WOMOS 170A CYBER Operations Technician
WOMOS Description
Cyber Operations warrant officers supervise and manage the execution of Cyberspace Defense; Cyberspace Intelligence, Surveillance, and Reconnaissance (ISR); Cyberspace Operational Preparation of the Environment (OPE); and Cyberspace Attack actions. They direct, plan, administer, manage, and integrate actions in support of offensive and defensive cyberspace operations. They lead personnel and sections and manage the training of personnel on the planning, administrating, managing, maintaining, integrating, and operating in specified operational environment. They develop policy recommendations and provide technical guidance and advice to commanders and staffs on the management and operation of Army, Joint, intergovernmental, interagency, and multinational implications and applications of offensive and defensive cyberspace operations. They provide technical expertise to integrate cyberspace operations with war fighting functions. The Cyber Operations Technician must understand relationships, teamwork, and interpersonal dynamics and have the ability to integrate these concepts to achieve cyber effects. They must be the consummate professional; self-motivated and self-disciplined, and live the Army values. The Cyber Operations Technician must possess the ability to build concise products. For more information on WOMOS 170A, see this Army website.

National Certifications
The following civilian credentials are related to WOMOS 170A. These credentials may require additional education, training or experience. For more information about these credentials, click on the credential title below.
Compare | Credential | Agency | Related As | CA Eligible | Attainability | Star | GI Bill® | Accreditation | ID | |
---|---|---|---|---|---|---|---|---|---|---|
CompTIA Linux+ Is Not In Demand | Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
||||
CompTIA Network+ ce
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
||||
Certified Information Systems Security Professional (CISSP)
![]() |
International Information Systems Security Certification Consortium, Inc. (ISC)² | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||
Red Hat Certified Engineer (RHCE)
![]() |
Red Hat, Inc. | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Certified Incident Handler (GCIH)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified Intrusion Analyst (GCIA)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||
GIAC Certified UNIX Security Administrator (GCUX)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
||||
GIAC Certified Windows Security Administrator (GCWN) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Information Security Professional (GISP) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
GIAC Security Expert (GSE) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
Systems Security Certified Practitioner (SSCP)
![]() |
International Information Systems Security Certification Consortium, Inc. (ISC)² | ![]() |
![]() |
![]() |
![]() |
|||||
CompTIA Security+ ce
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
![]() |
||||
GIAC Certified Forensics Analyst (GCFA)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||
Certified Ethical Hacker (CEH)
![]() |
International Council of Electronic Commerce Consultants (EC-Council) | ![]() |
![]() |
![]() |
![]() |
|||||
Certified Security Analyst (ECSA)
![]() |
International Council of Electronic Commerce Consultants (EC-Council) | ![]() |
![]() |
|||||||
Cisco Certified Network Professional (CCNP) Security
![]() |
Cisco Systems, Inc. | ![]() |
![]() |
![]() |
![]() |
|||||
Data Center Design Consultant (DCDC) Is Not In Demand | BICSI | ![]() |
![]() |
|||||||
CompTIA Advanced Security Practitioner (CASP+)
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Web Application Penetration Tester (GWAPT)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Reverse Engineering Malware (GREM) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
|||||
Certified Information Professional (CIP) Is Not In Demand | Association for Information and Image Management (AIIM) | ![]() |
![]() |
|||||||
GIAC Certified Forensic Examiner (GCFE)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Global Industrial Cyber Security Professional (GICSP)
![]() |
Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
CompTIA Cloud+ ce
![]() |
Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
|||||
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
GIAC Continuous Monitoring Certification (GMON) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
GIAC Network Forensic Analyst (GNFA) Is Not In Demand | Global Information Assurance Certification (GIAC) | ![]() |
![]() |
![]() |
||||||
CompTIA Cybersecurity Analyst (CySA+) Is Not In Demand | Computing Technology Industry Association (CompTIA) | ![]() |
![]() |
![]() |
![]() |
|||||
Cisco Certified CyberOps Associate Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
![]() |
||||||
Cisco Certified Network Associate (CCNA) Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
![]() |
||||||
Cisco Certified Network Professional (CCNP) Enterprise Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
![]() |
||||||
Cisco Certified Internetwork Expert (CCIE) Enterprise Infrastructure Is Not In Demand | Cisco Systems, Inc. | ![]() |
![]() |
![]() |
State Licensure
Some states have specific licensing requirements for the following related civilian occupations. These state licenses may require additional education, training or experience. Click on the occupation below to get more information on state requirements from the U.S. Department of Labor.
Related Civilian Occupations
The following civilian occupations are similar to the duties performed by WOMOS 170A-CYBER Operations Technician. These occupations may require additional education, training or experience. For more information about these occupations, click on the civilian occupation below. To search for related civilian job opportunities, go to the Veteran’s Employment Center.
Civilian Job | Duties Matched | Bright Outlook | Registered Apprenticeship | Local Salary Info | |
---|---|---|---|---|---|
Computer and Information Systems Managers |
![]() |
![]() |
![]() |
![]() |
|
Computer Network Support Specialists |
![]() |
![]() |
![]() |
||
Information Security Analysts |
![]() |
![]() |
![]() |
||
Network and Computer Systems Administrators |
![]() |
![]() |
Other Career Considerations
A wide range of civilian job opportunities is available within the private and public sectors that align with WOMOS 170A CYBER Operations Technician military training and experience. More information about these opportunities and other considerations concerning occupations related to WOMOS 170A can be found below.
Cyber Security
Cyber Security
There are opportunities to use cyber security skills in the law enforcement field. Information on cyber security in the federal workforce can be found on the following agency websites:
Department of Homeland Security (DHS)
2020: IT Specialist
Overview: This job series covers positions responsible for providing support, guidance, and expertise in various Information Technology (IT) functions. Specialty areas include IT Policy Planning, Information Security, Customer Support, Network Services, Enterprise Architecture, Systems Analyst, Applications Software, Operating Systems, Data Management, Internet and Systems Administration. Work performed by the IT specialist varies and is dependent on the job field of each IT specialist.
Duties at CBP: Work within this job series requires an Information Technology (IT) Specialist to perform a variety of duties that involve knowledge of a wide variety of IT application, systems, and methods; ability to apply methods and practices for troubleshooting IT system issues to include issues such as network, database, customer inquiries, and knowledge of IT system security regulations, policies and procedures. Typical work assignments vary based on parenthetical/job fields listed above but duties may include:
- Providing advice and guidance on a wide range and variety of IT issues;
- Planning, analyzing, developing, implementing, maintaining and enhancing information systems security programs, policies, procedures and tools;
- Assisting in the installation and integration of system patches, repairs, updates, and enhancements to ensure the delivery of IT services;
- Installing, configuring, integrating, troubleshooting, optimizing and maintaining customer hardware and software to maximize system availability and monitors network performance.
Locations: Various; DC Metro Area
Intelligence and Defense Careers
The IntelligenceCareers.gov website provides a portal to information on intelligence and defense related career opportunities to explore.
Troops to Tech
Troops to Tech Careers is a program created by CompTIA to provide opportunities and resources for Veterans interested in a career in the information technology (IT) field. Troops to Tech Careers is a collaboration between CompTIA, educational institutions and training organizations, and corporate employers to provide Veterans with an opportunity to Learn-Certify-Work. Veterans can locate education and training centers nationwide that will help them plan an IT career pathway and identify training courses they may need to prepare for a related IT certification. On the employer side, Troops to Tech Careers maintains a corporate registry listing companies that have made a commitment to prioritize hiring IT certified Veterans. Additional information about the program can be found at the Troops to Tech Careers website.
In addition to obtaining certifications in your field, advanced education is another way to enhance job performance.
Continuing Education
Enlisted Soldiers and Warrant Officers can review Associate and Bachelor degrees in their assigned military discipline, technical field, or leadership to assist in a clear pathway to completing a degree.
For help in making informed choices on schools and education programs when using tuition assistance, see: