Role Definition
| Field | Value |
|---|---|
| Job Title | Navy Cyber Warfare Technician (formerly Cryptologic Technician Networks / CTN) |
| Seniority Level | Mid-Level (E-5 to E-6, Petty Officer Second/First Class) |
| Primary Function | Conducts defensive and offensive cyberspace operations for the U.S. Navy and joint forces — network defense, threat hunting, digital forensics, malware analysis, incident response, vulnerability assessment, and intelligence-driven cyber operations on classified networks. Operates under USCYBERCOM authorities with TS/SCI clearance. Leads work centers and trains junior sailors. |
| What This Role Is NOT | NOT a civilian SOC analyst (no commercial tools, no at-will employment, classified networks only). NOT a CTT (Cryptologic Technician Technical — signals intelligence/ELINT). NOT a Cyber Warfare Officer (commissioned officer command authority). NOT an IT rating (Information Systems Technician — help desk and network admin). |
| Typical Experience | 4-8 years. JCAC A-school (6 months), C-school specialisations, DoD 8140 certifications (Security+, CySA+, CEH, CASP+ at mid-level). 6-year initial obligation for crypto/cyber ratings. |
Seniority note: Junior (E-3/E-4, fresh from JCAC) would score lower — more routine monitoring, less autonomous judgment. Senior (E-7+, Chief) shifts toward strategic planning, programme management, and policy — would score similarly or higher Green due to increased judgment and accountability.
Protective Principles + AI Growth Correlation
| Principle | Score (0-3) | Rationale |
|---|---|---|
| Embodied Physicality | 0 | Fully digital, desk-based operations. Deployed to ships, submarines, or shore facilities, but the cyber work itself is screen-based. |
| Deep Interpersonal Connection | 1 | Team leadership and mentoring of junior sailors. Training responsibilities require interpersonal skills. But core value is technical, not relational. |
| Goal-Setting & Moral Judgment | 2 | Significant judgment calls in cyber operations — ROE interpretation for offensive operations, escalation decisions during incidents, proportionality judgments with strategic consequences. Operates within chain of command but exercises substantial autonomous judgment on classified systems. |
| Protective Total | 3/9 | |
| AI Growth Correlation | 1 | AI-enabled adversaries increase demand for human cyber defenders. DoD expanding cyber forces. But role predates AI wave — not a pure "AI-created" role. |
Quick screen result: Protective 3/9 with weak positive correlation — likely Yellow Zone on protective principles alone, but military structural barriers may push toward Green. Proceed to quantify.
Task Decomposition (Agentic AI Scoring)
| Task | Time % | Score (1-5) | Weighted | Aug/Disp | Rationale |
|---|---|---|---|---|---|
| Network defense & monitoring (DCO) | 20% | 3 | 0.60 | AUGMENTATION | AI-enhanced SIEMs handle data processing and anomaly detection at machine speed. Human validates findings and makes tactical decisions on classified networks where commercial AI cannot operate. AI assists but human leads. |
| Threat hunting & analysis | 20% | 2 | 0.40 | AUGMENTATION | Human drives hypothesis-driven hunting on classified systems. AI assists with pattern detection and IOC correlation, but adversarial adaptation and classified context require human judgment. Novel threat discovery remains human-led. |
| Digital forensics & malware analysis | 15% | 2 | 0.30 | AUGMENTATION | AI accelerates automated triage and basic analysis. Human performs deep reverse engineering, classified attribution, and legal-quality evidence handling. Chain of custody and courtmartial-admissible evidence require human accountability. |
| Incident response & coordination | 15% | 2 | 0.30 | AUGMENTATION | Human leads response decisions, containment strategy, and coordination across classified channels. AI assists with automated playbook execution for initial containment. Strategic decisions on operational impact require human authority. |
| Vulnerability assessment | 10% | 3 | 0.30 | AUGMENTATION | Scanning increasingly automated. But prioritisation for military-critical systems, mission-impact assessment, and remediation coordination with operational commanders requires human judgment. |
| Offensive cyber operations support | 10% | 2 | 0.20 | AUGMENTATION | Highly classified operations under Title 10/50 authorities. Human authorisation chain mandatory from operator to national command authority. AI may assist reconnaissance, but execution requires human oversight and legal accountability. |
| Reporting & documentation | 5% | 4 | 0.20 | DISPLACEMENT | AI can draft reports and summarise findings. Human reviews for classified accuracy, OPSEC compliance, and operational context. Significant time savings from AI drafting. |
| Training & mentoring junior personnel | 5% | 1 | 0.05 | NOT INVOLVED | Physical demonstration, character assessment under pressure, leadership development of junior sailors. Military mentoring is fundamentally human — the relationship IS the training. |
| Total | 100% | 2.35 |
Task Resistance Score: 6.00 - 2.35 = 3.65/5.0
Displacement/Augmentation split: 5% displacement, 90% augmentation, 5% not involved.
Reinstatement check (Acemoglu): AI creates new tasks within the role — operating AI-enhanced defensive tools, validating machine-generated threat intelligence, countering AI-enabled adversary TTPs, managing human-machine teaming in cyber operations, and auditing AI tool outputs on classified networks. The "AI vs AI" arms race in cyber warfare is a textbook reinstatement dynamic — more AI means more human work defending against AI.
Evidence Score
| Dimension | Score (-2 to 2) | Evidence |
|---|---|---|
| Job Posting Trends | 2 | Pentagon short 20,000+ cyber professionals (Federal News Network, Jan 2026). USCYBERCOM Cyber Mission Force expanding from 133 to 147 teams. Navy redesignated CTN to CWT to signal investment in cyber warfare. Acute shortage — demand far exceeds supply. |
| Company Actions | 2 | No service branch reducing cyber headcount. USCYBERCOM FY2026 budget increases both personnel and technology ($5M new AI programme within $1.3B R&D). DoD Cyber Workforce Rotational Programs expanding. Congress directed five-year AI roadmap for cyber forces. |
| Wage Trends | 1 | Military pay follows rank/grade tables, not market dynamics. However, retention bonuses, special duty pay, and enlistment bonuses signal shortage economics. Private sector cyber salaries ($100K-$200K+) create retention pressure — DoD responds with premiums, not cuts. |
| AI Tool Maturity | 1 | AI tools augment defensive operations but core tasks on air-gapped classified networks have no autonomous AI alternative. Military-specific AI tools in early development (USCYBERCOM FY2026 AI programme). Commercial tools like CrowdStrike and SentinelOne cannot operate on classified networks. |
| Expert Consensus | 1 | Universal agreement across RAND, Atlantic Council, and congressional testimony that military cyber demand is growing. "AI vs AI" arms race increases demand for human operators. Zero credible sources predict military cyber workforce reduction. |
| Total | 7 |
Barrier Assessment
Reframed question: What prevents AI execution even when programmatically possible?
| Barrier | Score (0-2) | Rationale |
|---|---|---|
| Regulatory/Licensing | 2 | TS/SCI clearance mandatory — no AI system holds a security clearance. DoD 8140 certification requirements. Operations under Title 10/50 legal authorities require cleared human personnel. Congressional oversight controls force structure. |
| Physical Presence | 0 | Desk-based cyber operations. Deployments to ships and submarines require physical presence aboard, but the cyber work itself is digital. |
| Union/Collective Bargaining | 0 | Military personnel do not unionise. Congressional oversight and military service structure provide indirect institutional protection, but no formal collective bargaining. |
| Liability/Accountability | 2 | UCMJ accountability — operators personally subject to military law. Cyber operations can constitute acts of war requiring human authorisation up to national command authority. Operators accountable for classified material handling. AI has no legal standing under military law. |
| Cultural/Ethical | 1 | Growing acceptance of AI in cyber defence. But strong institutional resistance to autonomous offensive cyber operations. "Meaningful human control" doctrine applies to operations with strategic consequences. DoD Directive 3000.09 principles extend to cyber. |
| Total | 5/10 |
AI Growth Correlation Check
Confirmed +1 (Weak Positive). AI adoption by adversaries directly increases demand for military cyber operators who understand and counter AI-enabled threats. DoD is expanding cyber forces because the AI-enhanced threat landscape is growing — more sophisticated attacks require more human defenders. However, this role predates the AI wave and is not fundamentally an "AI role" — it is a cyber warfare role that AI is making more important. This is Green (Transforming), not Green (Accelerated), because the growth correlation is +1, not +2.
JobZone Composite Score (AIJRI)
| Input | Value |
|---|---|
| Task Resistance Score | 3.65/5.0 |
| Evidence Modifier | 1.0 + (7 × 0.04) = 1.28 |
| Barrier Modifier | 1.0 + (5 × 0.02) = 1.10 |
| Growth Modifier | 1.0 + (1 × 0.05) = 1.05 |
Raw: 3.65 × 1.28 × 1.10 × 1.05 = 5.3962
JobZone Score: (5.3962 - 0.54) / 7.93 × 100 = 61.2/100
Zone: GREEN (Green >=48, Yellow 25-47, Red <25)
Sub-Label Determination
| Metric | Value |
|---|---|
| % of task time scoring 3+ | 35% |
| AI Growth Correlation | 1 |
| Sub-label | Green (Transforming) — AIJRI >=48 AND >=20% of task time scores 3+ |
Assessor override: None — formula score accepted. 61.2 accurately reflects a military cyber role with moderate task resistance boosted by exceptionally strong evidence and meaningful structural barriers. Comparable to SOC Manager Senior (61.8) — a similar cyber operations leadership role with strong evidence and barriers.
Assessor Commentary
Score vs Reality Check
The 61.2 Green (Transforming) label is honest. The role sits 13 points above the Green zone boundary — not borderline. Without barriers (modifier at 1.0 instead of 1.10), the score would be approximately 55.6 — still firmly Green. The classification is driven primarily by strong evidence (+7) and solid task resistance (3.65), not by barriers alone. The "Transforming" sub-label is accurate: 35% of task time scores 3+, meaning AI is meaningfully changing daily operations (network monitoring, vulnerability scanning, report writing) while the core judgment-intensive work remains human-led.
What the Numbers Don't Capture
- Classified network constraint. Air-gapped classified networks severely limit AI tool deployment. Commercial AI (ChatGPT, Copilot, CrowdStrike AI) cannot operate on SIPRNet or JWICS. Military-specific AI tools are years behind commercial equivalents, providing additional temporal protection not captured in the AI Tool Maturity score.
- Clearance as absolute barrier. No AI system holds a TS/SCI clearance. This is not a regulatory hurdle that could be legislated away — it is a fundamental security principle. Every piece of classified information these operators handle requires a cleared human. This barrier is structural and permanent.
- Retention vs recruitment. The 20,000+ shortage is real but partially reflects competition with private sector salaries ($150K-$250K+ for cleared cyber professionals vs $50K-$80K military pay). Some operators leave for civilian roles after their obligation. The shortage signals demand, not AI displacement — but it also signals that the military struggles to retain talent regardless of AI.
Who Should Worry (and Who Shouldn't)
Mid-level CWTs doing threat hunting, forensics, incident response, and offensive operations on classified networks are among the safest cyber professionals in the economy. The combination of clearance requirements, UCMJ accountability, classified tooling, and acute demand creates a protection envelope that no civilian cyber role enjoys. Junior CWTs (E-3/E-4) doing primarily monitoring and alert triage on defensive networks should pay attention — this is the portion of the role most exposed to AI automation, and as military AI tools mature, the entry-level monitoring function will shrink. The single biggest separator is whether you are doing judgment-intensive work (hunting, forensics, OCO) or pattern-matching work (monitoring, alert triage). The former is safe. The latter is transforming.
What This Means
The role in 2028: Mid-level CWTs will operate AI-enhanced defensive platforms, use machine learning for accelerated threat detection, and spend less time on routine monitoring and more time on adversary analysis, forensics, and offensive operations. The "AI vs AI" arms race will make their skills more valuable, not less — but the daily toolkit will look dramatically different. Expect AI-generated threat briefings, automated initial triage, and machine-assisted malware analysis as standard.
Survival strategy:
- Build deep expertise in threat hunting and offensive operations — these are the most AI-resistant tasks and the most valued by USCYBERCOM
- Pursue advanced certifications (OSCP, GIAC forensics/incident handling) that demonstrate judgment-intensive skills AI cannot replicate
- Develop AI tool proficiency — learn to operate, validate, and audit AI-enhanced cyber tools so you lead the human-machine team rather than being replaced by it
Timeline: 10-15+ years before any meaningful displacement, driven by classified network constraints, clearance requirements, UCMJ accountability, and the structural impossibility of delegating military cyber operations authority to non-human systems.