Showing its lack of relativity, the U.S. government recently announced their opening of the Cyber Threat Intelligence Integration Center. It’s not that an agency dedicated to Internet or network threats isn’t relative; it’s the fact that they have ‘Cyber’ in the name of the agency. Although I am not an Internet historian, I’m pretty sure that the term ‘Cyber’ went out of vogue sometime around the last episode of Beverly Hills 90210. But that’s not what you’re here for; you want to hear how you can become a cyber-agent for the U.S. government, right?
See Also: 6 WordPress Security Plugins
Become a government agent
The CTIIC will integrate intelligence from the NSA, the CIA, the Department of Defense, Homeland Security, the FBI, and the Department of Justice. If you already work for one of these agencies, it will give you a great opportunity to jump over to the newly established CTIIC. At the moment, the CIA is already hiring I.T. professionals. In fact, there is a position currently that involves cyber security.
How to become an agent
Due to the fact that your position will involve security, the first thing you can expect is a background check. Your background check has to come out squeaky clean or you won’t even be considered. The background check for some agencies might even involve interviewing people in your intimate social and family circle. They might even get in touch with exes to gauge your overall character.
It’s not going to be like Homeland or 24
Sure, the CIA and other agencies have clandestine operations and agents, but you probably won’t be part of that. The CTIIC’s role will be one of coordination and will not have operational obligations. No operational responsibilities means that you won’t be the one on the ground, but you will most likely oversee the people or agencies that are.
So, ultimately, what is the CTIIC?
As agencies are notorious for their inability or straight-up refusal to work amongst themselves, the CTIIC (much like the National Counterterrorism Center) will gather all information regarding cyber threats, regardless of agency, compile it and make it available for inspection. Hopefully, this role will streamline the process of threat assessment and threat neutralization.
So, I won’t be a geeky Jack Bauer?
No, you won’t be a hard-ass, bestubbled government agent with a stylized run, but you will help in keeping people safe against cyber-attacks. And it’s not a small threat in today’s Internet-enabled-everything age. In 2007, Estonia was subjected to a cyber-attack that, essentially, disabled heathcare databases, cellphone networks, and banking. Also, with more and more countries and international organizations creating Network Security teams (such as China’s Blue Army), the threat that they will be used not only defensively, but also offensively, is a real threat.
The threat can go beyond Facebook trolling
In 2010, an Iranian nuclear centrifuge system was damaged by a computer worm named Stuxnet, and as recently as 2014, a German Steel mill was hacked – its machinery got out of control and caused significant material damages. If anything works on any type of digital platform, it can be hacked; just check out the video above.
So, are going to try to be the last line of online defense for the U.S.? Let us know in the comment section below.