WEBVTT
00:00:04.588 --> 00:00:07.424 line:90%,end
(Lauritzen): I'm Sergeant Amy Lauritzen
from Alliston, Ontario,
00:00:07.466 --> 00:00:09.510 line:10%
a Cyber Operator currently posted
00:00:09.551 --> 00:00:13.514 line:10%
to the Canadian Forces Network
Operations Centre in Ottawa, Ontario.
00:00:19.728 --> 00:00:23.690 line:90%,end
- Cyber Operators monitor Canadian Armed Forces
communication and data networks
00:00:23.732 --> 00:00:27.986 line:90%,end
on a 24/7 basis to meet
the operational requirements of the Army,
00:00:28.111 --> 00:00:31.490 line:90%,end
Navy, Air Force, and Special Forces.
00:00:32.658 --> 00:00:37.120 line:90%,end
Their work includes collecting,
processing and analyzing network data,
00:00:37.246 --> 00:00:39.373 line:90%,end
identifying network vulnerabilities,
00:00:39.498 --> 00:00:41.834 line:90%,end
and managing computer network environments.
00:00:42.584 --> 00:00:45.045 line:90%,end
They conduct defensive cyber operations,
00:00:45.170 --> 00:00:46.880 line:90%,end
and when required and where feasible,
00:00:47.005 --> 00:00:50.217 line:90%,end
launch active cyber operations
to secure their networks.
00:00:51.134 --> 00:00:54.721 line:90%,end
- Cyber operators defend
Canadian information systems
00:00:54.847 --> 00:00:56.640 line:90%,end
from hostile threat actors
00:00:56.765 --> 00:01:00.143 line:90%,end
by implementing security procedures
00:01:00.185 --> 00:01:03.939 line:90%,end
and hunting for malicious activity on the network.
00:01:04.064 --> 00:01:09.069 line:90%,end
- Cyber Operators work with extremely sensitive
information in a high-security environment,
00:01:09.194 --> 00:01:12.072 line:10%
typically within restricted-access facilities.
00:01:12.197 --> 00:01:15.367 line:90%,end
- At the Canadian Forces
Network Operations Centre,
00:01:15.492 --> 00:01:20.706 line:90%,end
we are the first and last line
of defence for military networks.
00:01:20.831 --> 00:01:23.667 line:90%,end
We're the pointy end in the cyber domain,
00:01:23.709 --> 00:01:26.461 line:90%,end
so we're analogous to the Army
00:01:26.587 --> 00:01:28.714 line:90%,end
who's out on the battlefield fighting.
00:01:28.839 --> 00:01:32.092 line:90%,end
We're the ones in the trenches
fighting in the cyber domain.
00:01:32.217 --> 00:01:35.179 line:90%,end
It's going to be even more important
as time goes on
00:01:35.220 --> 00:01:38.724 line:90%,end
because we're constantly under attack
in the cyber domain,
00:01:38.765 --> 00:01:42.686 line:90%,end
and when you find something
and you've been looking for it for a while,
00:01:42.811 --> 00:01:44.271 line:90%,end
it's pretty exciting.
00:01:44.396 --> 00:01:48.233 line:90%,end
- Cyber Operators work collaboratively
with other government departments and agencies,
00:01:48.358 --> 00:01:50.319 line:90%,end
as well as with Canada's allies
00:01:50.360 --> 00:01:53.947 line:90%,end
to enhance the Department of National Defence
and the Canadian Armed Forces' ability
00:01:54.072 --> 00:01:56.783 line:90%,end
to provide a secure cyber environment.
00:01:56.825 --> 00:01:59.286 line:90%,end
(Lauritzen): Anyone who likes problem-solving
00:01:59.328 --> 00:02:02.331 line:90%,end
and thinks in a sort of logical way
00:02:02.456 --> 00:02:03.916 line:90%,end
will do well in this environment.
00:02:07.044 --> 00:02:08.170 line:90%,end
- Good job.
- Alright.
00:02:12.174 --> 00:02:13.967 line:90%,end
(Lauritzen): For me, the coolest part of the job
00:02:14.092 --> 00:02:16.762 line:90%,end
is you're always doing something different.
00:02:16.887 --> 00:02:20.390 line:90%,end
You get a lot of chances
to expand your own knowledge.
00:02:20.516 --> 00:02:22.434 line:90%,end
SCB host.exe
00:02:22.976 --> 00:02:25.270 line:90%,end
The people I work with in the Cyber trade
00:02:25.312 --> 00:02:28.941 line:90%,end
are some of the smartest people
I've ever met in my life.
00:02:28.982 --> 00:02:31.109 line:90%,end
They're all really motivated,
00:02:31.151 --> 00:02:33.153 line:90%,end
they're all really, really nice,
00:02:33.278 --> 00:02:36.281 line:90%,end
very supportive of everything that you do.
00:02:42.788 --> 00:02:44.873 line:90%,end
- Cyber Operators serve in the sea,
00:02:44.998 --> 00:02:46.834 line:90%,end
land or air environment,
00:02:46.875 --> 00:02:49.753 line:90%,end
and on deployed operations around the world.
00:02:49.795 --> 00:02:51.964 line:90%,end
They can also be employed in exchange positions
00:02:52.005 --> 00:02:53.924 line:90%,end
as part of personnel exchange programs
00:02:53.966 --> 00:02:58.220 line:90%,end
with the armed forces of the United States
or other allied nations.
00:02:58.345 --> 00:03:00.639 line:90%,end
- You'll never be like,
just assigned a big task
00:03:00.681 --> 00:03:04.351 line:90%,end
and then left on your own,
especially when you're a new person.
00:03:04.476 --> 00:03:06.895 line:90%,end
You'll also get chances very early
00:03:06.937 --> 00:03:10.607 line:90%,end
to give your input on how you think
things could be better.
00:03:21.326 --> 00:03:25.038 line:90%,end
My career in the military so far,
it's been very challenging.
00:03:25.163 --> 00:03:27.416 line:90%,end
I got to do a lot of really cool things.
00:03:27.541 --> 00:03:31.712 line:90%,end
I've learned a lot of really
interesting technical concepts.
00:03:31.837 --> 00:03:34.506 line:90%,end
I've met a lot of really smart people
00:03:34.631 --> 00:03:37.092 line:90%,end
and we're all just sort of working
towards the same goal.
00:03:37.217 --> 00:03:39.553 line:90%,end
And we're all there because it matters.