Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Education & TrainingCybersecurity News

Addressing the Cyber Security Skills Gap with Veterans

With Millions of Cybersecurity Jobs Left Unfilled, Veterans Could Be the Perfect Candidates to Address the Cyber Skills Gap

By Cody Mulla
Cyber security Skills Gap with Veterans - Security Magazine
March 1, 2018

“The most difficult thing is the decision to act, the rest is merely tenacity. The fears are paper tigers. You can do anything you decide to do. You can act to change and control your life; and the procedure, the process is its own reward.”

– Amelia Earhart

About 550 service members a day leave military service, and 250,000 military members are expected to leave each year for the next five years. Many of these veterans are returning from service that included combat, and they are returning to a job market that most likely requires different work skills. The age ranges vary, but a majority of the veterans who will separate from military service are of working age. Transition is inevitable throughout life, and through change comes growth.

One way for military veterans to successfully transition may be related to choosing a career field that is growing each day. A cybersecurity career can offer transitioning veterans a chance to meaningful employment, and that field is experiencing a remarkable shortfall that presents organizations with a challenge to find trustworthy qualified applicants.

Veterans have aligned skills with cybersecurity fields although they may or may not have the technical skills. Currently, veterans have been conditioned to learn while in the military from on the job training and specialized training that offers intensive immersion into the trained topic. Additionally, military veterans possess attributes that could be attractive to employers that other workers may not possess such as understanding of need to know, intelligence gathering, planning and security clearances. Security Clearances are currently backlogged, sometimes taking as long as 18 months to complete, while also being very expensive for private organizations to obtain and maintain. In addition to possessing complimentary skills, veterans have been known throughout the workforce to possess planning and leadership skills that are needed in any position.

Furthermore, physical and cybersecurity disciplines are converging. The danger from insider threats and other threats that can be addressed by physical security programs must be addressed by cybersecurity programs to eliminate gaps in overall enterprise security management.

Cyber security skills gap with veterans - Security Magazine

For example, Byers and Lowe conducted a study that captured that the majority of attacks on systems where from exterior sources between 1982 and 2003. As time went on the margin between internal and external attacks became more even. Often, insider threats are more dangerous since the threat actors have access to physical systems and critical information. Many military members have experience in physical security, in conjunction with complementary skills such as intelligence gathering and analysis, vulnerability assessments and the understanding of risk models. These skills make them valuable once they are trained on the technical aspects of cybersecurity protection. And in contrast to their civilian counterparts, military members have demonstrated trustworthiness over time by maintaining a security clearance with periodic investigations to demonstrate reliability.

To illustrate the importance of training qualified cybersecurity practitioners, the Department of Homeland Security has established the Initiative Cyber Security Careers and Studies. To date this program has generated partnerships with universities and has concentrated on eLearning. Additionally, the “National Cybersecurity Workforce Framework (NICE)” provides a blueprint to categorize, organize and describe cybersecurity work into specialty areas, tasks, and knowledge, skills and abilities (KSAs). This initiative allows interested learners to target courses by interest and by proficiently level. Once this task is complete, training is tracked and individualized by the learner, allowing them to store all training and progress into a profile. Furthermore, work is being done to target scenario-based training to further emphasize teamwork and real-world applications.

The increase of dependence on computer systems and connectedness has brought significance to cybersecurity across all sectors of industry. Crucial information including customer data, trade secrets and other information that is key to all organizations survival is protected by cybersecurity measures. Based on a UK Department of Business, Innovation & Skills 2015 Security survey, and reported by TrustWave, 90 percent of large enterprises and 74 percent of small organizations today suffer from security breaches of different types. By 2020, according to NIST, there will be a 1.5 to 1.8 million global shortfall in qualified cybersecurity professionals that is compounded by the fact that most senior cybersecurity professionals will reach retirement age. This presents a unique challenge to staff these highly technical positions. Current efforts are mostly centered on a bottom-up approach that attempts to spur cybersecurity curiosity and excitement at the high school and collegiate levels, NIST says. Although this is a much needed step to avoid a long-term shortage, it is important to fill the gap in the short term. Veterans should transition well into organizations within a cybersecurity role with a similar mission of protection that they experienced in the military.

Yet, the current cybersecurity adult learning method must be addressed. The training options consists of universities with traditional four-year degrees, certification programs and full-time intensive skills training at a cyber boot camp. Four-year degreed programs are expensive, geographically limited and are lengthy to complete. Mississippi State has a program funded by the Department of Justice that trains law enforcement in forensic skills needed for cybersecurity investigation, and has extended those services to wounded veterans. Certifications are designed for current practitioners with a minimum year experience level requirement. For instance, a Certified Information Systems Security Professional (CISSP) requires 10 years of verifiable information technology security (IT) experience to even sit for the exam. Yet, while advantageous to those with current skills, they do not address the need for transitioning workers. The cybersecurity boot camp model is a high-intensity program that can be complete in as less as 20 weeks. One such program is currently offered by SecureSet in Colorado and Florida that addresses the emerging need for professionals, and is consistent with training methods that military members are familiar with. Another option is for host organizations to develop apprentices or an internal cybersecurity boot camp. Overall, creativity is needed to solve a vulnerability that exists in virtually every enterprise.

Cybersecurity fields will continue to grow and require skilled workers to protect against attack and ensure the United States economy is not at risk. Military veterans are solid and qualified candidates to retrain, as they already possess complimentary skills and understanding of key areas within a cybersecurity program. Transitioning veterans need support in addition to dedicated programs once they are hired to maximize the opportunity for retention after hire. All organizations need to think outside of the box to solve the cybersecurity skills gap. One of the largest qualified candidate pools is transitioning military members who have the mindset and specific skills that help them to make instant contributions within enterprises.

KEYWORDS: cybersecurity skills gap security talent gap veteran security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cody mulla

Cody Mulla has a distinguished 20-year career as an expert in emergency and crisis management. He is currently Director, Security Risk Management at Hillard Heintze. Mulla is finishing his Ph.D. in Organizational Development at the University of Texas and holds three Masters Degrees (Human Resource Development/Lean Six Sigma, Master of Science, Industrial Organizational Psychology, and a Master of Science, Leadership & Crisis Management). He also holds a number of certifications including Certified Protection Professional CPP, ASIS; International Association of Emergency Managers AEM; Master Police Officer, TCOLE; Certified Healthcare Protection Administrator CHPA, IAHSS; and Certified Homeland Protection Professional, NDPC. Mulla serves on the ASIS School Safety and Security Council and the Utility Security Council.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • meeting1-900px.jpg

    Threat Assessment: How to Build Exercises and Evaluate Performance

    See More
  • meeting2-900px.jpg

    Threat Assessment: Exercise & Evaluation Best Practices

    See More
  • guards 3 responsive default

    How to Promote Continuous Improvement in Threat Assessment Programs

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!