The military is an impossible place for hackers, and what to do about it (2018)
Perceived changes since 2018
- Cyber pay has improved somewhat; all branches have stronger cyber units and more prominent cyber reserve components.
- New roles and tracks exist (e.g., cyber warrant officers, officer-level cyber roles in some services).
- Public–private partnerships and contractor ecosystems have grown, partly to bridge internal skill and pay gaps.
- Cyber Command remains a unified command, not a full branch, which commenters say limits authority and priority.
Pay, compensation, and retention
- Many see pay as the dominant problem: contractor and startup roles often start around or above $200k, far beyond typical military or federal cyber salaries.
- Others argue total compensation is closer than it looks once housing allowances, healthcare, and pensions are included, but note:
- Pensions require 20 years; most don’t reach that.
- Newer retirement systems are less generous.
- Military career paths are “up or out”; strong technical people are pushed into management instead of rewarded for staying hands-on.
Contractors vs in-house talent
- Government often pays multiples of a servicemember’s salary to contractors for tools similar to what internal teams can build.
- Debate over whether government “can’t afford” top people if it can afford high-priced firms:
- One side says legal pay caps and grade structures block competitive offers.
- Another says this is a structural/authority issue, not actual budget scarcity.
- Firms like Anduril and Palantir are criticized for hype and high margins, but also seen as more agile, able to fire underperformers, and to self-fund R&D.
Culture, structure, and fit for hackers
- Several argue culture/structure is as big a problem as money: rigid hierarchy, mandatory moves, boot-camp style indoctrination, and difficulty firing poor performers.
- Neurodiverse and “hacker mindset” people may clash with a system built on strict obedience and standardization.
- Others note there are “white-collar” accession paths and lower physical standards for some specialties, and that many find service highly meaningful despite drawbacks.
Talent pipeline and skills
- Commenters stress that effective cyber offense/defense usually requires strong engineering or CS foundations plus a specific problem-solving mindset; short training for non-technical recruits rarely suffices.
- There is criticism of “interdisciplinary” or watered-down academic cybersecurity programs that produce graduates who struggle with basic tasks.
Suggested fixes
- Ideas include: copying medic/nuclear pay models with big enlistment/retention bonuses, expanding cyber reserves and direct commissions, dedicated cyber ROTC, more upskilling opportunities, and even turning Cyber Command into its own branch, possibly following an Israeli-style public–private + reserve model.