INDUSTRY:
Military IT jobs focus on the use, repair and upkeep of computer and telecommunications systems.
There are 9 military careers in this industry
Interested in cyber careers? Take the Cyber ChallengeCommunications equipment operators are responsible for generating, transmitting, tracking, and routing military communications. They operate sophisticated, state-of-the-art, electronic receivers and associated analysis and recording equipment to collect airborne, shipborne, land-based Radio Detection and Ranging (RADAR), and other signals within the electromagnetic spectrum. They use this equipment to communicate a wide range of information, including operational plans and the transmission of classified information. They may perform limited operator maintenance.
Communications managers are subject matter experts in electromagnetic spectrum operations. They plan, build, secure, operate, and defend communications networks. They oversee the development and maintenance of policies and plans that are essential to operational success. They may supervise the encryption and decryption process and appropriate routing of sensitive communications.
Cyber-operations officers develop and oversee both offensive and defensive cyberspace capabilities in support of the full range of military programs. Offensive operations involve the application of computer power to target the capabilities of hostile adversaries. Defensive operations involve protecting data, networks, net-centric capabilities, and other designated systems. Some cyber officers focus on offensive or defensive operations, while others integrate the two to support military operations.
Cyber-operations specialists conduct offensive and defensive cyberspace operations in support of the full range of military options. They utilize devices, computer programs, and techniques designed to create an effect across cyberspace. Offensive operations involve applying force to target enemy hostile adversary activities and capabilities. Defensive operations are conducted to protect data, networks, and net-centric capabilities by detecting, identifying, and responding to attacks from external forces.
Geospatial imaging specialists perform the collection, analysis, and dissemination of geospatial imagery to support war fighting operations and other activities. They operate geographic information systems (GIS) that store and analyze maps and other geographic information. Intelligence derived by the geospatial imaging specialist is critical for mission success at the national, theater, and tactical levels. As such, they disseminate multi-sensor geospatial intelligence products to appropriate parties.
IT managers in the Military are responsible for developing, implementing, and supporting both short- and long-term IT plans. They create and administer IT policies and procedures, and ensure the Military has the software, hardware, and programs needed to complete its missions efficiently and effectively.
Network and database administrators develop, install, operate, and maintain the Military’s computer networks and databases. They monitor system performance and make sure the appropriate personnel have access to data. They are responsible for supporting operating systems and managing the software and hardware necessary for usage. They may also develop computer programs utilizing computer language. They perform administrative duties including providing user support to military personnel.
Computer programmers and developers write, analyze, design, and develop programs that are critical to war-fighting capabilities and allow computer applications and software programs to function properly. From maintenance tracking programs to programs that organize and display intelligence data, they ensure that the Military has the software and programs needed to complete missions efficiently and effectively.
Signals intelligence specialists oversee the collection and exploitation of electromagnetic signals, including communication and non-communication signals. They operate sophisticated equipment to gather, sort, and scan intercepted foreign communications and non-communications. They identify and process the intercepted signals and perform analysis to establish target identification and operational patterns. Using this information, they produce combat, strategic, and tactical intelligence reports.