Establishment of new intel MOS - 35Q

goon175

Ranger
Verified SOF
Joined
Dec 27, 2010
Messages
1,803
Location
Jedi Center of Excellence
SSMP
SOF Mentor
See below message that was put out.

SUBJECT: Establishment of Enlisted Military Occupational Specialty (MOS) 35Q,
Cryptologic Network Warfare Specialist CMF 35
1. THIS IS AN IMMEDIATE MESSAGE, and is valid for 2 years from date of
publication unless rescinded or superseded.
2. References:
a. AR 611-21 Military Occupational Classification and Structure located in
the Human Resources Command (HRC) SMARTBOOK.
b. Notification of Future Change to DA Pam 611-21, E-1210-03 Establishment
of Military Occupational Specialist (MOS) 35Q (Cryptologic Network Warfare),
dated 18 January 2012.
3. The purpose of this message is to announce the establishment of Enlisted
Military Occupational Specialty (MOS) 35Q, Cryptologic Network Warfare
Specialist CMF 35.
4. Training seats are available for qualified applicants shipping after 1
October 2012. This applies to Regular Army (RA) only.
5. Major Duties: Performs initial cryptologic digital analysis to establish
target identification and operational patterns; identifies, reports, and
maintains Intelligence information in support of Commander’s Intelligence
Requirements; uses technical references to analyze information. Operates
automated data processing (ADP) equipment for both remote and local collection,
processing and reporting. Develops and maintains analytical and operational
working aids and databases to support target collection, identification, and
location. Prepares technical products and time sensitive reports in support of
Cryptologic Network Warfare operations.
6. Cryptologic cyber analysts must possess the following qualifications:
(1) Physical demand rating of light.
(2) A physical profile of 222221.
(3) Normal color vision.
(4) Qualifying scores.
(a) A minimum score of 109 in aptitude area ST in Armed Services
Vocational Aptitude Battery (ASVAB) tests administered prior to 2 January
2002.
(b) A minimum score of 105 in aptitude area ST on ASVAB tests
administered on and after 2 January 2002.
(5) The Soldier must meet TOP SECRET (TS) Sensitive Compartmented
Information (SCI) access eligibility requirements to be awarded MOS.

(6) Soldier must be capable of passing a counterintelligence scope polygraph
(CSP) to hold the MOS. Test is administered at Fort Huachuca AZ, Soldiers who
refuse to take or fail a CSP will be reclassified.
(7) A high school graduate or equivalent prior to entry on active duty.
(8) Never been a member of the U.S. Peace Corps, except as specified in
AR 614-200 (para 3-2).
(9) No information in military personnel, Provost Marshal, intelligence, or
medical records that would prevent the granting of a security eligibility under
AR 380-67 (para 3.401.a).
(10) No record of conviction by court-martial.
(11) No record of conviction by a civil court for any offense other than
minor traffic violations.
(12) Must be a U.S. citizen.
 
No, it's been out for a few months now. INSCOM is looking for any 35-series willing to reclass and attend JCAC. Huge bucks on the outside.
 
XXXXXXXXXXXXXXXXXXXXXXXXXXX


POST AN INTRO BEFORE YOU POST ON THE BOARD AS PER THE RULES YOU SIGNED.
 
35Q's learn all things cyber.

The US Department of Defense defines computer network operations (CNO) as comprising three types of operations: computer network attack, computer network defense, and related computer
network exploitation-enabling operations.
Computer network attack (CNA) refers to operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Computer network exploitation (CNE) consists of enabling operations and intelligence collection to gather data from target or adversary computers and networks in support of CNA. Computer network defense (CND) consists of defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. In short, CND refers to operations that protect against adversary CNA/E.
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA484697
 
What a great time to be young.

Damn I'm old! My first computer course was on card readers. Today they are scanning credit cards on a cell phone. When I was in high school this was high tech.
punch_card.75dpi.rgb.gif
 
The official MILPER message for those who are not currently working in the area of focus of the 35Q MOS (which will require reclass) will be released in 1-2 weeks according to the MI Branch. An official MILPER message was released last week concerning transition for those who currently possess the N6 ASI or similar training. Since it is FOUO, I am only providing the link for CAC holders: https://www.hrc.army.mil/Milper/12-173 There is an assessment test that can be taken, the procedures for taking the test are also outline in the MILPER message.

For those who are not holding the N6 ASI or similar training, you must meet the same eligibility requirements, including a mandatory CSP (CI Scope Polygraph) in conjunction with a TS/SCI, before training due to the sensitivity of the training. I currently meet all the requirements except the Polygraph, but I will have one complete prior to the MILPER message release. I personally have been trying to get into Cyber Warfare for over a year now, but I was told to hold off because of this new MOS.

While at my current unit, I became a Certified Ethical Hacker, Certified Network Defense Architect, Microsoft Certified Technology Specialist, and CompTIA Security+ and Network+ certified, I have been to class for CISSP, CCNA, ITILv3/2011, etc, and I am almost a semester away from my Associates of Science in Computer Info. Science with a Major in Network Security, all while maintaining 6 duty positions (LAN Manager, SA, IAM, KMO, Web Author...basically the Automations Manager and Senior Tech) and spending 4-6 months each year for the past 2.5 years at field exercises. All of this has been a great learning experience when combined together, and I would have been ETSing as a 21 year old SPC in 6 months after completing my 3.5 year service obligations, but I decided to use my skills and experience to do what I enjoy in support of our nation's defense in the new Cyber arena although I already had opportunities with other employers. (I'm not saying this to boast/brag, I'm saying this to encourage others, because if I can do it anyone can).

If you have the desire to learn, do the same while you can do most of this on the Army's dime. I had to study for and take the Certified Ethical Hacker exam out of my own pocket because it was not indoctrinated by DoD 8570.1 -m as a baseline requirement at the time I took the exam (it is now however).

Good luck to anyone who does want to pursue this MOS, make sure you keep a lookout on HRC's MILPER messaging system for further guidance. This is only what I have discovered through my time and research.
 
That is an amazing amount of training and opportunity. I don't think you will have a hard time finding employment (in the military or out) any time soon. Other guys who are just entering or have recently entered military service should take note of what is possible if you have the ambition, motivation, and drive to take advantage of what the military has to offer.
 
Damn I'm old! My first computer course was on card readers. Today they are scanning credit cards on a cell phone. When I was in high school this was high tech.

There were card readers that read stone tablets?

US CyberCom? US CyberCom Staff Course? New MI Warrent field? National CybePatriot Program? ONLY a 105 GT? This is starting to make the fielding of the PsyOps career field look good. CINCCyber HAS got to be a Combat Arms officer to bring some sanity to all this.
 
Back
Top