Welcome!

News Feed Item

Engility and Center for Cyber Safety and Education announce CyberWarrior™ Scholarships

Scholarship program helps military veterans reenter the workforce

CHANTILLY, Va., April 17, 2018 /PRNewswire/ -- Engility Holdings, Inc. (NYSE: EGL), in partnership with the non-profit Center for Cyber Safety and Education, today announced it will expand its CyberWarrior Scholarship Program and award additional scholarships to U.S. military veterans.

Last fall, the Center and Engility created the program to provide military veterans with career development opportunities in cybersecurity, a field on pace to experience a 1.8 million workforce gap by 2022. The latest round of grants provides four qualifying returning military veterans with cybersecurity certification training scholarships.

"The overwhelming response we received after we announced the program last fall validates our belief that veterans and cybersecurity are a natural fit," said Lynn Dugle, Engility CEO. "Through these scholarships, we're not only providing veterans with a viable option as they reenter the workforce but also putting them on the fast track to one of the most in-demand professions in the world."

The scholarship program is open to military veterans honorably discharged from one of the five branches of the military by July 13, 2018 or those currently serving as active members in the National Guard or Reserves. The scholarships will include everything the recipients need to prepare to become certified for a career in cybersecurity, including training classes, textbooks, study materials and exam vouchers for the (ISC)2® certification of their choice.

The four recipients of this round of the Cyberwarrior Scholarships will each receive an (ISC)² certification exam voucher and education package consisting of the following:

    • One (ISC)² certification exam voucher of the recipient's choice: CISSP, CSSLP, CCSP, HCISPP, SSCP or CAP
    • Hardcover or digital textbook
    • Hardcover or digital study guide
    • Practice tests
    • (ISC)² Direct in-person seminar or Live Online seminar (as available).

At the end of the training, the veterans will have enhanced opportunities to secure cybersecurity jobs with highly technical cyber skill sets, such as security analyst, security engineer, security auditor and security architect. The program focuses on six (ISC)² certifications: Certified Information Systems Security Professional (CISSP®), Certified Secure Software Lifecycle Professional (CSSLP®), Certified Cloud Security Professional (CCSP®), HealthCare Information Security and Privacy Practitioner (HCISPP®), Certified Authorization Professional (CAP®) and Systems Security Certified Practitioner (SSCP®).

Patrick Craven, director of the Center for Cyber Safety and Education, said, "We are thrilled to collaborate with Engility again to provide this deserving group the means to apply their unique skills to cybersecurity."

Qualified applicants may apply starting April 15, 2018 until 11:59 PM EDT on June 15 at https://isc2foundationscholarships.communityforce.com/Login.aspx. The scholarships will be awarded in July 2018.

About the Center for Cyber Safety and Education
The Center for Cyber Safety and Education (Center) is a non-profit charitable trust committed to making the cyber world a safer place for everyone. The Center works to ensure that people across the globe have a positive and safe experience online through their educational programs, scholarships, and research. Visit www.IAmCyberSafe.org.

About Engility
Engility (NYSE: EGL), a $2 billion technology leader, has thousands of employees around the world working to make a difference. Our history of delivering results for the defense, federal civilian, intelligence and space industries spans more than 60 years. We provide leading-edge solutions and services on Earth, in space and across cyber by leveraging expertise in systems engineering & integration, high performance computing, cybersecurity, readiness & training, enterprise modernization and mission operations support. To learn more about us, please visit www.engility.com and connect with us on Facebook, LinkedIn and Twitter.

Media:

Investor Relations:

Scott Fazekas 

Dave Spille

Engility Holdings Inc.

Engility Holdings Inc.

703-984-5068

703-984-6120

[email protected]

[email protected]



Sarah Nicholas


Center for Cyber Safety and Education


269-903-9167


[email protected]


 

 (PRNewsfoto/Engility Holdings, Inc.)

 

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/engility-and-center-for-cyber-safety-and-education-announce-cyberwarrior-scholarships-300630566.html

SOURCE Engility Holdings, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of features and functions for selecting object storage will be included. Brad will also touch on recent developments in tiering technologies that deliver single solution and an end-user view of data across files and objects...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...