An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

News | Oct. 19, 2018

My DCMA: Cybersecurity team

By Elizabeth Szoke DCMA Public Affairs

Editor's note: The closed captioning function at the Defense Visual Information Distribution Service, where this video is being streamed from, is currently experiencing technical difficulties. A transcript of the video is provided below, as captioning may not be working properly. We apologize for the inconvenience.

My name is Winston Barnett.

I’m Thomas Clark.

This is my DCMA.

And this is my DCMA.

I’ve been with DCMA for two years. I am the branch chief overseeing the cyber forensics and Insider Threat piece. We do all the forensics work that you need – at least the cyber effects of it – as well as dealing with Insider Threat cases.

I’ve been here for about a year now and I am the chief of the Offensive Security Team. We do offensive capabilities – penetration testing. Pretty much we look like the adversary. We attack things, such as simple work stations all the way to critical assets.

Before I was just the tech guy and they would say, whereas here, I’m the branch chief, and there’s all the extra parts of it. And now, instead of just sitting around doing the work and just zoning out, I have to be aware of all the different moving pieces going around.

Our division is really good for engineers, good for analysts. Our leader, Mr. King, he helps us achieve the mission. He gives us the mission sets; he gives us approval; and he allows us to execute.

If somebody is interested in this job, you really have to live this. You have to go home; you have to study, and you always have to be on the material that is most common, the most up to date information.

Figure out what part of cybersecurity you want to work for. If it’s cybersecurity, if it’s IT – figure out which part of that.

Find your niche that you would enjoy doing and then really put an effort in to develop your skillset.

You can’t usually wait for somebody to come to you and be like, “hey, you need to learn this.”

You need to learn it before everybody else, and that’s the key to offensive security.

You have to know it before the adversary or you’re not really doing the mission, you’re just doing replays from what has already happened.