U.S.A. Cyber Warrior Scholarship Program
Presented by the
The 2011 (ISC)²® Global Information Security Workforce Study indicated for the first time the enormity of the gap between demand for cyber security workers and supply. The 2013 study, conducted by Frost & Sullivan, in partnership between (ISC)² Foundation and Booz Allen Hamilton, shows the top five skill sets lacking are security analyst, security engineer with skills in planning/design or application, security auditor, and security architect. United States Military veterans who are returning to the civilian workforce provide a viable pool of motivated, intelligent professionals with a solid work ethic. However, this talent pool needs training and placement assistance to ease their transition into the civilian workforce. The U.S.A. Cyber Warrior Scholarship, presented in a partnership between (ISC)² Foundation and the program sponsor Booz Allen Hamilton, will provide recipients of this scholarship with training, textbooks, phone application-enabled study materials, certification testing and placement assistance of qualified* returning veterans who served in the United States Military. Beginning May 1, 2015 the program is available to military spouses of veterans who have transitioned out of the military or who are a surviving spouse. This program will focus on six (ISC)² certifications that will better position returning veterans to transition into the civilian workforce: SSCP®, CISSP®, CAP®, CCFPSM, HCISPPSM, and CSSLP®.
The U.S.A. Cyber Warrior Scholarship assists transitioning veterans and their spouses who are interested in attaining certification, easing their transition into the civilian workforce and building a career in information or cyber security.
Those wishing to enter the information/cybersecurity field and those at entry level are encouraged to apply.
Download Veteran Application Please email: Scholarships@isc2.org if you are unable to access the application.
Download Military Spouse Application Please email: Scholarships@isc2.org if you are unable to access the application.
There will be three (3) application periods:
Period 1: May 1, 2014 - September 22, 2014 Discharge dates must be between 5/1/2009 and 9/1/2014 - Closed
Period 2: October 1, 2014 - January 31, 2015 Discharge dates must be between 10/7/2001 and 1/31/2015
Period 3: May 1, 2015 - August 1, 2015 Discharge dates must be between 10/7/2001 and 8/22/2015 - Now Open
Foundation Director Julie Peeler on ABC7's Government Matters
Numerous job ratings within the military require security certification under DOD 8570, however many service men and women perform tasks that would prepare them for work in information security if they received additional training. Individuals qualifying for the U.S.A. Cyber Warrior Scholarship would need to have performed certain IT-related functions while in the service. Military spouse applicants must have performed certain IT related functions in their educational or professional career. A list of those functions is included in the application form.
Applications will be reviewed by a panel of information security professionals and members from (ISC)2 and Booz Allen Hamilton. Panelists may include current or former military personnel. The program partners are seeking candidates with an information technology or security background who indicate a passion for information/cyber security, merit and financial need. Merit can be indicated with leadership qualities, integrity, a willingness to mentor others, and an ability to learn quickly and apply concepts appropriately. Not all applicants will be awarded a U.S.A. Cyber Warrior Scholarship.
Testimonial from Bryan Johnson - Midvale, Utah
"I just wanted to express my gratitude to (ISC)² and Booz Allen for the opportunity I had to participate in the 2013 Cyber Warrior Scholarship program. I was in the first group to receive the scholarship, and I used the materials provided and the training generously donated to study and pass the CISSP exam. Having this certification will provide me with a critical foundation to my Information Assurance career. I am blessed to have served in the military and continue to serve the government sector in information security.
With the education received and the continued work on certifications I know that I will be successful in the Cyber workforce, and in helping defend and preserve the freedoms we all enjoy. I was able to provide feedback to nextgov.com on my experience and would recommend that anyone who fits the qualification and is interested in providing a critical service to the government or private sector, take advantage of any opportunities available. Thanks again for the support, all my best."
*Note: To use XFA-based PDF forms on Firefox and Chrome, perform the following steps to configure Firefox and Chrome to open PDFs using Adobe Reader or Adobe Acrobat.
Ensure that you have Adobe Reader or Adobe Acrobat installed on your machine.
1. In Firefox, choose
Tools > Options.
2. In the Options dialog, click
3. In the Applications tab, type
PDF in the search field.
4. For Portable Document Format (PDF) content type in the searchresult, select
Use Adobe Acrobat (in Firefox) from the Action drop-down list.
6. Restart Firefox.
1. In Chrome, go to
Disable under Chrome PDF Viewer, and click Enable under Adobe PDF Plug-In.
For more information, see Adobe PDF plug-in documentation by Google.
Applications Accepted Until Midnight on Monday, September 22, 2014
NBC 4 Washington, DC - Watch (ISC)² Director of Government Affairs Dan Waddell provide some cybersecurity tips for parents on NBC Washington for Safer Internet Day 2015.
• Watch the clip
The Telegraph - See the incredible progress that (ISC)² Foundation Safe and Secure Online volunteers in the UK have made in The Telegraph article celebrating Safer Internet Day.
• Read the article
CIO Asia - (ISC)² Foundation opens applications for 2015 Women’s Information Security Scholarships and Faculty Exam Vouchers.
• Read the article
Download to learn more