The military services are formalizing and bolstering their contribution to the nation's cyber force, known as the U.S. Cyber Command Cyber Mission Force. As a part of a Total Force approach, the Army is considering using both active component and reserve component (RC) personnel to fill the Cyber Mission Force and other requirements in support of Army units.
This report identifies the number of Army RC personnel with cyber skills, to help identify ways in which these soldiers can be leveraged to conduct Army cyber operations. This report also describes the broader challenges and opportunities that the use of RC personnel presents.
To study this issue, the authors first performed a thorough review of past studies, government reports, and relevant literature. Next, they analyzed data from the Civilian Employment Information database and the Work Experience File database, and they performed analyses of social media data from LinkedIn profiles, which include self-reported cyber skills among reservists. They reviewed and assessed the knowledge, skills, and abilities (KSAs) defined for Cyber Mission Force roles in order to determine the percentage of these KSAs that can be acquired in the private sector. Finally, they conducted a survey of more than 1,200 guardsmen and reservists.
Based on both quantitative and qualitative analyses, the authors find that relevant information technology and cyber skills are in abundance in the private sector. As a result, there are tens of thousands of "citizen-soldiers" — that is, soldiers in the Army RC — that have the potential to support the Army's cyber mission needs and/or the propensity to learn cyber skills.
Key Findings
Untapped Cyber Potential Within the Army Reserve Component
The level of cyber expertise that exists in the reserve component (RC) can be estimated with currently available data sources, including, potentially, novel uses of social media, such as LinkedIn profiles.
The U.S. Department of Defense and the Army would benefit from a more detailed inventory of their cyber professionals, relative to what is provided by current data.
Most (but not all) of the knowledge, skills, and abilities needed for cyber operations can be acquired via civilian-based training and experiences. Specifically, they can be acquired in part from popular certificate programs and civilian-sector on-the-job training.
Sufficient operations tempo is vital to stay "cyber-sharp." Many guard and reserve soldiers are employed in leading-edge technology companies and have critical skills and experience in fielding the latest information technology systems, networks, and cybersecurity protocols. Arguably, their nonmilitary employment allows them to more easily maintain currency in their cyber skills, compared with some active component soldiers who are not engaged in cyber tasks on a frequent basis.
There are personnel in the RC whose civilian cyber expertise is not being utilized in or applied to their Army careers. This possible untapped cyber potential is approximately 11,000 people who, at a minimum, have the propensity to learn the cyber skills needed for Army cyber operations.
There are strong indications that many in the pool of untapped cyber potential have a desire to use their cyber-related skills in the Army. Many others who do not have cyber skills have a strong interest in acquiring them.
Recruiting More Cyber Personnel
The Army will likely need more cybersecurity personnel in the future than it has today. This projected shortage is exacerbated by a rapidly growing demand for cybersecurity personnel in the private sector.
The Army will need to continually adjust its strategies for recruiting, training, and qualifying cyber specialists. Potentially effective options for reserve recruiting include the use of expanded age ranges and generous compensation for sufficiently trained personnel in the private sector.
The Army should use a cyber aptitude assessment tool, similar to what the Air Force, the National Security Agency, and other countries utilize, to aid recruiting for cyber personnel.
No comments:
Post a Comment