Welcome!

News Feed Item

CompTIA Launches Programme to Support Ex-Military Professionals into IT Jobs

-- Arming service leavers for a career in IT

LONDON, Feb. 19, 2014 /PRNewswire/ -- CompTIA, the global IT trade association, is helping solve both the IT skills gap and the growing number of ex-service professionals struggling to find jobs.

(Logo: http://photos.prnewswire.com/prnh/20130107/DC38135LOGO)

Armed for IT Careers, launched today, will provide a one-stop-shop for ex-military personnel to learn about a career in IT, find training, find resettlement funding, get qualified and land their first IT job.

Since the 2010 defence review there have been an increasing number of service leavers returning to the UK and looking for civilian jobs. Meanwhile, the latest research from eSkills suggests 129,000 new entrants a year are required to fill new IT & Telecoms job roles in the UK.

Graham Hunter, Western Europe Director at CompTIA, says: "Military professionals often have strong business, communication and technical skills and a good work ethic, which are all much in demand in the IT industry. There are a wide range of jobs for which someone with military training and leadership skills would be a perfect fit."

"We believe the problem has been that, until now, there has been nothing which clearly outlines the opportunities, then helps them train and certify the technical skills they need to make the transition. We believe this is a real missed opportunity both for the IT industry, which needs great people, and for hard working military leavers who want to contribute to society back home."

The programme website www.armedforitcareers.org aims to become the go to resource for anyone looking to transition from the military into the IT industry.  

For those ready to embark on an IT career, Armed for IT Careers takes them through a clear three step process for finding their first IT job.

  • Learn: Identify IT training providers who are experienced at training ex-military professionals and approved by the MOD for resettlement training funding
  • Certify: Find and take the qualifications to demonstrate you have the skills for an IT career
  • Work: Search for jobs in your area and specialisation

For those earlier in their resettlement journey, the site explains what an IT career offers former military personnel and how to identify funding for resettlement training.

As well as supporting veterans directly into jobs, the programme also provides information for training providers and employers who wish to train and recruit ex-service people. CompTIA is keen to hear from anyone who would like to support the scheme.

Russ Muir followed the path which has now been formalised under Armed for IT Careers. After 23 years in the Navy he studied for and certified in the CompTIA Network+, the entry level qualification for network engineer roles.  This, combined with his military experience, landed him his first IT role.

Russ says: "The forces have a big advantage in IT, partly because they often have the right skills to get in, but also because the financial packages available to those leaving the military are well suited to the well-defined training and certification routes into IT."

Armed for IT Careers has broad support from industry and government. Wansbeck MP Ian Lavery, is a keen supporter. He says, "Wansbeck has always been a fertile recruiting ground for the armed forces, and we have a duty to ensure they have long term and sustainable careers when they return. I am a strong advocate of CompTIA's Armed for IT Careers programme which helps individuals who've served our country find long-term and sustainable careers within a growing, exciting sector. Local employers will also benefit from hiring motivated individuals with up to date industry credentials."

CompTIA is the voice of the world's information technology (IT) industry. Visit http://www.comptia.org/home.aspx, http://www.facebook.com/CompTIA and twitter.com/comptia to learn more.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...