Supporting those

who

Serve and Support US. 

Military Transition

Veteran Job Seekers

Transitioning from the military into the civilian workforce can be a daunting experience, or making the move to your next civilian role and leveraging your military experience.

No matter your status, we’re grateful you’re here to explore jobs after the military. blueStone Recruiting is one of the nations premier IT recruiters who have assisted many veterans in finding their civilian career. Our seasoned IT recruitment professionals know how to leverage the experience you have gained in the military and communicate that to our clients in the business world.

Hundreds of mid-tier to Fortune 100 companies look to us for talented candidates in military transition who have served as officers and skilled technicians.

We find careers for Junior Military Officers, Non-commissioned Officers, and Enlisted Technicians.

All of blueStone’s Recruitment services are completely free of charge as we are paid by the companies who hire us to recruit and present qualified candidates. As a military professional, you have many of the traits that are sought out in the business world.

Employers looking to employ Veterans

Employers looking to acquire highly trained and motivated employees should look no further than the U.S. Military. Information Technology plays a large role within the U.S. Military from Cyber Security to Supply Chain informatics.

The US army created the Information and Communication Technologies Defense (ICTD) Division. This division provides training primarily for Department of Army personnel, but have also trained personnel from all services and other federal agencies to include: U.S. Air Force, U.S. Navy, U.S. Marine Corps, U.S. Coast Guard, Department of Defense civilian and contract employees, Department of Energy, and the Federal Aviation Administration.

As of 2016 the US Army has
• Over Forty cyber teams representing over 2,000 personnel
• Created new cyber job categories
– Cyber “branch” for officers
– Cyber network defender
– Cyberspace defense technician

The objectives of this training are listed as follows.
  • Affect physical security of computer hardware and software.
  • Limit access to computer equipment to authorized users only.
  • Prevent computer fraud, waste and abuse.
  • Implement effective contingency planning.
  • Report security problems to the chain of command.
  • Protect computer files from infection by malicious logic.

U.S. Army personnel who have been part of ICTD have very specialized skill sets that that are in great demand at US corporations.

According to the U.S. Fleet Cyber Command / Tenth Fleet Strategic Plan 2015-2020

The U.S. Navy has reaffirmed its commitment to information dominance and issued guidance to its sailors regarding how to minimize the risk of cyber threats.

The cyber threat reaches beyond traditional information technology (IT) networks and computers to systems that affect nearly every aspect of the Navy’s mission. Machinery control, weapons and navigation systems may be vulnerable, as well as the networks and computers commonly used by Navy personnel.

To protect against these threats the Navy has made significant changes, including how it is organized and how much it invests in cyber security.

In 2014, the Navy established Task Force Cyber Awakening (TFCA) to improve cyber security after its network was compromised the previous year. The mission of the task force was to take a comprehensive look at the Navy’s cyber security and make changes to improve its defenses.

TFCA established priorities for protecting the Navy based on recommendations from industry, the cyber security community and stakeholders. Using these priorities, the task force evaluated hundreds of funding requests for addressing vulnerabilities, which resulted in $300 million being set aside in fiscal year 2016 for solutions that strengthened the Navy’s defenses and improved awareness of its cyber security posture. TFCA used the same approach to evaluate over 300 competing funding requests for the next five years of the Navy’s budget.

Isolate Breaches

One of these funding priorities was for control points which allow the Navy to isolate portions of the network after a breach is detected. Much like the watertight compartments on a ship, these control points will allow the Navy to limit the impact of a compromise and keep adversaries from moving to other targets in the network. These control points will also allow the Navy to selectively limit connectivity for parts of the network if increased cyber activity from adversaries is expected, similar to how ships set different material conditions of readiness.

CYBERSAFE Project

The task force also formed a Navy-wide group to implement the CYBERSAFE Program. CYBERSAFE is modeled after SUBSAFE which is the rigorous submarine safety program begun after the loss of the USS Thresher (SSN 593) in 1963. Like the submarine program, CYBERSAFE will harden a critical subset of warfighting components, which could be certain computer systems or parts of the network. CYBERSAFE will apply more stringent requirements to these components before and after fielding to ensure they can better withstand attempted compromises. CYBERSAFE will also require changes in crew proficiency and culture to implement these requirements.

In September 2015, the CNO established the Navy Cyber Security Division on the Navy headquarters staff to continue the transformation started by TFCA. The new division will oversee the Navy’s approach to cyber security, developing strategy, ensuring compliance with cyber security policy and advocating for cyber security requirements. The division will also evaluate and prioritize major investments and manage the CYBERSAFE program.

Information Dominance

The commissioning of U.S. Fleet Cyber Command and reestablishment of U.S. 10th Fleet on January 29, 2010 closely followed the Navy’s 2009 acknowledgement of information’s centrality to maritime warfighting, known as Information Dominance.

Information Dominance is defined as the operational advantage gained from fully integrating the Navy’s information functions, capabilities and resources to optimize decision making and maximize warfighting effects. The three pillars of Information Dominance are assured command and control, battlespace awareness and integrated fires (Naval Integrated Fire Control-Counter Air.)

Fleet Cyber Command’s strategic plan includes five primary goals, which are to: operate the network as a warfighting platform, conduct tailored signals intelligence, deliver warfighting effects through cyberspace, create shared cyber situational awareness and establish and mature the Navy’s Cyber Mission Force.

The U.S. Air Force has been on the cutting edge of technology since its inception. The 67th Cyberspace Wing operates, manages, and defends global Air Force networks. The wing trains and readies airmen to execute computer network exploitation and attack. It also executes full-spectrum Air Force network operations, training, tactics, and management. It provides network operations and network warfare capabilities to Air Force, joint task force, and Unified Combatant Commands. Additionally, it performs electronic systems security assessments for the Air Force.

The Air Force Electronic Warfare Center  electronic combat and technical expertise contributed to the successes of Operation DESERT STORM command and control warfare (C2W). Air Force successes in exploiting enemy information systems during Operation DESERT STORM led to the realization strategies and tactics of C2W could be expanded to the entire information spectrum and be implemented as information warfare (IW). In response, the unit was re-designated as the Air Force Information Operations Center (AFIOC) on Sept. 10, 1993 and contained technical skills from the former AFEWC and Air Force Cryptologic Support Center’s Securities Directorate (AFCSC/SR). On Aug. 18, 2009, in coordination with the stand up of 24th Air Force, the AFIOC was re-designated to the 688th Information Operations Wing. Finally on Sept. 13, 2013, the wing was re-designated to better reflect its current mission as the 688th Cyberspace Wing.

Airmen of these groups have specialized networking and Cyber Security skills that transition very well into the corporate workforce.

The Marine Corps Network Operations and Security Center’s mission is to direct global Network Operations (NETOPS) and computer network defense of the MCEN and to provide technical leadership in support of Marine and Joint Forces operating worldwide. The MCNOSC is also responsible for intelligence gathering and analysis to develop future capabilities in support of DCO.  The MCNOSC is the Computer Network Defense Service Provider (CNDSP) and serves as our Corps’ Global Network Operations and Security Center (GNOSC). The MCNOSC provides 24/7 NETOPS C2 through its Operations Center. Under the OPCON of MARFORCYBER, the MCNOSC executes Information NETOPS and DCO in support of our operational requirements in order to enhance freedom of action across all warfighting domains while denying the efforts of adversaries to degrade or disrupt this advantage through cyberspace.

Marines assigned to this center have easily transferable skills to civilian networking and IT roles within corporations.

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt