Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Education & TrainingCybersecurity News

Addressing the Cyber Security Skills Gap with Veterans

With Millions of Cybersecurity Jobs Left Unfilled, Veterans Could Be the Perfect Candidates to Address the Cyber Skills Gap

By Cody Mulla
Cyber security Skills Gap with Veterans - Security Magazine
March 1, 2018

“The most difficult thing is the decision to act, the rest is merely tenacity. The fears are paper tigers. You can do anything you decide to do. You can act to change and control your life; and the procedure, the process is its own reward.”

– Amelia Earhart

About 550 service members a day leave military service, and 250,000 military members are expected to leave each year for the next five years. Many of these veterans are returning from service that included combat, and they are returning to a job market that most likely requires different work skills. The age ranges vary, but a majority of the veterans who will separate from military service are of working age. Transition is inevitable throughout life, and through change comes growth.

One way for military veterans to successfully transition may be related to choosing a career field that is growing each day. A cybersecurity career can offer transitioning veterans a chance to meaningful employment, and that field is experiencing a remarkable shortfall that presents organizations with a challenge to find trustworthy qualified applicants.

Veterans have aligned skills with cybersecurity fields although they may or may not have the technical skills. Currently, veterans have been conditioned to learn while in the military from on the job training and specialized training that offers intensive immersion into the trained topic. Additionally, military veterans possess attributes that could be attractive to employers that other workers may not possess such as understanding of need to know, intelligence gathering, planning and security clearances. Security Clearances are currently backlogged, sometimes taking as long as 18 months to complete, while also being very expensive for private organizations to obtain and maintain. In addition to possessing complimentary skills, veterans have been known throughout the workforce to possess planning and leadership skills that are needed in any position.

Furthermore, physical and cybersecurity disciplines are converging. The danger from insider threats and other threats that can be addressed by physical security programs must be addressed by cybersecurity programs to eliminate gaps in overall enterprise security management.

Cyber security skills gap with veterans - Security Magazine

For example, Byers and Lowe conducted a study that captured that the majority of attacks on systems where from exterior sources between 1982 and 2003. As time went on the margin between internal and external attacks became more even. Often, insider threats are more dangerous since the threat actors have access to physical systems and critical information. Many military members have experience in physical security, in conjunction with complementary skills such as intelligence gathering and analysis, vulnerability assessments and the understanding of risk models. These skills make them valuable once they are trained on the technical aspects of cybersecurity protection. And in contrast to their civilian counterparts, military members have demonstrated trustworthiness over time by maintaining a security clearance with periodic investigations to demonstrate reliability.

To illustrate the importance of training qualified cybersecurity practitioners, the Department of Homeland Security has established the Initiative Cyber Security Careers and Studies. To date this program has generated partnerships with universities and has concentrated on eLearning. Additionally, the “National Cybersecurity Workforce Framework (NICE)” provides a blueprint to categorize, organize and describe cybersecurity work into specialty areas, tasks, and knowledge, skills and abilities (KSAs). This initiative allows interested learners to target courses by interest and by proficiently level. Once this task is complete, training is tracked and individualized by the learner, allowing them to store all training and progress into a profile. Furthermore, work is being done to target scenario-based training to further emphasize teamwork and real-world applications.

The increase of dependence on computer systems and connectedness has brought significance to cybersecurity across all sectors of industry. Crucial information including customer data, trade secrets and other information that is key to all organizations survival is protected by cybersecurity measures. Based on a UK Department of Business, Innovation & Skills 2015 Security survey, and reported by TrustWave, 90 percent of large enterprises and 74 percent of small organizations today suffer from security breaches of different types. By 2020, according to NIST, there will be a 1.5 to 1.8 million global shortfall in qualified cybersecurity professionals that is compounded by the fact that most senior cybersecurity professionals will reach retirement age. This presents a unique challenge to staff these highly technical positions. Current efforts are mostly centered on a bottom-up approach that attempts to spur cybersecurity curiosity and excitement at the high school and collegiate levels, NIST says. Although this is a much needed step to avoid a long-term shortage, it is important to fill the gap in the short term. Veterans should transition well into organizations within a cybersecurity role with a similar mission of protection that they experienced in the military.

Yet, the current cybersecurity adult learning method must be addressed. The training options consists of universities with traditional four-year degrees, certification programs and full-time intensive skills training at a cyber boot camp. Four-year degreed programs are expensive, geographically limited and are lengthy to complete. Mississippi State has a program funded by the Department of Justice that trains law enforcement in forensic skills needed for cybersecurity investigation, and has extended those services to wounded veterans. Certifications are designed for current practitioners with a minimum year experience level requirement. For instance, a Certified Information Systems Security Professional (CISSP) requires 10 years of verifiable information technology security (IT) experience to even sit for the exam. Yet, while advantageous to those with current skills, they do not address the need for transitioning workers. The cybersecurity boot camp model is a high-intensity program that can be complete in as less as 20 weeks. One such program is currently offered by SecureSet in Colorado and Florida that addresses the emerging need for professionals, and is consistent with training methods that military members are familiar with. Another option is for host organizations to develop apprentices or an internal cybersecurity boot camp. Overall, creativity is needed to solve a vulnerability that exists in virtually every enterprise.

Cybersecurity fields will continue to grow and require skilled workers to protect against attack and ensure the United States economy is not at risk. Military veterans are solid and qualified candidates to retrain, as they already possess complimentary skills and understanding of key areas within a cybersecurity program. Transitioning veterans need support in addition to dedicated programs once they are hired to maximize the opportunity for retention after hire. All organizations need to think outside of the box to solve the cybersecurity skills gap. One of the largest qualified candidate pools is transitioning military members who have the mindset and specific skills that help them to make instant contributions within enterprises.

KEYWORDS: cybersecurity skills gap security talent gap veteran security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cody mulla

Cody Mulla has a distinguished 20-year career as an expert in emergency and crisis management. He is currently Director, Security Risk Management at Hillard Heintze. Mulla is finishing his Ph.D. in Organizational Development at the University of Texas and holds three Masters Degrees (Human Resource Development/Lean Six Sigma, Master of Science, Industrial Organizational Psychology, and a Master of Science, Leadership & Crisis Management). He also holds a number of certifications including Certified Protection Professional CPP, ASIS; International Association of Emergency Managers AEM; Master Police Officer, TCOLE; Certified Healthcare Protection Administrator CHPA, IAHSS; and Certified Homeland Protection Professional, NDPC. Mulla serves on the ASIS School Safety and Security Council and the Utility Security Council.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leadership-enews2

    Leveraging Social Styles to Develop Relationships and Consult More Effectively

    See More
  • meeting1-900px.jpg

    Threat Assessment: How to Build Exercises and Evaluate Performance

    See More
  • meeting2-900px.jpg

    Threat Assessment: Exercise & Evaluation Best Practices

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing