As @Teufel said, the best model is just to give these people a GS position with all the benny's. Otherwise you're bringing them in at O4/5/6 and giving them instant authority but little understanding of the culture. I admit my attitude has changed a little bit on this since I've been out and thought about it a little more. Direct commission works for a lot of fields, but even direct commission in the medical and nursing fields have to go through a lot of the standard Navy leadership courses, they're just not given the rank and authority without a strong support network. But it's been that way for how many hundred years now?
Can it work? Sure but with a metric shit-ton of growing pains. I don't know if you can take the medical model or the JAG model or new the others and just apply it to the field.
I suppose another idea is to bring them in as a warrant with big buck contracts and incentives and keep them out of the leadership structure and let them do the voodoo they do so well.
I'm a cybersecurity guy and I hate cybersecurity. Specifically, what the DoD does to an end user and especially to a SysAdmin. Despite being a former Signal Officer, I hate the power we've given to Signal/ Comm guys throughout the DoD. We've created a monster.
Last week's PKI flaw is a big deal, especially in the DoD. Some O-5 from CYBERCOM called me directly (how he obtained my number is anyone's guess, but...creepy) telling me I had to patch our systems. He sent an email to my leadership telling them the same thing. Patch the systems immediately...
...except the update wasn't even listed in SCCM (the server/ software that handles Windows updates at an enterprise level). When I pointed this out we were told to go "download it from Microsoft."
Yeah, no. That's not how any of this works. I had to stonewall an O-5 who sounded like he was snorting coke over a Microsoft update. This is what happens when you can't go infantry and aren't smart enough for medical or law school.
Now back to NIST 800-37...
I'm a cybersecurity guy and I hate cybersecurity. Specifically, what the DoD does to an end user and especially to a SysAdmin. Despite being a former Signal Officer, I hate the power we've given to Signal/ Comm guys throughout the DoD. We've created a monster.
Last week's PKI flaw is a big deal, especially in the DoD. Some O-5 from CYBERCOM called me directly (how he obtained my number is anyone's guess, but...creepy) telling me I had to patch our systems. He sent an email to my leadership telling them the same thing. Patch the systems immediately...
...except the update wasn't even listed in SCCM (the server/ software that handles Windows updates at an enterprise level). When I pointed this out we were told to go "download it from Microsoft."
Yeah, no. That's not how any of this works. I had to stonewall an O-5 who sounded like he was snorting coke over a Microsoft update. This is what happens when you can't go infantry and aren't smart enough for medical or law school.
Now back to NIST 800-37...
This is all I have to say about ARCYBER.
https://www.7sigcmd.army.mil/
The owner of www.7sigcmd.army.mil has configured their website improperly. To protect your information from being stolen, Firefox has not connected to this website.
Yeah, that's not the problem. Here it is in Edge.
View attachment 31682
It's actually because the authorization chain leads to a self-signed DOD certificate that civilian computers don't recognize as authoritative.
This is all I have to say about ARCYBER.
https://www.7sigcmd.army.mil/
The owner of www.7sigcmd.army.mil has configured their website improperly. To protect your information from being stolen, Firefox has not connected to this website.