November 10, 2017 By Joe Hamblin 2 min read

IBM Security understands the value of the cybersecurity training many military service members receive while on active duty. Retired military veterans with this type of experience can hit the ground running and bring a unique and valuable perspective to security teams in all kinds of industries.

U.S. Air Force veteran Travis Hawker joined IBM after his active duty ended. Below, he shares insights he gained from his experience transitioning from military service to a civilian career in cybersecurity.

Advice From Veteran Travis Hawker

Throughout any military career, active duty members face many challenges. Initial military training, deployments and switching duty stations all introduce stress into an already unique professional life.

With three deployments, nine moves and one short tour throughout my career in the U.S. Air Force, I’ve had my share of stress. However, for me, nothing was more challenging than dealing with the realization that my time in the Air Force was ending and, upon retirement, I would have to transition to civilian life — a situation I had never dealt with as a military brat (child of a military member) or active duty member.

In Search of Core Values

I asked myself: What am I going to do for work? Where am I going to live? Who am I going to work for? These are unique decisions I didn’t often have the opportunity to make while on active duty. Once I was faced with the prospect of choosing for myself, I found it necessary to take a step back and determine what I was looking for in that new career.

Throughout this transition from military to civilian life, I found that the core values and principles traditionally inherent to life within the U.S. Air Force were not necessarily ingrained throughout the civilian sector — integrity, teamwork and tradition, to name a few. Finding an organization outside the military that adheres to similar values and principles became paramount to me, and proved to be surprisingly difficult.

A Seamless Transition

Luckily, having floated through a few positions upon retirement, I finally settled down at IBM and could not be happier. The team has been nothing but supportive, and my position as an IBM cybersecurity solutions representative has allowed me to work for an organization that prides itself on enabling customers to realize their goals through hard work, teamwork and putting the customer first.

I have now found a home at a world-class organization with the core values, principles and traditions I was searching for. Thanks to IBM, I was able to seamlessly transition the skills and experiences I gained on active duty to my cybersecurity career and help the Air Force solve some of its toughest problems.

More from Government

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Updated SBOM guidance: A new era for software transparency?

3 min read - The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains.In December 2023, the National Security Agency (NSA) published new guidance to help organizations incorporate SBOMs and combat the threat of supply chain attacks.Let’s look at how things have developed since Biden’s 2021 order and what these updates mean for…

Roundup: Federal action that shaped cybersecurity in 2023

3 min read - As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level.These stories highlight the challenges federal agencies faced in securing digital infrastructure in the past year and explore the evolving nature of cyber threats, as well as the innovative responses required to address them.New White House cybersecurity strategyThe White House’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today