New Cohort Starts:

Donate

9975 Career Guide

Marine Corps

9975: Information Computer Security Specialist

Career transition guide for Marine Corps Information Computer Security Specialist (9975)

Translate Your 9975 Experience Now

Get a personalized AI-powered translation of your military experience into civilian resume language.

Start Free Translation

Tech Roles You Could Aim For

Real industry tech roles your 9975 background maps to — picked from BLS-anchored occupations using your training, cognitive skills, and systems experience.

Security Engineer

Security

SOC 15-1212
High match

Your experience as an Information Computer Security Specialist directly aligns with the responsibilities of a Security Engineer. Your expertise in enforcing security requirements, analyzing violation reports, and maintaining security documentation translates to designing, implementing, and managing security systems. You have hands-on familiarity with Security Information and Event Management (SIEM) systems and vulnerability management platforms.

Typical stack:

Networking and OS internalsCryptography fundamentalsThreat modelingCloud security (IAM, VPC)Code review for security

SOC Analyst

Security

SOC 15-1212
High match

Your role as the focal point for security matters and your experience in preparing violation reports make you a strong candidate for a SOC Analyst. Your understanding of incident response and your ability to analyze security incidents are directly applicable to monitoring and responding to security events in a Security Operations Center.

Typical stack:

SIEM platforms (Splunk, Elastic, Sentinel)Network protocolsEndpoint and log analysisMITRE ATT&CK familiarityIncident-response runbooks

Governance, Risk & Compliance Analyst

Security

SOC 15-1212
Good match

Your experience in preparing and maintaining computer security documentation in support of system accreditations and regulatory requirements aligns with the responsibilities of a Governance, Risk & Compliance (GRC) Analyst. Your knowledge of the Risk Management Framework (RMF) and procedural compliance is valuable for ensuring an organization adheres to security policies and regulations.

Typical stack:

Frameworks (NIST, ISO 27001, SOC 2)Risk-assessment methodologyAudit evidence collectionPolicy writingStakeholder communication

DevOps Engineer

DevOps / Platform

SOC 15-1244
Moderate match

Your experience with system modeling and your ability to analyze intricate systems are valuable skills for a DevOps Engineer. Learning cloud technologies, containerization and orchestration, and CI/CD pipelines will bridge the gap between your security background and the development and operations aspects of DevOps.

Typical stack:

CI/CD tooling (GitHub Actions, GitLab, Jenkins)Infrastructure as Code (Terraform, Pulumi)Containers (Docker, Kubernetes)Cloud platforms (AWS, GCP, Azure)Linux

Skills You Already Have

Concrete bridges from 9975 experience to tech-industry practice.

  • Networking FundamentalsNetwork Security
  • Operating System SecurityLinux System Administration
  • Risk Management Framework (RMF)Compliance Frameworks (e.g., NIST, ISO 27001)
  • Adversarial ThinkingThreat Modeling
  • Security Information and Event Management (SIEM) systemsSecurity Information and Event Management (SIEM) systems (e.g., Splunk, QRadar)
  • Information Assurance Vulnerability Management (IAVM)Vulnerability management platforms

Skills to Learn

The concrete gap to bridge — specific to the roles above, not generic.

Python scripting for security automationCloud security fundamentals (AWS, Azure, or GCP)Intrusion detection and prevention systems (IDS/IPS)SIEM technologies (Splunk, QRadar)Cloud technologies (AWS, Azure, or GCP)Containerization and orchestration (Docker, Kubernetes)CI/CD pipelines (Jenkins, GitLab CI)

How VWC fits

Vets Who Code accelerates the parts we teach — software engineering fundamentals, web development, AI tooling. For everything else above, the path is doable independently with the resources we link to.

See VWC Programs

Civilian Career Pathways

Top civilian roles for 9975 veterans, with average salary and market demand data.

Information Security Analyst

$105K
High matchVery high demand

Cybersecurity Engineer

$125K
High matchVery high demand

Skills to develop:

Cloud security certifications (e.g., AWS Certified Security, Azure Security Engineer)DevSecOps principles

IT Risk Manager

$130K
Good matchHigh demand

Skills to develop:

Certified Information Systems Auditor (CISA)Understanding of risk management frameworks (e.g., NIST, ISO 27001)

Compliance Officer

$95K
Good matchGrowing demand

Skills to develop:

Knowledge of specific industry regulations (e.g., HIPAA, GDPR, PCI DSS)Legal and regulatory frameworks

Computer Systems Auditor

$85K
Moderate matchStable demand

Skills to develop:

Certified Information Systems Auditor (CISA)Data analytics toolsAuditing methodologies

Salary estimates from VWC career data

Hidden Strengths

Cognitive skills your 9975 training built — and where they transfer.

Adversarial Thinking

As an information security specialist, you're constantly anticipating and defending against potential cyber threats, thinking like an attacker to identify vulnerabilities.

This translates to a strong ability to identify risks and weaknesses in any system, process, or plan, allowing you to proactively prevent problems.

Procedural Compliance

You rigorously adhere to security protocols and regulations, ensuring all systems and personnel meet stringent standards.

This demonstrates your unwavering commitment to following established guidelines and maintaining order, crucial for regulated industries.

System Modeling

You develop a deep understanding of complex IT systems, enabling you to identify vulnerabilities and implement effective security measures.

This showcases your ability to analyze and understand intricate systems, a valuable asset in any field that requires problem-solving and strategic thinking.

Situational Awareness

You constantly monitor the security landscape, staying alert to potential threats and vulnerabilities to protect sensitive information.

This translates to a heightened awareness of your surroundings and the ability to anticipate potential problems, crucial for risk management and decision-making.

Non-Obvious Career Matches

Compliance Officer

SOC 13-1041.00

You've been meticulously enforcing security protocols and regulations, a direct parallel to ensuring a company adheres to legal and ethical standards.

Fraud Investigator

SOC 13-2091.00

You've been thinking like an attacker to anticipate and defend against cyber threats. This is exactly the mindset needed to uncover fraudulent activities and protect assets.

Emergency Management Specialist

SOC 29-1129.00

You've been coordinating contingency and backup plans, ensuring systems are resilient in the face of disruptions. This translates directly to planning for and responding to various types of emergencies.

Training & Education Equivalencies

Marine Corps Communication-Electronics School, Twentynine Palms, CA

320 training hours8 weeksUp to 6 semester hours recommended

Topics Covered

  • Networking Fundamentals
  • Operating System Security
  • Cybersecurity Principles
  • Risk Management Framework (RMF)
  • Incident Response
  • Security Auditing
  • Data Protection and Privacy

Certification Pathways

Partial Coverage

CompTIA Security+70% covered

While the 9975 role provides strong security fundamentals, studying specific CompTIA Security+ exam topics like cryptography, network security, and risk management frameworks will be necessary.

Certified Information Systems Security Professional (CISSP)40% covered

The 9975 role provides a foundation in security principles, but the CISSP requires a broader and deeper understanding of all eight domains of information security, including legal, compliance, and business continuity planning.

Certified Ethical Hacker (CEH)30% covered

The 9975 role focuses on defensive security. CEH requires study of offensive security techniques, including penetration testing methodologies and common attack vectors.

Recommended Next Certifications

Certified Information Security Manager (CISM)GIAC Security Leadership (GSLC)AWS Certified Security - SpecialtyCertified Cloud Security Professional (CCSP)

Technical Systems Translation

Military systems you've used and their civilian equivalents for your resume.

Military SystemCivilian Equivalent
Assured Compliance Assessment Solution (ACAS)Vulnerability scanners (e.g., Nessus, Rapid7, Qualys)
Host Based Security System (HBSS)Endpoint Detection and Response (EDR) solutions (e.g., CrowdStrike, SentinelOne)
Marine Corps Enterprise Network (MCEN)Enterprise network management and security infrastructure
Risk Management Framework (RMF)Compliance frameworks (e.g., NIST, ISO 27001)
Security Information and Event Management (SIEM) systems (e.g., Splunk)Security Information and Event Management (SIEM) systems (e.g., Splunk, QRadar)
Information Assurance Vulnerability Management (IAVM)Vulnerability management platforms

Ready to Translate Your Experience?

Our AI-powered translator converts your 9975 experience into ATS-optimized civilian resume language.

Translate My Resume — Free