Bridging the Opportunity Gap with Integrated Education & Training

Hacking the Workforce focuses on equity and ensuring everyone has support. We create tailored strategies to help jobseekers overcome obstacles in the cybersecurity field.

All of our training programs offer clear paths to Department of Labor’s Registered Apprenticeship. As you advance in our training, you will have the opportunity for hands-on learning experiences, an essential component to demonstrating your competency and ability to excel in your new career.

EXPOSURE. EXPERIENCE. OPPORTUNITY.

EXPOSURE. EXPERIENCE. OPPORTUNITY.

What is Pre-Apprenticeship?


Pre-apprenticeship prepares individuals for success in Registered Apprenticeship programs through training and support. It includes career-readiness training, personalized IT and cyber path planning, and networking events to assist you in job-search strategies during technical training. As you approach graduation, students work with a career coach to refine their strategies and overcome challenges until they secure employment.

We utilize utilize proven service delivery models such as Registered Apprenticeship, PreApprenticeship, and an adult education model called Integrated Education and Training, to prepare jobseekers for careers in Information Technology and Cybersecurity occupations.

Let’s Get to Work!

We believe the best way to learn is by teaching others. With over 122,800 jobs and a projected 15% growth from 2020 to 2025, demand for IT specialists and cybersecurity analysts is strong. Average salaries are about $98,300, and a third of professionals have only a two-year degree or less, indicating accessibility.

At Hacking the Workforce, we promote hands-on experiences in cybersecurity, highlighting the importance of digital safety for those most affected by threats. Cybersecurity features various IT roles, including customer service, project management, programming, support, and networking. Each requires technical knowledge and communication skills to convey safety information effectively.

The global cybersecurity market is forecasted to grow from $193.73 billion in 2024 to $562.72 billion by 2032, with the U.S. market reaching around $166.73 billion. Median pay for information security analysts was $102,600 in 2021, showcasing career viability. Sharing knowledge in cybersecurity not only improves individual understanding but also bolsters community resilience against threats.

The global cybersecurity market size was valued at USD 172.24 billion in 2023, yet finding opportunities to acquire practical skills can be incredibly challenging in today’s fast-paced job market. At Hacking the Workforce, we are unique in our commitment to bridging this gap through our carefully designed Pre-Apprenticeship programs.

Apprenticeship Occupations

  • Job Overview:

    The IT Generalist is responsible for maintaining the IT infrastructure and providing timely and effective solutions to end-users. This role requires a blend of technical expertise, strong communication skills, and a customer-centric approach. The IT Generalist will provide both remote and onsite support.

    Requirements:

    • Proven Experience: Demonstrated experience in a helpdesk or customer support role, showcasing technical proficiency and problem-solving abilities.

    • Technical Understanding: Solid understanding of computer systems, mobile devices, operating systems, and common software applications.

    • Communication Skills: Excellent verbal and written communication skills to effectively interact with users of varying technical knowledge.

    • Problem-Solving Aptitude: Ability to analyze technical issues, troubleshoot effectively, and provide clear guidance and solutions.

    • Customer Focus: A patient and customer-oriented demeanor with a commitment to delivering exceptional service.

    • Tool Proficiency: Experience using Slack, Jira, Google Workspace, and other relevant collaboration and ticketing tools.

    Responsibilities:

    • Ticket Resolution: Address and resolve user tickets related to hardware, software, and networking issues in a timely manner.

    • User Assistance: Guide users through the installation and configuration of applications and peripherals.

    • Remote Troubleshooting: Conduct remote troubleshooting sessions, providing clear instructions and guidance to resolve issues efficiently.

    • Application Customization: Customize desktop applications and settings to meet specific user needs and preferences.

    • Documentation: Maintain accurate records of technical issues, solutions, and user interactions in logs and ticketing systems.

    • Follow-Up: Proactively follow up with clients to ensure that resolved issues remain functional and user satisfaction is maintained.

    Key Skills:

    • Technical Support

    • Troubleshooting

    • Customer Service

    • Communication

    • Problem Solving

    • Software Installation

    • Hardware Configuration

    • Remote Assistance

    • Ticketing Systems (Jira)

    • Collaboration Tools (Slack, Google Workspace)

  • Key Aspects of the Apprenticeship Program:

    • Alignment with Career Goals: The position will be tailored to align with the applicant's academic or professional aspirations within the cybersecurity field.

    • Hands-On Experience: The program offers practical, real-world cybersecurity experience to enhance the applicant's skillset and knowledge.

    • Paid Opportunity: The apprenticeship is a paid position, providing financial support during the learning experience.

    Prerequisites:

    • Age Requirement: Applicants must be at least 18 years old by the program's start date.

    • HR Training: Completion of mandatory Human Resources training is required before the apprenticeship concludes.

    • Background Check: Successful completion of a background check is essential for program participation.

    Key Responsibilities:

    This apprenticeship offers a motivated individual a unique chance to immerse themselves in the cybersecurity field. The following areas of focus may be included in the program:

    Cybersecurity Policy:

    • Policy Review and Implementation: Participate in reviewing, updating, and implementing cybersecurity policies, standards, and procedures.

    • Confluence Page Management: Maintain and update Confluence pages to ensure accurate and current information.

    • Compliance Monitoring: Assist in monitoring compliance with organizational security policies.

    Business Continuity and Disaster Recovery (BCDR):

    • BCDR Policy Enhancement: Contribute to the maintenance and improvement of BCDR security policies, procedures, and guidelines.

    • BCDR Implementation: Support the implementation and monitoring of BCDR security controls and technologies.

    • BCDR Planning: Assist in developing and implementing business continuity and disaster recovery plans.

    Data Privacy:

    • Data Privacy Website Development: Participate in building and maintaining a data privacy website with relevant information for members and donors.

    • Data Protection: Collaborate with security teams to ensure sensitive data is secured using appropriate data protection controls.

    • Industry Trend Analysis: Stay informed about industry trends related to data breaches and emerging threats.

    • Client SharePoint Site Audits: Assist in conducting data privacy audits for client SharePoint sites.

    Compliance and Audit:

    • Administrative Support: Provide administrative assistance to the team, including tasks using Microsoft Word and Excel.

    Cybersecurity Program Management:

    • Process Improvement Initiatives: Support the team in various process improvement projects, including:

      • Enhancing cybersecurity content repositories and websites.

      • Coordinating with internal and external stakeholders.

      • Reviewing and prioritizing service requests.

      • Coordinating project activities related to process improvement.

Over 90% of our participants obtain employment within six months of completing our programs, with salary increases of at least $40,000.

Braxton C.

Information Assurance Analyst

Trent W.

IoT Developer and & Security Specialist

Kel R.

VP Production Services - Application Support

Lucas G.

Third Party Security Assessor

Please complete the form below