Security

UK armed forces fast-tracking cyber warriors to defend digital front lines

High starting salaries promised after public sector infosec pay criticized


The UK's Ministry of Defence (MoD) is fast-tracking cybersecurity specialists in a bid to fortify its protection against increasing attacks.

It's understood the plans are to fill up to 50 roles by the end of 2025, condensing the usual ten-week basic training program to just one month before three months of cyber-specialist training begins. Plans for a similar larger-scale effort are also in development for 2026.

New recruits, who must be educated to GCSE standard and demonstrate graduate-level aptitude, are being tempted into the training scheme with a £40,939 ($50,974) starting salary, one the MoD says is among the highest it offers for entry-level roles. They can also earn up to £25,000 ($31,132) in additional skills pay.

For context, the basic salary offered by the MoD for senior civil servants ranges between £21,460 and £76,490 ($26,734-95,244), per a February 2024 Freedom of Information request [PDF].

A report from the National Audit Office (NAO) last week highlighted the shortage of technical skills in the public sector, citing the remuneration packages on offer as a significant reason why it can't recruit the best people.

The Register looked around and saw a wide range of open positions at government departments. Heads of cyber operations were advertised with salaries of £68,568 ($85,330), for example, a shockingly low sum for such senior and mission-critical positions.

The MoD said the recruits' starting salaries will rise with time served and promotions.

Successful applicants will be placed into operational roles by the end of the year after the completion of their training. They'll either be based at the MoD's digital HQ in Corsham working on network and system security, or be drafted into the National Cyber Force in Samlesbury to carry out counter operations against adversaries.

Job duties include conducting penetration tests, simulating attacks to test defenses, and developing security strategies. The Royal Navy's website suggests recruits will be testing the security of tanks, missiles, fighter jets, and aircraft carriers.

The news comes amid rising numbers of attacks on the department. The MoD said it faced more than 90,000 "sub-threshold" attacks in the past two years, events involving tactics that don't meet the "war" classification.

"Fast-tracking cyber warriors into our military will help ensure our armed forces are better equipped to face our adversaries in the 21st century and defend the country from the changing threats we face," said Defence Secretary John Healey.

"After years of hollowing out, our government is making Britain secure at home and strong abroad, delivering on our Plan for Change and the hardworking British people."

The first round of fast-trackers will be overseen by the Royal Air Force and Royal Navy. The British Army also aims to take in expedited cyber specialists as the campaign continues into 2026.

The Navy says the role would be perfect for those who enjoy solving puzzles, are interested in safeguarding the country, and can think like a cybercriminal without becoming one.

Applicants aged 18-39 are eligible for the scheme and must be British nationals from birth. Naturalized citizens won't be accepted and applicants can't have held any other country's citizenship other than British or Irish.

They'll also have to pass each force's health and fitness criteria and a timed aptitude test, although they will never be based in the field or combat zones. You can see if you'd pass that using the RAF's test quiz. ®

Send us news
29 Comments

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Trump’s DoD CISO pick previously faced security clearance suspension

Hey, at least Katie Arrington brings a solid resume

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations

Polish space agency confirms cyberattack

Officials vow to uncover who was behind it

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Signal will withdraw from Sweden if encryption-busting laws take effect

Experts warned the UK’s recent 'victory' over Apple would kickstart something of a domino effect

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

US lawmakers press Trump admin to oppose UK's order for Apple iCloud backdoor

Senator, Congressman tell DNI to threaten infosec agreements if Blighty won't back down

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Hundreds of Dutch medical records bought for pocket change at flea market

15GB of sensitive files traced back to former software biz

Dems want answers on national security risks posed by hiring freeze, DOGE probes

Are cybersecurity roles included? Are Elon's enforcers vetted? Inquiring minds want to know