USA Cyber Military Careers

MCSI's certifications are aligned to USA's Cyber Military Careers

Cyber Operations Technician (170A)

Cyber operations officers oversee both offensive and defensive cyberspace operations in support of the full range of military programs. Offensive operations involve the application of computer capabilities to target the capabilities of enemies and hostile adversaries. Defensive operations involve protecting data, networks, net-centric capabilities, and other designated systems. Some cyber officers focus on offensive or defensive operations, while others integrate the two to support military operations.

Network Management Technician (255N)

Network Management Technicians supervise and manage the operation of tactical and strategic information networks, systems, and associated personnel at the local and wide area network (LAN and WAN) level.

Information Protection Technician (255S)

Information Protection Technicians are the Army's subject matter experts on integrated cybersecurity activities and capabilities within the Army's portion of the cyberspace domain on the Department of Defense Information Networks (DODIN) enterprise. They are responsible for designing, building, configuring, operating, and maintaining cybersecurity capabilities and the implementation of a defensible network architecture in support of cyber operations internal defensive measures within the DODIN in order to enumerate, illuminate, locate, eradicate threats and respond to unauthorized activity, security alerts, attempted exploitation, data exfiltration, escalation, and any additional threats to mission command.

Senior Network Operations Technician (255Z)

Senior Network Operations Technician in the Military are responsible for developing, implementing, and supporting both short- and long-term IT plans. They create and administer IT policies and procedures, and ensure the Military has the software and programs needed to complete its missions efficiently and effectively.

Cyber Operations Specialist (17C)

Cyber operations specialists conduct offensive and defensive cyberspace operations in support of the full range of military options. They utilize devices, computer programs, and techniques designed to create an effect across cyberspace. Offensive operations involve applying force to target enemy and hostile adversary activities and capabilities. Defensive operations are conducted to protect data, networks, net-centric capabilities, and other designated systems by detecting, identifying, and responding to attacks against friendly networks.

Information Technology Specialist (25B)

Information technology specialists are responsible for maintaining, processing and troubleshooting military computer systems/operations. They monitor system performance and make sure the appropriate personnel have access to data. They perform administrative duties including providing user support to military personnel. They also provide information security to protect the Military’s computer systems against cyberattacks. Network and database administrators may work in military facilities or aboard ships and submarines.

Cyber Network Defender (25D)

As a Cyber Network Defender, you’ll perform specialized computer network defense duties, including infrastructure support, incident response, auditing, and managing. You’ll also detect and protect against unauthorized activity in the cyberspace domain and use a variety of tools to analyze and respond to attacks.

Telecommunications Operations Chief (25W)

The telecommunications operations chief plans, coordinates, configures, directs, integrates, and supervises the installation, operation, maintenance, and management of telecommunications systems and networks, and oversees information systems support functions for command, control, communications, and computers (C4) used at all echelons of the Army. The Telecommunications Operations Chief serves in Signal and other special communications activities.

Electronic Warfare Specialist (29E)

The electronic warfare specialist advises and assists the commander on electronic warfare operations. This person makes use of electromagnetic and directed energy to control the electromagnetic spectrum (EMS) and defeat the enemy through planning, coordination, integration, and execution of electronic attack (EA), electronic protection (EP), and electronic support (ES).


We're open for business

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.