Expand mobile version menu

Cyber-Operations Officer ... (Military - Officer)

What They Do

About This Career

Cyber-operations officers oversee both offensive and defensive cyberspace operations in support of the full range of military programs. Offensive operations involve the application of computer power to target the capabilities of enemies and hostile adversaries. Defensive operations involve protecting data, networks, net-centric capabilities, and other designated systems. Some cyber officers focus on offensive or defensive operations, while others integrate the two to support military operations.

This career is part of the Government and Public Administration cluster National Security pathway.

A person in this career:

  • Establishes priorities and provides guidance for collection, exploitation, analysis and reporting missions
  • Directs network terrain audits, digital forensics processes, and exploitation missions
  • Advises and assists commanders and staffs in formulating plans for cyber operations
  • Applies principles and techniques of computer science and computer engineering to research, design, develop, test, and evaluate software and firmware for computer network attack, exploitation, and defense in cyberspace operations
  • Ensures cyberspace operations requirements are met, unique systems are accredited, and operators are weapons system/mission certified for secure and reliable operations
  • Leads personnel that plan, engineer, test, integrate validate, operate, maintain, secure, and defend the Department of Defense Information Network to include cybersecurity measures that preserve communication networks and information systems in support of mission command
  • Supervises and oversees cryptographic network planning and the implementation and use of electronic keys required to support information networks and systems
  • Oversees the protection of data, networks, net-centric capabilities, and other designated systems through detection, identification, and response actions to attacks against friendly networks
  • Provides coordination for employment of cyber maneuver forces
  • Analyzes, plans, directs, and conducts computer network exploitation and attack

Working Conditions and Physical Demands

People who do this job report that:

  • You would often handle loads up to 10 lbs., sometimes up to 20 lbs. You might do a lot of walking or standing, or you might sit but use your arms and legs to control machines, equipment or tools.
  • Work in this occupation requires being outside most of the time

Working in this career involves (physical activities):

  • Seeing clearly up close
  • Speaking clearly enough to be able to be understood by others
  • Identifying and understanding the speech of another person

Work Hours and Travel

  • Irregular hours
  • Overnight travel

Contact

  • Email Support
  • 1-800-GO-TO-XAP (1-800-468-6927)
    From outside the U.S., please call +1 (424) 750-3900
  • North Dakota Career Resource Network
    ndcrn@nd.gov | (701) 328-9733

Support