New Cohort Starts:

Donate

1B093 Career Guide

Air Force

1B093: Cybersecurity Operations

Career transition guide for Air Force Cybersecurity Operations (1B093)

Translate Your 1B093 Experience Now

Get a personalized AI-powered translation of your military experience into civilian resume language.

Start Free Translation

Tech Roles You Could Aim For

Real industry tech roles your 1B093 background maps to — picked from BLS-anchored occupations using your training, cognitive skills, and systems experience.

Security Engineer

Security

SOC 15-1212
High match

Your experience in cybersecurity operations, including threat identification, security policy enforcement, and vulnerability management, directly translates to the responsibilities of a Security Engineer. Your experience with ASIM maps to SIEM systems like Splunk. Your familiarity with network security principles, incident response, and cryptography are highly relevant.

Typical stack:

Networking and OS internalsCryptography fundamentalsThreat modelingCloud security (IAM, VPC)Code review for security

SOC Analyst

Security

SOC 15-1212
High match

Your experience monitoring IT systems and networks, identifying security violations, and managing incident resolution aligns well with the role of a SOC Analyst. You're accustomed to using software tools for security enhancement and possess skills in vulnerability assessment and penetration testing.

Typical stack:

SIEM platforms (Splunk, Elastic, Sentinel)Network protocolsEndpoint and log analysisMITRE ATT&CK familiarityIncident-response runbooks

Network Engineer

Infrastructure

SOC 15-1241
Good match

Your experience installing, configuring, and maintaining network systems and circuits, troubleshooting network issues, and coordinating with various entities for fault resolution is directly applicable to the role of a Network Engineer. You have experience with network infrastructure and protocols.

Typical stack:

TCP/IP fundamentalsRouting protocols (BGP, OSPF)Firewall and VPN configurationCloud networkingCisco or Juniper hands-on

DevOps Engineer

DevOps / Platform

SOC 15-1244
Moderate match

Your experience managing infrastructure devices and systems, deploying expeditionary communications systems, and using agile logistics support channels can be leveraged in a DevOps environment. Your skills in system modeling and procedural compliance are valuable for automating and streamlining IT processes.

Typical stack:

CI/CD tooling (GitHub Actions, GitLab, Jenkins)Infrastructure as Code (Terraform, Pulumi)Containers (Docker, Kubernetes)Cloud platforms (AWS, GCP, Azure)Linux

Skills You Already Have

Concrete bridges from 1B093 experience to tech-industry practice.

  • Network Security PrinciplesNetwork Security
  • Vulnerability Assessment and Penetration TestingVulnerability Management
  • Incident Response and HandlingIncident Response
  • Security Information and Event Management (SIEM)SIEM Systems (e.g., Splunk, QRadar)
  • Cryptography and Key ManagementCryptography
  • Cybersecurity Policy and ComplianceSecurity Compliance
  • Operating Systems Security (Windows/Linux)OS Security
  • Network Infrastructure and ProtocolsNetwork Engineering
  • Rapid PrioritizationProject Management
  • System ModelingData Analysis
  • Procedural ComplianceQuality Assurance
  • ASIMSIEM systems (Splunk, QRadar)
  • Remedy ARSITSM platforms (ServiceNow)
  • INMSNetwork monitoring tools (SolarWinds, PRTG Network Monitor)
  • JIMSIncident response platforms (FireEye Helix, Palo Alto Cortex XSOAR)
  • ITILIT service management best practices

Skills to Learn

The concrete gap to bridge — specific to the roles above, not generic.

Cloud computing platforms (AWS, Azure, GCP)Advanced SIEM techniques and threat intelligenceScripting languages (Python, Bash)Threat hunting methodologiesReverse engineering and malware analysisNetwork automation tools (Ansible, Chef, Puppet)Cloud networking conceptsContainerization and orchestration (Docker, Kubernetes)Infrastructure as Code (Terraform, CloudFormation)CI/CD pipelines

How VWC fits

Vets Who Code accelerates the parts we teach — software engineering fundamentals, web development, AI tooling. For everything else above, the path is doable independently with the resources we link to.

See VWC Programs

Civilian Career Pathways

Top civilian roles for 1B093 veterans, with average salary and market demand data.

Information Security Analyst

$105K
High matchVery high demand

Skills to develop:

Cybersecurity certifications (e.g., CISSP, Security+)Specific SIEM tool experience (e.g., Splunk, QRadar)Cloud security knowledge (AWS, Azure, GCP)

Network Engineer

$90K
High matchHigh demand

Skills to develop:

Cisco Certified Network Associate (CCNA) or higherExperience with specific network hardware vendors (e.g., Cisco, Juniper)Cloud networking skills

Telecommunications Specialist

$75K
Good matchStable demand

Skills to develop:

Vendor-specific certifications (e.g., Avaya, Cisco)Project management skillsExperience with VoIP systems

IT Manager

$115K
Good matchGrowing demand

Skills to develop:

Project Management Professional (PMP) certificationITIL certificationLeadership and team management experience

Computer Systems Analyst

$95K
Moderate matchHigh demand

Skills to develop:

Business analysis trainingData analysis skillsSpecific industry knowledge (e.g., healthcare, finance)

Salary estimates from VWC career data

Hidden Strengths

Cognitive skills your 1B093 training built — and where they transfer.

Adversarial Thinking

You anticipated and countered threats to military networks, proactively identifying vulnerabilities and devising defensive strategies to protect critical assets and information.

This translates to a valuable ability to anticipate risks and develop mitigation strategies in various civilian contexts, such as fraud prevention, cybersecurity, or competitive intelligence.

Rapid Prioritization

You routinely assessed situations, determined the urgency and impact of technical issues, and allocated resources to address the most critical problems first, ensuring minimal disruption to operations.

This skill is highly transferable to civilian roles requiring quick decision-making under pressure, such as project management, emergency response, or customer service management.

System Modeling

You developed a comprehensive understanding of complex network architectures and data flows, enabling you to troubleshoot issues effectively and optimize system performance.

This ability to visualize and understand complex systems makes you well-suited for roles involving process improvement, data analysis, or software development.

Procedural Compliance

You meticulously adhered to strict security protocols, technical orders, and industry standards to maintain the integrity and confidentiality of sensitive information and ensure the smooth operation of critical systems.

Your commitment to following established procedures and regulations translates to valuable skills in compliance-oriented roles, such as quality assurance, regulatory affairs, or risk management.

Non-Obvious Career Matches

Fraud Analyst

SOC 13-2023

You've been identifying and mitigating threats to network security. As a Fraud Analyst, you'll use those same skills to detect and prevent fraudulent activities, protecting businesses and individuals from financial harm. Your experience with security protocols and data analysis will be invaluable.

Business Continuity Planner

SOC 13-1199

You've been responsible for ensuring the continuity of critical communications systems in the face of disruptions. As a Business Continuity Planner, you'll leverage this experience to develop and implement plans to minimize downtime and ensure business operations continue smoothly during emergencies.

Technical Writer

SOC 27-3042

You've interpreted technical data, engineering drawings, and wiring diagrams to maintain systems. As a Technical Writer, you can use your familiarity with technical documentation to create clear, concise, and accurate guides and manuals for a variety of audiences.

Training & Education Equivalencies

Cyber Warfare Operations Initial Skills Training, Keesler AFB, MS

960 training hours24 weeksUp to 15 semester hours recommended in cybersecurity and networking.

Topics Covered

  • Network Security Principles
  • Vulnerability Assessment and Penetration Testing
  • Incident Response and Handling
  • Security Information and Event Management (SIEM)
  • Cryptography and Key Management
  • Cybersecurity Policy and Compliance
  • Operating Systems Security (Windows/Linux)
  • Network Infrastructure and Protocols

Certification Pathways

Ready to Certify

Security+ CE

Partial Coverage

CompTIA Network+70% covered

While familiar with networking concepts, a review of the latest networking technologies, troubleshooting methodologies, and some hands-on practice with newer network devices would be beneficial.

Certified Information Systems Security Professional (CISSP)40% covered

Requires a broader understanding of security management, risk management, and legal/compliance issues. Study all domains in the CISSP Common Body of Knowledge (CBK).

Certified Information Security Manager (CISM)30% covered

Requires more in-depth knowledge of information security governance, program development and management, risk management, and incident management.

Recommended Next Certifications

Certified Ethical Hacker (CEH)GIAC Certified Incident Handler (GCIH)Project Management Professional (PMP)

Technical Systems Translation

Military systems you've used and their civilian equivalents for your resume.

Military SystemCivilian Equivalent
Automated Security Incident Measurement (ASIM)Security Information and Event Management (SIEM) systems such as Splunk or QRadar
Remedy Action Request System (Remedy ARS)IT Service Management (ITSM) platforms like ServiceNow
Integrated Network Management System (INMS)Network monitoring tools such as SolarWinds or PRTG Network Monitor
Defense Red Switch Network (DRSN)Secure Voice over IP (VoIP) solutions with encryption, like Cisco Unified Communications Manager with secure endpoints
Joint Incident Management System (JIMS)Incident response platforms such as FireEye Helix or Demisto (now Palo Alto Cortex XSOAR)
Information Technology Infrastructure Library (ITIL)IT service management best practices frameworks and certifications

Ready to Translate Your Experience?

Our AI-powered translator converts your 1B093 experience into ATS-optimized civilian resume language.

Translate My Resume — Free