Transitioning to Network Security: A Guide for Military Veterans

A Guide for Military Veterans Embracing a New Battlefield: Cybersecurity and Operational Technology
As military veterans you may have stood on the front lines, defending our country against visible threats, literally or figuratively. Now, in this transition to civilian careers, particularly in the field of network security, you are entering a new kind of battlefield—one that’s digital but no less critical. Operational Technology (OT) is a domain where your unique skills and discipline can make a significant impact, especially given the landscape where OT is a prime target for cyber threats due to the potential disruption its compromise can cause.

 Understanding OT in the Cyber World
Operational Technology, or OT, might not be as familiar as the standard IT equipment we’re accustomed to, like servers, laptops, and Wi-Fi devices. OT encompasses the technology integral to the operations of various sectors but not typically considered part of the IT infrastructure. This includes machinery in hospitals, equipment in mining operations, and the vital systems in oil companies, power grids and many others. These technologies, often designed without cybersecurity in mind, are now connected to our global networks – sometimes accidentally – thus presenting unique challenges in protecting them from cyber threats.

Industrial technology concept. Communication network. INDUSTRY 4.0. Factory automation.

The Strategy for Protection
Your military training has taught you that understanding your terrain and the capabilities of your tools is vital for defense. In cybersecurity, this translates to having comprehensive visibility of our systems’ vulnerabilities. While traditional IT systems benefit from agent-based vulnerability scanners, OT requires a more nuanced approach. Agentless scanning, which involves probing systems to identify vulnerabilities without installing software directly on the target device, is a strategy we can adopt. This method allows us to stay one step ahead of potential attackers by identifying and mitigating risks without direct access to the device.

Defense Tactics for Indefensible Systems
When faced with defending a device that cannot protect itself, think of it as protecting a high-profile individual who cannot fend off threats alone. The device, like the individual, needs a strong defense mechanism built around it. This can be achieved by employing firewalls, limiting connectivity, and ensuring that any communication is initiated safely from the device outward. Essentially, we’re creating a digital fortress for these vulnerable systems.

Questioning the Connection
A critical aspect of cybersecurity, often overlooked, is the fundamental question of whether a device needs to be connected to a network at all. This decision-making process can prevent unnecessary vulnerabilities and is a testament to strategic defense planning. For example, opting out of network modules for certain technologies can significantly enhance security by default.

The Veteran AdvantageVeterans bring a unique perspective to network security. Your experience in assessing threats, strategizing defenses, and executing missions with precision can be directly applied to protecting OT from cyber threats. The cybersecurity field offers an opportunity to continue serving your community, albeit in a digital realm. Your disciplined approach, ability to operate under pressure, and understanding of strategic defense are invaluable assets in this new battle against cyber threats.

Conclusion
Transitioning to a career in network security means applying your hard-earned skills in a new context. Defending OT systems from cyber threats requires both a deep understanding of the technology and a strategic approach to security—a perfect match for the skill set of military veterans. What better preparation than with a squad of supportive veterans and reservists? As we move forward, let’s embrace this challenge with the same courage and dedication shown throughout your military careers, making a difference in the digital world.

Sign up to qualify for the Industrial Systems – OT – Cybersecurity Microcredential through CyberCatalyst to gain hands-on experiential learning at the BCIT Burnaby Campus in July 2024!

So: What Job Will I Have?

Defending Operational Technology (OT) from cyberattacks is a specialized field that intersects cybersecurity, engineering, and industrial systems. Professionals in this area focus on safeguarding critical infrastructure, manufacturing plants, utility systems, and other operational technologies. Here are some common job titles for individuals involved in protecting OT from cyber threats:

1. OT Security Analyst:
Focuses on identifying and analyzing potential security threats to operational technology systems.
2. Cybersecurity Engineer (OT/IoT):
Designs and implements security measures to protect OT and IoT (Internet of Things) environments from cyber threats.
3. Industrial Control Systems (ICS) Security Specialist:
Specializes in securing industrial control systems, including SCADA (Supervisory Control and Data Acquisition) systems, used in various industries.
4. Network Security Engineer (OT):
Works on securing the network aspects of OT environments, including the protection of communication between devices and control systems.
5. OT Security Architect:
Designs and plans the security architecture specifically for OT environments, ensuring robust protection against cyber threats.
6. OT Cybersecurity Manager:
Oversees the cybersecurity strategies and operations within the OT domain, coordinating efforts to mitigate risks and respond to incidents.
7. SCADA Security Analyst:
Focuses specifically on the security of SCADA systems that control and monitor industrial processes.
8. Critical Infrastructure Security Specialist:
Works on protecting critical infrastructure sectors (such as energy, water, transportation) from cyberattacks.
9. Information Security Analyst (with OT focus):
While traditionally focused on IT, these analysts may specialize in or transition to focusing on the security of OT systems within organizations.
10. Incident Response Analyst (OT):
Specializes in responding to cybersecurity incidents within OT environments, mitigating threats, and restoring systems to normal operations.

These roles require a unique blend of skills, including knowledge of cybersecurity principles, familiarity with industrial control systems, and understanding the specific challenges and technologies used in OT environments.