The military is an impossible place for hackers, and what to do about it (2018)

Perceived changes since 2018

  • Cyber pay has improved somewhat; all branches have stronger cyber units and more prominent cyber reserve components.
  • New roles and tracks exist (e.g., cyber warrant officers, officer-level cyber roles in some services).
  • Public–private partnerships and contractor ecosystems have grown, partly to bridge internal skill and pay gaps.
  • Cyber Command remains a unified command, not a full branch, which commenters say limits authority and priority.

Pay, compensation, and retention

  • Many see pay as the dominant problem: contractor and startup roles often start around or above $200k, far beyond typical military or federal cyber salaries.
  • Others argue total compensation is closer than it looks once housing allowances, healthcare, and pensions are included, but note:
    • Pensions require 20 years; most don’t reach that.
    • Newer retirement systems are less generous.
  • Military career paths are “up or out”; strong technical people are pushed into management instead of rewarded for staying hands-on.

Contractors vs in-house talent

  • Government often pays multiples of a servicemember’s salary to contractors for tools similar to what internal teams can build.
  • Debate over whether government “can’t afford” top people if it can afford high-priced firms:
    • One side says legal pay caps and grade structures block competitive offers.
    • Another says this is a structural/authority issue, not actual budget scarcity.
  • Firms like Anduril and Palantir are criticized for hype and high margins, but also seen as more agile, able to fire underperformers, and to self-fund R&D.

Culture, structure, and fit for hackers

  • Several argue culture/structure is as big a problem as money: rigid hierarchy, mandatory moves, boot-camp style indoctrination, and difficulty firing poor performers.
  • Neurodiverse and “hacker mindset” people may clash with a system built on strict obedience and standardization.
  • Others note there are “white-collar” accession paths and lower physical standards for some specialties, and that many find service highly meaningful despite drawbacks.

Talent pipeline and skills

  • Commenters stress that effective cyber offense/defense usually requires strong engineering or CS foundations plus a specific problem-solving mindset; short training for non-technical recruits rarely suffices.
  • There is criticism of “interdisciplinary” or watered-down academic cybersecurity programs that produce graduates who struggle with basic tasks.

Suggested fixes

  • Ideas include: copying medic/nuclear pay models with big enlistment/retention bonuses, expanding cyber reserves and direct commissions, dedicated cyber ROTC, more upskilling opportunities, and even turning Cyber Command into its own branch, possibly following an Israeli-style public–private + reserve model.