Military IT jobs focus on the use, repair and upkeep of computer and telecommunications systems.
There are 8 military careers in this industryInterested in cyber careers? Take the Cyber Challenge
Communications equipment operators are responsible for generating, transmitting, tracking, and routing military communications. They operate sophisticated, state-of-the-art, electronic receivers and associated analysis and recording equipment to collect airborne, shipborne, land-based Radio Detection and Ranging (RADAR), and other signals within the electromagnetic spectrum. They use this equipment to communicate a wide range of information, including operational plans and the transmission of classified information. They may perform limited operator maintenance.
Communication managers plan, build, secure, operate, and defend communications networks. They oversee the development and maintenance of policies and plans that are essential to operational success. They may supervise the encryption and decryption process and appropriate routing of sensitive communications.
Cyber-operations specialists conduct offensive and defensive cyberspace operations in support of the full range of military options. They utilize devices, computer programs, and techniques designed to create an effect across cyberspace. Offensive operations involve applying force to target enemy and hostile adversary activities and capabilities. Defensive operations are conducted to protect data, networks, and net-centric capabilities by detecting, identifying, and responding to attacks from external forces.
Cyber warfare officers command crews in the use of cyber offensive tactics to target enemy or hostile adversary capabilities. They oversee mission planning, preparation, and crew training to ensure operational readiness. Cyber warfare officers operate cyberspace systems and direct crews in the use of these systems.
Document security specialists safeguard sensitive material and arrange for delivery by courier. They provide adequate protection for material from receipt through delivery or storage; prepare classified correspondence; and manage administrative functions and security procedures for various security programs (e.g., Special Security Program, Sensitive Compartmented Information Security Program).
Geospatial imaging specialists perform the collection, analysis, and dissemination of geospatial imagery to support war fighting operations and other activities. They operate geographic information systems (GIS) that store and analyze maps and other geographic information. Intelligence derived by the geospatial imaging specialist is critical for mission success at the national, theater, and tactical levels. As such, they disseminate multi-sensor geospatial intelligence products to appropriate parties.
Network and database administrators develop, install, operate, and maintain the Military’s computer networks and databases. They monitor system performance and make sure the appropriate personnel have access to data. They are responsible for supporting operating systems and managing the software and hardware necessary for usage. They may also develop computer programs utilizing computer language. They perform administrative duties including providing user support to military personnel.
Signals intelligence specialists oversee the collection and exploitation of electromagnetic signals, including communication and non-communication signals. They operate sophisticated equipment to gather, sort, and scan intercepted foreign communications and non-communications. They identify and process the intercepted signals and perform analysis to establish target identification and operational patterns. Using this information, they produce combat, strategic, and tactical intelligence reports.