Introduction: From Blowing Things Up to Breaking Into Networks
When I was a 13B Cannon Crew Member in the U.S. Army, blowing things up wasn’t just part of the job—it was the job. I served in 2nd Squadron, 3rd Armored Cavalry Regiment (2/3 ACR), and we lived for fire missions and battlefield precision. The sound of artillery, the shockwave from a howitzer—it was controlled chaos, and I loved it.
Fast forward to today, and I spend my time behind a keyboard, diving into ethical hacking, network security, and machine learning.
Somehow, the same passion for destruction that I honed in the military evolved into a passion for cybersecurity. This is the story of how I transitioned from artillery rounds to Python code, from battlefield strategy to cybersecurity solutions.
Military Lessons: Breaking Things With Purpose
My time as a 13B taught me the value of structure, pressure, and precision. Every mission was a puzzle. Load. Fire. Repeat. But even then, I found myself curious about more than just the firepower. I wanted to understand how systems worked, why things failed, and how to fix what I had broken.
Back at base, I would tinker with radios, mess with our fire control systems, or try to "optimize" battery setups just for fun. I didn’t realize it then, but that was the early spark of an IT mindset. I wasn’t just destroying—I was learning.
Civilian Life: The Silence After the Smoke
Leaving the Army brought silence. No orders. No missions. No crew. It was disorienting. But I missed more than the action—I missed problem-solving under pressure and working with purpose.
So I started to teach myself tech.
I didn’t have a degree in computer science. I had grit. I had discipline. And I had a powerful curiosity. I began watching tutorials on Linux, Python, cybersecurity, and then I discovered something that clicked: hacking.
It was chaos—but with control and purpose.
From Fire Support to Firewall Defense
Hacking into a system felt familiar. Like scouting a position or testing the limits of gear. I wasn’t doing it to cause harm—I was doing it to find weak points before others did.
That’s when it hit me: cybersecurity is the digital battlefield.
Now I spend my days writing code, scanning networks, and testing defenses. I’m still protecting people—just in a different arena. I moved from destruction to detection, from howitzers to algorithms.
I’ve expanded into machine learning programming, building tools that predict threats and adapt over time. The mission hasn’t changed—protect the team, complete the objective.
My Battle Buddy: A Great Dane and a Gentle Reminder
Through all of this, one companion has stayed by my side—my Great Dane. In the quiet moments, when the code won’t run or imposter syndrome kicks in, he’s just there. Loyal. Steady.
He reminds me of the things we forget: that even warriors need rest, and even hackers need heart.
In the military, we had each other’s backs. Out here, he has mine.
Final Thoughts: Veterans Belong in Cybersecurity
Looking back, I see the clear path from 13B Cannon Crew Member to ethical hacker and machine learning engineer. It’s not such a wild leap. The Army gave me:
- Discipline
- Rapid problem-solving
- A mission-driven mindset
- The ability to stay calm in chaos
If you're a veteran looking to break into IT or cybersecurity, know this: you already have the mindset. You’ve been tested. You’ve operated under stress. You know how to learn under fire.
Cybersecurity needs people like you.
A Message for Fellow Vets: You Don’t Have to Choose
You’re allowed to be both: the soldier and the coder, the breaker and the builder.
Sometimes, the path to creation starts with destruction.
And sometimes, the strongest firewalls are built by people who once blew things up for a living.