%3CLINGO-SUB%20id%3D%22lingo-sub-1555124%22%20slang%3D%22en-US%22%3E%5BGuest%20Blog%5D%20My%20Journey%20from%20the%20Marine%20Corps%20to%20Cybersecurity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1555124%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20article%20was%20written%20by%20Microsoft%20employee%20Vishal%20Amin%20who%20shares%20about%20how%20he%20transitioned%20from%20a%20career%20as%20a%20Fighter%20Pilot%20and%20Special%20Operations%20Officer%20to%20Cybersecurity%20Specialist%20at%20Microsoft.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E64KB%20of%20data%20storage%20and%20memory.%3C%2FSTRONG%3E%20On%20the%20eve%20of%20my%20military%20career%20retirement%20that%20was%2020%20years%20in%20the%20making%2C%20I%20looked%20at%20my%20common%20access%20card%20and%20realized%20that%20this%203.370%20x%202.125%20inch%20card%20I%20was%20holding%20was%20the%20%3CEM%3Esingle%3C%2FEM%3E%20piece%20of%20authentication%20that%20validated%20my%20career%20to%20the%20outside%20world.%20Somehow%2C%20the%20Marine%20Corps%20managed%20to%20fit%20my%20life%20and%20my%2020%20years%20of%20service%20onto%20a%20card%20that%20was%20merely%200.030%20inches%20thick%20with%20only%2064kB%20of%20data%20storage%20and%20memory.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20you%20might%20ask%2C%20why%20Microsoft%2C%20why%20cybersecurity%3F%20Well%2C%20in%20my%20story%20that%20is%20precisely%20where%20Identity%2C%20Security%20and%20the%20%22Human%22%20intersect.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206303i6F05610858DA9A5A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20alt%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20remember%20that%20day%20vividly.%20On%20March%2021%3CSUP%3Est%3C%2FSUP%3E%20of%202015%2C%20the%20Islamic%20State%20Hacking%20Division%20released%20an%20order%20to%20target%20100%20individuals%20operating%20against%20them.%20In%20the%20same%20order%2C%20they%20also%20released%20the%20whereabouts%2C%20pictures%20and%20personal%20identities%20of%20each%20individual%20-%20%3CSTRONG%3EI%20was%20one%20of%20those%20who%20was%20identified%3C%2FSTRONG%3E.%26nbsp%3B%20The%20thrill%20of%2036%2C000%20pounds%20of%20thrust%20from%20the%20fighter%20jet%20cockpit%20of%20a%20McDonnell%20Douglas%20F%2FA-18%20Hornet%2C%20the%20privilege%20of%20leading%20our%20men%20and%20women%20in%20service%2C%20and%20my%20own%20personal%20aspirations%20of%20continued%20servant%20leadership%20seemingly%20grounded%20to%20a%20complete%20halt.%20%3CSTRONG%3EThe%20ability%20to%20collaborate%20and%20engage%20my%20peers%2C%20to%20serve%20my%20country%20and%20most%20importantly%2C%20protect%20my%20family%20were%20stripped%20from%20my%20control%20by%20way%20of%20data%20ownership%20and%20identity%20compromise.%3C%2FSTRONG%3E%26nbsp%3BI%20had%20navigated%20a%20purposeful%20and%20fulfilling%20career%2C%20layered%20behind%20the%20most%20physically%20secure%20and%20digitally%20sound%20barriers%20our%20nation%20had%20the%20ability%20to%20provide.%20%3CSTRONG%3EYet%2C%20in%20a%20push%20of%20a%20button%2C%20a%20simple%20human%20event%20compromised%20the%20single%20most%20important%20piece%20of%20me%20-%20my%20identity.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20years%20following%20the%20incident%2C%20I%20was%20constantly%20in%20a%20heightened%20state%20of%20awareness%20and%20alarm%20-%20imagine%20having%20to%20be%20always%20mindful%20of%20suspicious%20unmarked%20vehicles%20outside%20your%20home%2C%20the%20safety%20of%20your%20family%2C%20and%20the%20ability%20to%20live%20a%20normal%20life%20without%20fear%20of%20physical%20or%20digital%20harm.%20%3CSTRONG%3EThis%20was%20my%20new%20normal.%3C%2FSTRONG%3E%26nbsp%3BFor%20me%2C%20this%20single%20event%20critically%20defined%20%3CSTRONG%3Ehow%20the%20human%20element%20is%20the%20core%20to%20security%20and%20protecting%20our%20identities%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%E2%80%83%3C%2FP%3E%0A%3CP%3ERealizing%20that%20the%20most%20important%20decisions%20we%20make%20in%20life%20are%20not%20tied%20to%20our%20wallets%2C%20but%20rather%20how%20we%20truly%20impact%20those%20around%20us%20and%20under%20our%20influence%2C%20I%20decided%20to%20dedicate%20the%20remainder%20of%20my%20life%20and%20career%20to%20Cybersecurity.%26nbsp%3B%20For%20many%2C%20Cybersecurity%20is%20a%20monetary%20investment%20and%20a%20layer%20of%20protection%20or%20insurance%20on%20our%20valuable%20digital%20estate.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%223.jpg%22%20style%3D%22width%3A%20332px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F210145iCE1017CF969A67AE%2Fimage-dimensions%2F332x221%3Fv%3D1.0%22%20width%3D%22332%22%20height%3D%22221%22%20title%3D%223.jpg%22%20alt%3D%223.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%225.jpg%22%20style%3D%22width%3A%20331px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F210148iD2B8A23E930E5B2B%2Fimage-dimensions%2F331x221%3Fv%3D1.0%22%20width%3D%22331%22%20height%3D%22221%22%20title%3D%225.jpg%22%20alt%3D%225.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EFor%20a%20select%20few%2C%3CSTRONG%3E%20Cybersecurity%20is%20how%20we%20empower%20people%20and%20organizations%20to%20positively%20impact%20the%20world%20in%20their%20unique%20and%20innovative%20ways%3C%2FSTRONG%3E%2C%20without%20fear%20or%20repercussion.%20Microsoft's%20mission%20to%20%3CSTRONG%3Eempower%20every%20person%20and%20every%20organization%20on%20the%20planet%3C%2FSTRONG%3E%20to%20achieve%20more%20is%20precisely%20the%20reason%20I%20chose%20Microsoft%2C%20and%20specifically%2C%20Cybersecurity%20within%20Microsoft.%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fajohnsocyber%3Fref_src%3Dtwsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAnn%20Johnson%3C%2FA%3E%2C%20CVP%20of%20Cybersecurity%20Business%20Development%20-%20someone%20I%20admire%20and%20continue%20to%20learn%20from%20at%20Microsoft%20-%20shared%20a%20few%20impactful%20thoughts%20with%20me%20personally%20before%20I%20began%20my%20career%20at%20Microsoft.%20She%20also%20published%20them%20in%20an%20article%20from%20CYBERCRIME%20MAGAZINE%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%E2%80%9CBut%20if%20all%20the%20people%20in%20your%20security%20team%20think%20the%20same%20way%2C%20you%E2%80%99re%20missing%20out%20on%20the%20diversity%20of%20understanding%20and%20problem-solving%20that%20a%20wider%20group%20of%20approaches%20and%20experiences%20would%20bring.%20We%20need%20to%20avoid%20the%20risk%20of%20group%20think%2C%20and%20that%E2%80%99s%20best%20done%20by%20having%20teams%20that%20come%20from%20different%20backgrounds%2C%20with%20varied%20experiences%20that%20help%20them%20find%20new%20answers%20to%20problems.%20%3CSTRONG%3ENot%20only%20do%20you%20need%20different%20viewpoints%20to%20get%20creative%20solutions%3A%20you%20may%20not%20even%20notice%20some%20of%20the%20areas%20you%E2%80%99re%20neglecting%2C%20because%20you%20can%E2%80%99t%20tackle%20what%20you%20don%E2%80%99t%20know%20about%3C%2FSTRONG%3E.%E2%80%9D%20%E2%80%93%20Ann%20Johnson%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMy%20journey%20to%20Microsoft%20was%20certainly%20not%20traditional%2C%20and%20I%20can%20only%20assume%20that%20same%20sentiment%20holds%20true%20for%20many%20others%20in%20their%20journey%20here.%20Looking%20back%20at%20the%2064KB%20common%20access%20card%20I%20was%20issued%2C%20I%20realize%20that%20the%20authentication%20and%20validation%20that%20card%20provided%20could%20only%20be%20weaponized%20by%20the%20humans%20with%20malicious%20intent%20behind%20it.%20It's%20our%20job%20as%20humans%20pledging%20to%20use%20tech%20for%20good%20-%20and%20not%20evil%20-%20to%20defend%20against%20that.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhat%20can%20you%20do%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EInvest%20in%20the%20people%2C%20the%20human.%20Look%20for%20talents%20in%20the%20places%20you%20least%20expect%20to.%20They%20will%20reciprocate%20that%20investment%20in%20you%20and%20your%20organization.%20My%20career%20and%20choice%20to%20invest%20in%20Microsoft%20was%20not%20simply%20a%20%22transition%22%2C%20but%20a%20%3CEM%3Ejourney%3C%2FEM%3E.%20For%20those%20on%20their%20own%20journeys%20and%20navigating%20their%20careers%20in%20an%20uncertain%2C%20changing%20and%20evolving%20world%2C%20I%20challenge%20you%20to%20%3CSTRONG%3Einvest%20in%20passions%3C%2FSTRONG%3E.%26nbsp%3B%20For%20me%2C%20Cybersecurity%20is%20not%20merely%20a%20job%2C%20but%20an%20entire%20frame%20of%20mind%20and%20a%20way%20of%20life.%20The%20investment%20that%20I%20choose%20to%20make%20in%20my%20passion%20has%20allowed%20me%20to%20diversify%20the%20way%20I%20view%20security.%20That%20same%20investment%20has%20now%20allowed%20me%20to%20grow%20in%20my%20career%20at%20Microsoft.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAsk%20yourself%3A%20How%20are%20you%20investing%20in%20your%20future%2C%20your%20passions%2C%20and%20most%20importantly%2C%20yourself%3F%20When%20that%20answer%20comes%20to%20mind%2C%20go%20do%20that%20thing.%20You%20will%20not%20regret%20it.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%23HumansofIT%3C%2FP%3E%0A%3CP%3E%23CareerJourneys%3C%2FP%3E%0A%3CP%3E%23MilitaryVeteransinTech%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1555124%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206303i6F05610858DA9A5A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20alt%3D%22Screen%20Shot%202020-07-19%20at%2010.13.38%20PM.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThis%20article%20was%20written%20by%20Microsoft%20employee%20Vishal%20Amin%20who%20shares%20about%20how%20he%20transitioned%20from%20a%20career%20as%20a%20Fighter%20Pilot%20and%20Special%20Operations%20Officer%20to%20Cybersecurity%20Specialist%20at%20Microsoft.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1555124%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECareer%20Journeys%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Ecybersecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMilitary%20Veterans%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1567565%22%20slang%3D%22en-US%22%3ERe%3A%20%5BGuest%20Blog%5D%20My%20Journey%20from%20the%20Marine%20Corps%20to%20Cybersecurity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1567565%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20first%20part%20of%20story%20was%20scary.%3C%2FP%3E%3CP%3EBut%20it%20ends%20up%20well.%3C%2FP%3E%3CP%3ETechnologies%20like%20RMS%20are%20my%20favorite%20and%20you%20from%20what%20you%20shared%2C%20cybersecurity%20is%26nbsp%3B%3CSTRONG%3Enot%3C%2FSTRONG%3E%20just%20about%20protecting%20resources%20%2C%20devices%20and%20business%20but%20it%20is%20also%20about%20protecting%20human%20life.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

This article was written by Microsoft employee Vishal Amin who shares about how he transitioned from a career as a Fighter Pilot and Special Operations Officer to Cybersecurity Specialist at Microsoft.

 

64KB of data storage and memory. On the eve of my military career retirement that was 20 years in the making, I looked at my common access card and realized that this 3.370 x 2.125 inch card I was holding was the single piece of authentication that validated my career to the outside world. Somehow, the Marine Corps managed to fit my life and my 20 years of service onto a card that was merely 0.030 inches thick with only 64kB of data storage and memory.

 

So you might ask, why Microsoft, why cybersecurity? Well, in my story that is precisely where Identity, Security and the "Human" intersect.

 

Screen Shot 2020-07-19 at 10.13.38 PM.png

 

I remember that day vividly. On March 21st of 2015, the Islamic State Hacking Division released an order to target 100 individuals operating against them. In the same order, they also released the whereabouts, pictures and personal identities of each individual - I was one of those who was identified.  The thrill of 36,000 pounds of thrust from the fighter jet cockpit of a McDonnell Douglas F/A-18 Hornet, the privilege of leading our men and women in service, and my own personal aspirations of continued servant leadership seemingly grounded to a complete halt. The ability to collaborate and engage my peers, to serve my country and most importantly, protect my family were stripped from my control by way of data ownership and identity compromise. I had navigated a purposeful and fulfilling career, layered behind the most physically secure and digitally sound barriers our nation had the ability to provide. Yet, in a push of a button, a simple human event compromised the single most important piece of me - my identity.

 

The years following the incident, I was constantly in a heightened state of awareness and alarm - imagine having to be always mindful of suspicious unmarked vehicles outside your home, the safety of your family, and the ability to live a normal life without fear of physical or digital harm. This was my new normal. For me, this single event critically defined how the human element is the core to security and protecting our identities.

Realizing that the most important decisions we make in life are not tied to our wallets, but rather how we truly impact those around us and under our influence, I decided to dedicate the remainder of my life and career to Cybersecurity.  For many, Cybersecurity is a monetary investment and a layer of protection or insurance on our valuable digital estate.

 

 3.jpg5.jpg 

 

For a select few, Cybersecurity is how we empower people and organizations to positively impact the world in their unique and innovative ways, without fear or repercussion. Microsoft's mission to empower every person and every organization on the planet to achieve more is precisely the reason I chose Microsoft, and specifically, Cybersecurity within Microsoft. Ann Johnson, CVP of Cybersecurity Business Development - someone I admire and continue to learn from at Microsoft - shared a few impactful thoughts with me personally before I began my career at Microsoft. She also published them in an article from CYBERCRIME MAGAZINE:

 

“But if all the people in your security team think the same way, you’re missing out on the diversity of understanding and problem-solving that a wider group of approaches and experiences would bring. We need to avoid the risk of group think, and that’s best done by having teams that come from different backgrounds, with varied experiences that help them find new answers to problems. Not only do you need different viewpoints to get creative solutions: you may not even notice some of the areas you’re neglecting, because you can’t tackle what you don’t know about.” – Ann Johnson

 

My journey to Microsoft was certainly not traditional, and I can only assume that same sentiment holds true for many others in their journey here. Looking back at the 64KB common access card I was issued, I realize that the authentication and validation that card provided could only be weaponized by the humans with malicious intent behind it. It's our job as humans pledging to use tech for good - and not evil - to defend against that. 

 

What can you do?

Invest in the people, the human. Look for talents in the places you least expect to. They will reciprocate that investment in you and your organization. My career and choice to invest in Microsoft was not simply a "transition", but a journey. For those on their own journeys and navigating their careers in an uncertain, changing and evolving world, I challenge you to invest in passions.  For me, Cybersecurity is not merely a job, but an entire frame of mind and a way of life. The investment that I choose to make in my passion has allowed me to diversify the way I view security. That same investment has now allowed me to grow in my career at Microsoft. 

 

Ask yourself: How are you investing in your future, your passions, and most importantly, yourself? When that answer comes to mind, go do that thing. You will not regret it.

 

#HumansofIT

#CareerJourneys

#MilitaryVeteransinTech

 

1 Comment
Super Contributor

The first part of story was scary.

But it ends up well.

Technologies like RMS are my favorite and you from what you shared, cybersecurity is not just about protecting resources , devices and business but it is also about protecting human life.