and intelligence collection to gather data from target or adversary computers and networks in support of CNA. Computer network defense (CND) consists of defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. In short, CND refers to operations that protect against adversary CNA/E.
What a great time to be young.
Damn I'm old! My first computer course was on card readers. Today they are scanning credit cards on a cell phone. When I was in high school this was high tech.
The official MILPER message for those who are not currently working in the area of focus of the 35Q MOS (which will require reclass) will be released in 1-2 weeks according to the MI Branch. An official MILPER message was released last week concerning transition for those who currently possess the N6 ASI or similar training. Since it is FOUO, I am only providing the link for CAC holders: https://www.hrc.army.mil/Milper/12-173 There is an assessment test that can be taken, the procedures for taking the test are also outline in the MILPER message.
For those who are not holding the N6 ASI or similar training, you must meet the same eligibility requirements, including a mandatory CSP (CI Scope Polygraph) in conjunction with a TS/SCI, before training due to the sensitivity of the training. I currently meet all the requirements except the Polygraph, but I will have one complete prior to the MILPER message release. I personally have been trying to get into Cyber Warfare for over a year now, but I was told to hold off because of this new MOS.
While at my current unit, I became a Certified Ethical Hacker, Certified Network Defense Architect, Microsoft Certified Technology Specialist, and CompTIA Security+ and Network+ certified, I have been to class for CISSP, CCNA, ITILv3/2011, etc, and I am almost a semester away from my Associates of Science in Computer Info. Science with a Major in Network Security, all while maintaining 6 duty positions (LAN Manager, SA, IAM, KMO, Web Author...basically the Automations Manager and Senior Tech) and spending 4-6 months each year for the past 2.5 years at field exercises. All of this has been a great learning experience when combined together, and I would have been ETSing as a 21 year old SPC in 6 months after completing my 3.5 year service obligations, but I decided to use my skills and experience to do what I enjoy in support of our nation's defense in the new Cyber arena although I already had opportunities with other employers. (I'm not saying this to boast/brag, I'm saying this to encourage others, because if I can do it anyone can).
If you have the desire to learn, do the same while you can do most of this on the Army's dime. I had to study for and take the Certified Ethical Hacker exam out of my own pocket because it was not indoctrinated by DoD 8570.1 -m as a baseline requirement at the time I took the exam (it is now however).
Good luck to anyone who does want to pursue this MOS, make sure you keep a lookout on HRC's MILPER messaging system for further guidance. This is only what I have discovered through my time and research.
Post an Intro in the correct sub-forum before posting again.
That is an amazing amount of training and opportunity. I don't think you will have a hard time finding employment (in the military or out) any time soon. Other guys who are just entering or have recently entered military service should take note of what is possible if you have the ambition, motivation, and drive to take advantage of what the military has to offer.
Ethical hacking? Heh. A bit like ethical humint really.
Nice job; someone quoted this thread on MI Space (you have to be able to fondle your CAC to get access):
Looks like MSG Ron K is the real deal and it would be good to have him chime in on this topic.
I didn't see a classification on this so Mods, if this is determined to be FOUO...do whacha gotta do.
I didn't see a classification either. I did notice they mentioned F3EAD on the second slide ;)
Looks UNCLASS to me.
There were card readers that read stone tablets?
US CyberCom? US CyberCom Staff Course? New MI Warrent field? National CybePatriot Program? ONLY a 105 GT? This is starting to make the fielding of the PsyOps career field look good. CINCCyber HAS got to be a Combat Arms officer to bring some sanity to all this.
Yeah, I noticed that, too. A 105 is weak- especially when they are cutting troop numbers.
I haven't posted the corrected version yet, but the GT is higher, the ST score is a 105 though I believe