New Cohort Starts:

Donate

1B073 Career Guide

Air Force

1B073: Cybersecurity Operations

Career transition guide for Air Force Cybersecurity Operations (1B073)

Translate Your 1B073 Experience Now

Get a personalized AI-powered translation of your military experience into civilian resume language.

Start Free Translation

Tech Roles You Could Aim For

Real industry tech roles your 1B073 background maps to — picked from BLS-anchored occupations using your training, cognitive skills, and systems experience.

Security Engineer

Security

SOC 15-1212
High match

Your experience as a Cybersecurity Operations specialist directly translates to a Security Engineer role. You have hands-on experience with network security fundamentals, vulnerability assessment, and incident response. You've worked with tools equivalent to McAfee Endpoint Security and CrowdStrike Falcon, and you understand security policies and procedures. Your adversarial thinking and rapid prioritization skills are highly valuable in this role.

Typical stack:

Networking and OS internalsCryptography fundamentalsThreat modelingCloud security (IAM, VPC)Code review for security

SOC Analyst

Security

SOC 15-1212
High match

Your experience in monitoring, evaluating, and maintaining systems to protect against unauthorized activity makes you a strong candidate for a SOC Analyst role. You have experience with Security Information and Event Management (SIEM) systems, identifying threats, and managing security violations. Your rapid prioritization and procedural compliance skills are directly applicable.

Typical stack:

SIEM platforms (Splunk, Elastic, Sentinel)Network protocolsEndpoint and log analysisMITRE ATT&CK familiarityIncident-response runbooks

Network Engineer

Infrastructure

SOC 15-1241
Good match

Your experience installing, upgrading, configuring, and maintaining network systems and circuits, as well as troubleshooting malfunctions using diagnostic software and test equipment, aligns well with the responsibilities of a Network Engineer. You have experience with network management systems and understand network infrastructure, which are essential skills for this role.

Typical stack:

TCP/IP fundamentalsRouting protocols (BGP, OSPF)Firewall and VPN configurationCloud networkingCisco or Juniper hands-on

Cloud Engineer

DevOps / Platform

SOC 15-1241
Moderate match

Your experience managing IT infrastructure and deploying expeditionary communications systems can be leveraged in a Cloud Engineer role. While you may need to learn cloud-specific technologies, your understanding of systems, networking, and security principles provides a solid foundation. Your skills in system modeling and procedural compliance are also beneficial.

Typical stack:

One major cloud (AWS, GCP, Azure)Networking (VPC, subnets, routing)IAM and security boundariesCost optimizationInfrastructure as Code

Skills You Already Have

Concrete bridges from 1B073 experience to tech-industry practice.

  • Network Security FundamentalsUnderstanding of network protocols and security principles
  • Vulnerability Assessment and Penetration TestingAbility to identify and assess security weaknesses
  • Incident Response and HandlingSkills in managing and resolving security incidents
  • Air Force Cybersecurity Policies and ProceduresKnowledge of security compliance and governance
  • Integrated Network Management System (INMS)Experience with network monitoring tools (e.g., SolarWinds)
  • Rapid PrioritizationQuickly assess and address critical issues under pressure
  • Adversarial ThinkingProactively anticipate and mitigate potential threats

Skills to Learn

The concrete gap to bridge — specific to the roles above, not generic.

Cloud computing platforms (AWS, Azure, or GCP)Containerization technologies (Docker, Kubernetes)Cloud security best practicesPython for security automationAdvanced network troubleshooting techniques

How VWC fits

Vets Who Code accelerates the parts we teach — software engineering fundamentals, web development, AI tooling. For everything else above, the path is doable independently with the resources we link to.

See VWC Programs

Civilian Career Pathways

Top civilian roles for 1B073 veterans, with average salary and market demand data.

Information Security Analyst

$105K
High matchVery high demand

Skills to develop:

Cybersecurity certifications (e.g., CISSP, Security+)Vulnerability assessment toolsIncident response procedures

Network Engineer

$90K
High matchHigh demand

Skills to develop:

Cisco Certified Network Associate (CCNA) or equivalentCloud networking (AWS, Azure)Scripting (Python, Ansible)

IT Manager

$115K
Good matchGrowing demand

Skills to develop:

Project management certification (PMP)ITIL certificationBudget managementTeam leadership

Telecommunications Specialist

$75K
Good matchStable demand

Skills to develop:

Specific telecom certifications (e.g., VoIP, fiber optics)Experience with modern telecom systemsCustomer service skills

Compliance Officer

$85K
Moderate matchGrowing demand

Skills to develop:

Knowledge of industry-specific regulations (e.g., HIPAA, GDPR)Auditing experienceRisk assessment methodologiesLegal research skills

Salary estimates from VWC career data

Hidden Strengths

Cognitive skills your 1B073 training built — and where they transfer.

Adversarial Thinking

Constantly anticipating and defending against potential cyber threats, probing for vulnerabilities in systems and networks, and thinking like an attacker to proactively strengthen defenses.

Using a proactive, threat-based mindset to anticipate risks, identify weaknesses, and develop robust mitigation strategies.

System Modeling

Creating mental models of complex network architectures, understanding data flows, and visualizing the interconnectedness of various systems to troubleshoot issues and optimize performance.

Developing a comprehensive understanding of complex systems, their interactions, and potential points of failure to improve efficiency and resilience.

Rapid Prioritization

Quickly assessing the severity and impact of network outages or security breaches, prioritizing remediation efforts based on criticality, and allocating resources effectively to address the most pressing issues first.

Evaluating competing priorities under pressure, triaging urgent matters based on impact, and efficiently allocating resources to address the most critical needs.

Procedural Compliance

Strictly adhering to established protocols, security policies, and regulatory requirements when configuring, maintaining, and troubleshooting IT systems to ensure data integrity, confidentiality, and availability.

Maintaining meticulous adherence to established procedures, quality standards, and regulatory guidelines to ensure consistent, reliable, and compliant outcomes.

Non-Obvious Career Matches

Compliance Officer

SOC 13-2000

You've been immersed in security protocols and regulations, ensuring systems meet stringent standards. As a Compliance Officer, you'll leverage that expertise to develop, implement, and monitor compliance programs for organizations in various industries. Your attention to detail and understanding of risk management will be invaluable.

Business Continuity Planner

SOC 13-1199

You're skilled in maintaining systems and networks during outages or threats. As a Business Continuity Planner, you’ll develop and implement strategies to ensure business operations continue with minimal disruption during emergencies, mirroring your experience in maintaining critical voice, data, and video services.

Technical Sales Engineer

SOC 41-9031

You have a deep understanding of IT infrastructure, telecommunications and security. As a Technical Sales Engineer, you can leverage this knowledge to understand customer needs and translate them into technical solutions using your intimate knowledge of hardware and software tools, but in this case selling solutions instead of maintaining them.

Training & Education Equivalencies

Cybersecurity Training, Keesler AFB, MS

960 training hours24 weeksUp to 15 semester hours recommended in Information Technology and Cybersecurity

Topics Covered

  • Network Security Fundamentals
  • Operating System Security (Windows/Linux)
  • Intrusion Detection and Prevention Systems
  • Vulnerability Assessment and Penetration Testing
  • Incident Response and Handling
  • Cryptography and Data Protection
  • Security Information and Event Management (SIEM)
  • Air Force Cybersecurity Policies and Procedures

Certification Pathways

Ready to Certify

Security+Certified Information Systems Security Professional (CISSP)

Partial Coverage

CompTIA Network+70% covered

Deeper dive into networking concepts, troubleshooting, and specific networking technologies.

CompTIA CySA+60% covered

More focus on security analytics, intrusion detection, and threat intelligence.

Certified Ethical Hacker (CEH)50% covered

Requires more in-depth knowledge of hacking techniques, penetration testing methodologies, and ethical hacking principles.

Recommended Next Certifications

Certified Information Security Manager (CISM)Project Management Professional (PMP)AWS Certified Security - Specialty

Technical Systems Translation

Military systems you've used and their civilian equivalents for your resume.

Military SystemCivilian Equivalent
Integrated Network Management System (INMS)SolarWinds Network Performance Monitor, ManageEngine OpManager
Automated Message Handling System (AMHS)Secure email gateways, such as Proofpoint or Mimecast
Defense Red Switch Network (DRSN)Cisco Unified Communications Manager with secure voice gateways
Information Technology Infrastructure Library (ITIL)ServiceNow, Jira Service Management
Remedy Action Request SystemZendesk, Freshservice
TACLANE EncryptorsCommercial VPNs with AES-256 encryption, such as those offered by Cisco or Juniper
Host Based Security System (HBSS)McAfee Endpoint Security, CrowdStrike Falcon

Ready to Translate Your Experience?

Our AI-powered translator converts your 1B073 experience into ATS-optimized civilian resume language.

Translate My Resume — Free