Meet Shaelyn
Cyber Warfare Officer
The Hacker TrackerAs a cyber warfare officer in the Army Reserve, Captain Shaelyn Layton finds and fixes breaches before data are compromised. As the “managers of the Military,” officers act in leadership roles that require planning, directing operations and making critical decisions.
SIMILAR JOBS OUTSIDE THE MILITARY
Cybersecurity Specialist, Cybersecurity Analyst, Cybersecurity Manager
BRANCH
Army Reserve
RANK
Captain
Shaelyn’s Story at a Glance
Finished college without student loans
Commissioned as an officer the day before her graduation
Leveraged skills she learned serving part time to propel her career
High School Junior
Gained exposure to the intelligence world through a summer program at Georgetown University.
College
Enrolled at Embry-Riddle Aeronautical University with a major in global security and intelligence and joined the Reserve Officers’ Training Corps (ROTC) program.
Study Abroad
Spent nine months in China gaining advanced language skills in Mandarin, fully funded by the government.
Cyber Officer Operations Course
Earned essential cyber certifications like CCNA and CISSP at no cost through serving, worth thousands in the civilian world.
Present Day
Complements a part-time cyber warfare role in the Military with a full-time role as a civilian cybersecurity engineer.
What Is ROTC?
A path to earning a college degree while training to become a military officer. Through tuition benefits and living stipends, ROTC students can reduce education costs while building service-ready experience.
What Does ROTC Cover?
“My entire college education was paid for in full. I received a monthly stipend for housing and food. I received a quarterly stipend for books, and I received a yearly stipend for ROTC uniforms.”
Protects Defense Networks
Strengthens the Army Reserve’s front lines of digital defense by detecting and addressing network vulnerabilities.
Leads a Crew of Cyberwarriors
Collaborates with other big brains to solve technical problems to strengthen and fortify digital networks.
Test Your Knowledge
Which of these is not a type of malware that might be used in a cyberattack?
Life in Uniform
- Attends monthly Reserve drills
- Takes part in training to keep her cyber skills sharp
- Collaborates with an exceptional team of cyberwarriors
Life Outside the Uniform
- Takes advantage of a flexible schedule to travel and meet up with friends
- Makes the most of Colorado living with mountain biking, hiking and skiing
- Practices scuba diving, which she learned while previously stationed in Hawaii





