WEBVTT 00:00:04.588 --> 00:00:07.424 line:90%,end (Lauritzen): I'm Sergeant Amy Lauritzen from Alliston, Ontario, 00:00:07.466 --> 00:00:09.510 line:10% a Cyber Operator currently posted 00:00:09.551 --> 00:00:13.514 line:10% to the Canadian Forces Network Operations Centre in Ottawa, Ontario. 00:00:19.728 --> 00:00:23.690 line:90%,end - Cyber Operators monitor Canadian Armed Forces communication and data networks 00:00:23.732 --> 00:00:27.986 line:90%,end on a 24/7 basis to meet the operational requirements of the Army, 00:00:28.111 --> 00:00:31.490 line:90%,end Navy, Air Force, and Special Forces. 00:00:32.658 --> 00:00:37.120 line:90%,end Their work includes collecting, processing and analyzing network data, 00:00:37.246 --> 00:00:39.373 line:90%,end identifying network vulnerabilities, 00:00:39.498 --> 00:00:41.834 line:90%,end and managing computer network environments. 00:00:42.584 --> 00:00:45.045 line:90%,end They conduct defensive cyber operations, 00:00:45.170 --> 00:00:46.880 line:90%,end and when required and where feasible, 00:00:47.005 --> 00:00:50.217 line:90%,end launch active cyber operations to secure their networks. 00:00:51.134 --> 00:00:54.721 line:90%,end - Cyber operators defend Canadian information systems 00:00:54.847 --> 00:00:56.640 line:90%,end from hostile threat actors 00:00:56.765 --> 00:01:00.143 line:90%,end by implementing security procedures 00:01:00.185 --> 00:01:03.939 line:90%,end and hunting for malicious activity on the network. 00:01:04.064 --> 00:01:09.069 line:90%,end - Cyber Operators work with extremely sensitive information in a high-security environment, 00:01:09.194 --> 00:01:12.072 line:10% typically within restricted-access facilities. 00:01:12.197 --> 00:01:15.367 line:90%,end - At the Canadian Forces Network Operations Centre, 00:01:15.492 --> 00:01:20.706 line:90%,end we are the first and last line of defence for military networks. 00:01:20.831 --> 00:01:23.667 line:90%,end We're the pointy end in the cyber domain, 00:01:23.709 --> 00:01:26.461 line:90%,end so we're analogous to the Army 00:01:26.587 --> 00:01:28.714 line:90%,end who's out on the battlefield fighting. 00:01:28.839 --> 00:01:32.092 line:90%,end We're the ones in the trenches fighting in the cyber domain. 00:01:32.217 --> 00:01:35.179 line:90%,end It's going to be even more important as time goes on 00:01:35.220 --> 00:01:38.724 line:90%,end because we're constantly under attack in the cyber domain, 00:01:38.765 --> 00:01:42.686 line:90%,end and when you find something and you've been looking for it for a while, 00:01:42.811 --> 00:01:44.271 line:90%,end it's pretty exciting. 00:01:44.396 --> 00:01:48.233 line:90%,end - Cyber Operators work collaboratively with other government departments and agencies, 00:01:48.358 --> 00:01:50.319 line:90%,end as well as with Canada's allies 00:01:50.360 --> 00:01:53.947 line:90%,end to enhance the Department of National Defence and the Canadian Armed Forces' ability 00:01:54.072 --> 00:01:56.783 line:90%,end to provide a secure cyber environment. 00:01:56.825 --> 00:01:59.286 line:90%,end (Lauritzen): Anyone who likes problem-solving 00:01:59.328 --> 00:02:02.331 line:90%,end and thinks in a sort of logical way 00:02:02.456 --> 00:02:03.916 line:90%,end will do well in this environment. 00:02:07.044 --> 00:02:08.170 line:90%,end - Good job. - Alright. 00:02:12.174 --> 00:02:13.967 line:90%,end (Lauritzen): For me, the coolest part of the job 00:02:14.092 --> 00:02:16.762 line:90%,end is you're always doing something different. 00:02:16.887 --> 00:02:20.390 line:90%,end You get a lot of chances to expand your own knowledge. 00:02:20.516 --> 00:02:22.434 line:90%,end SCB host.exe 00:02:22.976 --> 00:02:25.270 line:90%,end The people I work with in the Cyber trade 00:02:25.312 --> 00:02:28.941 line:90%,end are some of the smartest people I've ever met in my life. 00:02:28.982 --> 00:02:31.109 line:90%,end They're all really motivated, 00:02:31.151 --> 00:02:33.153 line:90%,end they're all really, really nice, 00:02:33.278 --> 00:02:36.281 line:90%,end very supportive of everything that you do. 00:02:42.788 --> 00:02:44.873 line:90%,end - Cyber Operators serve in the sea, 00:02:44.998 --> 00:02:46.834 line:90%,end land or air environment, 00:02:46.875 --> 00:02:49.753 line:90%,end and on deployed operations around the world. 00:02:49.795 --> 00:02:51.964 line:90%,end They can also be employed in exchange positions 00:02:52.005 --> 00:02:53.924 line:90%,end as part of personnel exchange programs 00:02:53.966 --> 00:02:58.220 line:90%,end with the armed forces of the United States or other allied nations. 00:02:58.345 --> 00:03:00.639 line:90%,end - You'll never be like, just assigned a big task 00:03:00.681 --> 00:03:04.351 line:90%,end and then left on your own, especially when you're a new person. 00:03:04.476 --> 00:03:06.895 line:90%,end You'll also get chances very early 00:03:06.937 --> 00:03:10.607 line:90%,end to give your input on how you think things could be better. 00:03:21.326 --> 00:03:25.038 line:90%,end My career in the military so far, it's been very challenging. 00:03:25.163 --> 00:03:27.416 line:90%,end I got to do a lot of really cool things. 00:03:27.541 --> 00:03:31.712 line:90%,end I've learned a lot of really interesting technical concepts. 00:03:31.837 --> 00:03:34.506 line:90%,end I've met a lot of really smart people 00:03:34.631 --> 00:03:37.092 line:90%,end and we're all just sort of working towards the same goal. 00:03:37.217 --> 00:03:39.553 line:90%,end And we're all there because it matters.