FORT KNOX, Ky. – 7th Regiment, Basic Camp (CIET) Cadets explored the different branches of the Army during Branch Orientation at Keys Park August 7.
Branch Orientation allows Cadets to receive information on the different branches of the Army to see which fits their interests and skills best. Some of which included, field artillery, engineering, quartermaster, infantry and transportation.
However, the Cyber Branch sparked a great deal of interest as it is the newest developed branch of the Army.
Cpt. Scott Smith, a Cyber Branch presenter out of the Cyber Protection Brigade in Fort Gordon, Georgia, says the Cyber Branch is complex and important.
“Cyber Branch is a huge development in our military history. It is the Army’s commitment to developing a workforce that operates solely within the cyberspace domain. The Army has been working in cyberspace for a number of years now but to insure that United States remains dominant in this new domain we to create a workforce solely devoted to it,” said Smith.
Cdt. Victoria Wang, Santa Clara University, looks forward to honing her skills in the Cyber domain to pursue the Cyber Branch upon commissioning.
“I’m now a computer science major, and as I get further into my degree, opportunities in the army for Cyber are opening up. The army isn’t just physical fighting, it’s just as important to have a presence behind the scenes in gathering intel and protecting America in cyberspace,” said Wang.
If Cadets are interested in the Cyber Branch, Cpt. Smith says they need to know more than a simple understanding of cyber communication.
“Any Cadet that is in any sort of information technology major is desired, as is a type of STEM major, but not required. Cyber Branch is really looking for Cadets who have some hands on experience and a current working knowledge of the cyberspace domain,” Smith added. “They need to have an understanding of all the layers like networking, coding, systems and applications. However, beyond a simply understanding, they must know enough to be able to abuse how the systems operate to identify when they are compromised. They also must be eligible for a top secret clearance.”