AOC 17B Cyber and Electronic Warfare Officer
AOC Description
Cyber Electromagnetic Operations (CEO O) Officers lead, direct, manage, plan, integrate, coordinate, and conduct cyberspace operations and EW at brigade, division, corps, Army, and Joint levels, to include JIIM environments. The 17B serves as the principal staff officer for cyberspace and EW operations, leveraging specified DCO and OCO missions and EW functions in support of ULO objectives. Employ offensive and defensive cyberspace capabilities with the primary purpose of achieving objectives in and through the cyberspace domain. The 17B executes EA, EP, and ES functions to deliver capabilities in support of Army and JIIM operations. The 17B supervises offensive cyberspace, defensive cyberspace, and EW operations teams, organizations, and personnel, primarily focused on conducting operations at echelons corps and below while ensuring integration and synchronization of Army and Joint cyberspace and EW capabilities.

National Certifications
The following civilian credentials are related to AOC 17B. These credentials may require additional education, training or experience. For more information about these credentials, click on the credential title below.
Compare | Credential | Agency | Related As | CA Eligible | Attainability | GI Bill® | Accreditation | ID | |
---|---|---|---|---|---|---|---|---|---|
CompTIA Network+ ce
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
Certified Information Systems Security Professional (CISSP)
![]() |
International Information Systems Security Certification Consortium, Inc. (ISC)² | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
Certified Wireless Network Administrator (CWNA)
![]() |
Certified Wireless Network Professional (CWNP) | ![]() |
![]() |
![]() |
![]() |
||||
Certified Wireless Network Expert (CWNE)
![]() |
Certified Wireless Network Professional (CWNP) | ![]() |
![]() |
![]() |
![]() |
||||
GIAC Certified Incident Handler (GCIH)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified Intrusion Analyst (GCIA)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Security Expert (GSE) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
||||
GIAC Security Essentials Certification (GSEC)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
Systems Security Certified Practitioner (SSCP)
![]() |
International Information Systems Security Certification Consortium, Inc. (ISC)² | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
CompTIA Security+ ce
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified Forensics Analyst (GCFA)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
||||
CERT - Certified Computer Security Incident Handler (CSIH) Is Not In Demand | CERT - Software Engineering Institute | ![]() |
![]() |
![]() |
![]() |
||||
Certified Ethical Hacker (CEH)
![]() |
International Council of Electronic Commerce Consultants (EC-Council) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
Certified Security Analyst (ECSA)
![]() |
International Council of Electronic Commerce Consultants (EC-Council) | ![]() |
![]() |
||||||
Certified Wireless Security Professional (CWSP)
![]() |
Certified Wireless Network Professional (CWNP) | ![]() |
![]() |
![]() |
![]() |
||||
Cisco Certified Network Professional (CCNP) Security
![]() |
Cisco Systems, Inc. | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified Penetration Tester (GPEN)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
CompTIA Advanced Security Practitioner (CASP+)
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified Enterprise Defender (GCED)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Reverse Engineering Malware (GREM) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
||||
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
|||||
GIAC Critical Controls Certification (GCCC) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
|||||
GIAC Continuous Monitoring Certification (GMON) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
|||||
GIAC Network Forensic Analyst (GNFA) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
||||||
GIAC Python Coder (GPYC) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
|||||
CompTIA Cybersecurity Analyst (CySA+) Is Not In Demand | Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
||||
CyberSec First Responder (CFR) Is Not In Demand | CertNexus (formerly Logical Operations) | ![]() |
![]() |
![]() |
![]() |
||||
Information Technology Security (ITS) Is Not In Demand | Electronics Technicians Association, International (ETA-I) | ![]() |
![]() |
![]() |
|||||
Certified Network Defender (CND) Is Not In Demand | International Council of Electronic Commerce Consultants (EC-Council) | ![]() |
![]() |
![]() |
![]() |
||||
CompTIA PenTest+ Is Not In Demand | Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
||||
Cisco Certified DevNet Associate Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
||||||
Cisco Certified DevNet Professional Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
![]() |
State Licensure
Some states have specific licensing requirements for the following related civilian occupations. These state licenses may require additional education, training or experience. Click on the occupation below to get more information on state requirements from the U.S. Department of Labor.
Related Civilian Occupations
The following civilian occupations are similar to the duties performed by AOC 17B-Cyber and Electronic Warfare Officer. These occupations may require additional education, training or experience. For more information about these occupations, click on the civilian occupation below. To search for related civilian job opportunities, go to the Veteran’s Employment Center.
Civilian Job | Duties Matched | Bright Outlook | Registered Apprenticeship | Local Salary Info | |
---|---|---|---|---|---|
Chief Executives |
![]() |
![]() |
|||
Computer and Information Systems Managers |
![]() |
![]() |
![]() |
![]() |
|
Computer Network Support Specialists |
![]() |
![]() |
![]() |
||
Information Security Analysts |
![]() |
![]() |
![]() |
||
Network and Computer Systems Administrators |
![]() |
![]() |
Related Federal Occupations
The following federal occupations are similar to AOC 17B-Cyber and Electronic Warfare Officer. These occupations may require additional education, training or experience. For more information about these occupations, click on the federal occupation below.
Other Career Considerations
A wide range of civilian job opportunities is available within the private and public sectors that align with AOC 17B Cyber and Electronic Warfare Officer military training and experience. More information about these opportunities and other considerations concerning occupations related to AOC 17B can be found below.
Cyber Security
Cyber Security
There are opportunities to use cyber security skills in the law enforcement field. Information on cyber security in the federal workforce can be found on the following agency websites:
Intelligence and Defense Careers
The IntelligenceCareers.gov website provides a portal to information on intelligence and defense related career opportunities to explore.
Intelligence Work
There is a wide range of job opportunities available within the U.S. Intelligence Community for information technologists, scientists, engineers, and crypto-, signals and imagery analysts. Individuals leaving the military with training and experience in the intelligence area will find positions that closely align with their military training and experience.
Agencies in the U.S. Intelligence Community include:
- Defense Intelligence Agency
- National Security Agency
- National Geospatial-Intelligence Agency (NGA)
- Department of State Bureau of Intelligence and Research
- Central Intelligence Agency
- Federal Bureau of Investigation
- Department of Homeland Security
In addition, there are other intelligence components within the U.S. Intelligence Community associated with the Departments of Energy and Treasury as well as all branches of the military services. Due to the nature of these positions, U.S. citizenship and background checks are required. Other prerequisites may include age, medical or psychological examinations, and drug testing.
Troops to Tech
Troops to Tech Careers is a program created by CompTIA to provide opportunities and resources for Veterans interested in a career in the information technology (IT) field. Troops to Tech Careers is a collaboration between CompTIA, educational institutions and training organizations, and corporate employers to provide Veterans with an opportunity to Learn-Certify-Work. Veterans can locate education and training centers nationwide that will help them plan an IT career pathway and identify training courses they may need to prepare for a related IT certification. On the employer side, Troops to Tech Careers maintains a corporate registry listing companies that have made a commitment to prioritize hiring IT certified Veterans. Additional information about the program can be found at the Troops to Tech Careers website.
In addition to obtaining certifications in your field, advanced education is another way to enhance job performance.
Continuing Education
For those designated as part of the Cyberspace IT/Cybersecurity Workforce (Cyber IT/CSWF), continuing education may be required to maintain Cyber IT/CSWF certifications. Resources for continuing education are provided below.
- CompTIA Continuing Education Information:
- CompTIA Continuing Education User Guide
- CompTIA Continuing Education Checklist
- Continuing Education Program and Certification Renewal Policy FAQs
- Continuing Education Overview Presentation (PowerPoint)
- Process for approving course content for continuing education credit
- Pre-Approved Training Courses for CompTIA Continuing Education Units
- CompTIA CEU Assessment App
- Additional resources for continuing education:
- Link to DoD Cyber Exchange (formerly Education, Training and Awareness on DISA)
- Link to Virtual Training (FedVTE) website
For help in making informed choices on schools and education programs when using tuition assistance, see: