WEBVTT

00:00.384 --> 00:03.384
(suspenseful music)

00:05.677 --> 00:07.689
(fingers typing)

00:07.689 --> 00:09.408
- [Computer] Access granted.

00:09.408 --> 00:10.658
Access granted.

00:12.035 --> 00:14.785
(dramatic music)

00:16.838 --> 00:19.588
(computer alarm)

00:27.176 --> 00:28.335
Access denied.

00:28.335 --> 00:29.502
Access denied.

00:37.000 --> 00:38.970
- [Narrator] Today's Army faces challenges

00:38.970 --> 00:41.630
that reach far beyond the traditional battlefield.

00:42.290 --> 00:45.160
With a consistently evolving warfare landscape,

00:45.160 --> 00:47.230
the enemy's reach is no longer limited

00:47.230 --> 00:49.080
to geographical constraints.

00:49.250 --> 00:50.190
As one of the most

00:50.190 --> 00:52.590
technologically advanced nations in the world,

00:52.590 --> 00:54.570
our sophisticated weapons systems,

00:54.570 --> 00:58.660
satellites, navigation and aviation systems

00:58.700 --> 01:00.700
are reliant upon an infrastructure

01:00.700 --> 01:02.540
of vast stores of information

01:02.580 --> 01:05.870
in networked computer-based systems and databases.

01:05.970 --> 01:08.150
Our adversaries are attacking and attempting

01:08.150 --> 01:10.570
to exploit our networks around the clock.

01:10.690 --> 01:13.440
Searching for vulnerabilities to jeopardize our mission

01:13.780 --> 01:15.570
and disrupt our way of life.

01:15.660 --> 01:18.340
Just one stealthy piece of malicious code

01:18.340 --> 01:20.905
could have devastating and costly effects.

01:20.905 --> 01:23.988
(suspenseful sounds)

01:27.130 --> 01:29.110
The Army relies on intelligent,

01:29.110 --> 01:31.250
highly skilled service men and women

01:31.250 --> 01:34.530
to support and defend these crucial and complex systems

01:34.530 --> 01:37.240
against threats both foreign and domestic.

01:37.280 --> 01:40.470
- Protecting information is very essential to the Army now,

01:40.470 --> 01:42.740
and it's gonna be a very important field

01:42.820 --> 01:43.653
and it's a growing field.

01:43.653 --> 01:44.700
- [Narrator] As a soldier working

01:44.700 --> 01:46.810
in Military Occupational Specialty,

01:46.810 --> 01:48.700
Cyber Operation Specialist,

01:48.700 --> 01:50.280
you will serve on the front lines

01:50.280 --> 01:52.130
of the cyberspace battlefield.

01:52.140 --> 01:54.400
Enabling and executing both defensive

01:54.400 --> 01:56.690
and offensive cyberspace operation,

01:56.690 --> 01:58.340
ensuring the freedom of maneuver

01:58.340 --> 02:00.040
within the cyberspace domain,

02:00.040 --> 02:02.970
and denying that same advantage to our adversaries.

02:02.970 --> 02:05.600
- Way the world operates today with technology,

02:05.600 --> 02:08.960
you don't have to fight somebody one on one,

02:09.090 --> 02:12.630
you don't have to follow that traditional kinetic warfare,

02:12.630 --> 02:14.660
instead you can exploit the fact

02:14.660 --> 02:17.410
that one computer system has a vulnerability.

02:18.390 --> 02:19.860
- [Narrator] After completing ten weeks

02:19.860 --> 02:21.300
of basic combat training,

02:21.300 --> 02:22.830
you will complete two phases

02:22.830 --> 02:24.750
of advanced individual training.

02:24.750 --> 02:27.360
Phase one takes place over 25 weeks

02:27.360 --> 02:29.930
at the Corry Station Naval Technical Training Center

02:29.930 --> 02:31.370
in Pensacola, Florida,

02:31.370 --> 02:33.860
followed by 20 weeks of phase two training

02:33.860 --> 02:37.040
at the US Army Cyber School at Fort Gordon, Georgia.

02:37.040 --> 02:40.090
The Army will train you in a number of valuable skills,

02:40.090 --> 02:43.230
such as performing cyber attacks and defenses,

02:43.230 --> 02:46.560
cyber intelligence, surveillance, and reconnaissance actions

02:46.560 --> 02:48.800
on specified systems and networks,

02:48.800 --> 02:52.050
conducting network terrain audits, penetration testing,

02:52.200 --> 02:55.430
collecting and analyzing basic digital forensics data,

02:55.430 --> 02:57.330
and software threat analysis.

02:57.330 --> 02:59.310
To react to cyberspace events

02:59.310 --> 03:02.760
and employ cyberspace defense infrastructure capabilities,

03:02.760 --> 03:05.770
and to provide incident response impact assessments,

03:05.770 --> 03:08.500
and produce network security posture assessment.

03:08.550 --> 03:11.020
You will also learn to analyze computer system

03:11.020 --> 03:12.270
and network architecture,

03:12.290 --> 03:13.560
and determine and implement

03:13.560 --> 03:15.790
exploitation and defensive methods.

03:15.870 --> 03:18.880
- It gets beyond the cutting edge of a lot of technology

03:18.880 --> 03:21.460
and a lot of tactics that haven't really been exposed

03:21.460 --> 03:23.130
inside of the civilian industry,

03:23.130 --> 03:24.480
they may not get to see the things

03:24.480 --> 03:26.770
that we're using for several years.

03:26.770 --> 03:29.760
- [Narrator] Due to the highly sensitive nature of this MOS,

03:29.760 --> 03:32.160
qualifying soldiers must meet top secret,

03:32.160 --> 03:33.920
sensitive compartment and information

03:33.920 --> 03:35.890
access eligibility requirements,

03:35.890 --> 03:39.130
as well as pass a counterintelligence scope polygraph.

03:39.200 --> 03:41.820
The unparalleled training and experience gained

03:41.820 --> 03:44.230
while serving in this MOS can prepare you

03:44.230 --> 03:47.180
for a wealth of opportunities in the civilian workforce.

03:47.180 --> 03:49.910
The skills you will acquire are in high demand.

03:49.940 --> 03:53.360
- We get a opportunity to work with the industry a lot.

03:53.390 --> 03:55.770
We always get a opportunity to see

03:55.890 --> 03:58.300
what our civilian counterparts are doing

03:58.430 --> 04:00.610
as far as defending their networks,

04:00.610 --> 04:02.510
and these people remember who you are.

04:02.610 --> 04:03.550
- [Narrator] Join the Army's

04:03.550 --> 04:05.920
most technologically advanced career field

04:06.080 --> 04:09.610
as one of an elite team of world class cyber warriors,

04:09.610 --> 04:12.070
committed to combating our nation's ever-present

04:12.070 --> 04:13.950
and growing cyberspace threat.

04:14.260 --> 04:16.310
Military Occupational Specialty

04:16.330 --> 04:18.378
Cyber Operation Specialist.

04:18.378 --> 04:21.461
(two dramatic bangs)

