Senior Security Operations Analyst Salary - Up To 55,000 On-Site Currently partnered with the leading multinational aerospace organsisation who are hiring an advanced cyber security analyst into their state-of-the-art CSOC function. This is an amazing role in which you will be at the forefront of multiple complex incidents and proactively searching for the latest emerging threats in the industry. This is a seriously exciting opportunity to join an industry leading team and get exposure to an enormous volume of nation state sponsored attacks on a daily basis, whilst receiving a generous remuneration package and significant budget for training. Key Responsibilities: Act as a lead and technical escalation point for all critical information security incidents. Utilise internal and external resources to proactively research emerging threats, vulnerabilities and threat intelligence on various adversaries and attack methods. Collaboratively work with the wider cyber defence team to recommend ways to develop automated processes and develop fully automated response plans. Proactively research emerging threats and lead proactive threat hunting campaigns across the internal network, leveraging threat intelligence feeds from various adversaries and attack methods. Required Skills: Demonstrated experience working in an advanced SOC function as technical lead across multiple functions. Practical experience responding to major cyber-attacks, nation-state sponsored attacks and ransomware investigations. Having a proactive approach to leading threat hunting campaigns and researching the latest threats / malware, deconstructing, and rebuilding where appropriate. Lawrence Harvey is acting as an Employment Business in regards to this position. Visit our website and follow us on Twitter for all live vacancies (lawharveyjobs)
Mar 29, 2024
Full time
Senior Security Operations Analyst Salary - Up To 55,000 On-Site Currently partnered with the leading multinational aerospace organsisation who are hiring an advanced cyber security analyst into their state-of-the-art CSOC function. This is an amazing role in which you will be at the forefront of multiple complex incidents and proactively searching for the latest emerging threats in the industry. This is a seriously exciting opportunity to join an industry leading team and get exposure to an enormous volume of nation state sponsored attacks on a daily basis, whilst receiving a generous remuneration package and significant budget for training. Key Responsibilities: Act as a lead and technical escalation point for all critical information security incidents. Utilise internal and external resources to proactively research emerging threats, vulnerabilities and threat intelligence on various adversaries and attack methods. Collaboratively work with the wider cyber defence team to recommend ways to develop automated processes and develop fully automated response plans. Proactively research emerging threats and lead proactive threat hunting campaigns across the internal network, leveraging threat intelligence feeds from various adversaries and attack methods. Required Skills: Demonstrated experience working in an advanced SOC function as technical lead across multiple functions. Practical experience responding to major cyber-attacks, nation-state sponsored attacks and ransomware investigations. Having a proactive approach to leading threat hunting campaigns and researching the latest threats / malware, deconstructing, and rebuilding where appropriate. Lawrence Harvey is acting as an Employment Business in regards to this position. Visit our website and follow us on Twitter for all live vacancies (lawharveyjobs)
Job Title: Senior Threat Modeller Location: Preston, Frimley, or Filton. (Hybrid) -2/3 split pending business need - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa 50,000 - Depending on experience and skills What you'll be doing: Building and implementing processes and procedures for continuous and effective threat modelling capability Producing reports detailing key threats to BAE at a strategic level for business units to digest Contributing to plans and delivering activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape Maintaining up to date knowledge of cyber security threats, analyst toolsets and relevant activity group tactics, techniques, and procedures (TTPs) Identifies security gaps within the BAE estate, and builds attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts Your skills and experiences: An in-depth understanding of the external security environment and how the organisation reacts to security threats Good knowledge of cyber threat landscape, current affairs, and geopolitics, including activity groups and how to apply this knowledge within an operational environment Knowledge of infrastructure analysis, e.g., Perimeters, network endpoints and user behaviour analytics CREST & GIAC qualifications or equivalent proven industry experience Benefits: You'll receive benefits including a competitive pension scheme, enhanced annual leave allowance and a Company contributed Share Incentive Plan. You'll also have access to additional benefits such as flexible working, an employee assistance programme, Cycle2work and employee discounts - you may also be eligible for an annual incentive. The Cyber Operations team: Cyber Operations is responsible for protecting BAE Systems from Cyber Attack by various threat actors. Not only do we protect BAE systems and its employees, indirectly we protect those who protect us - the women and men who serve in our armed forces and rely on the products and services this company creates. Across Threat Intelligence, Detection, Incident Response and now Active Defence we work to evolve cyber operations as a world-class capability. Why BAE Systems? This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture that values diversity, rewards integrity, and merit, and where you'll be empowered to fulfil your potential. We welcome candidates from all backgrounds and particularly from sections of the community who are currently underrepresented within our industry, including women, ethnic minorities, people with disabilities and LGBTQ+ individuals. We also want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Please be aware that many roles working for BAE Systems will be subject to both security and export control restrictions. These restrictions mean that factors including your nationality, any previous nationalities you have held, and your place of birth may limit those roles you can perform for the organisation. Closing Date: 20th March 2024 We reserve the right to close this vacancy early if we receive sufficient applications for the role. Therefore, if you are interested, please submit your application as early as possible.
Mar 28, 2024
Full time
Job Title: Senior Threat Modeller Location: Preston, Frimley, or Filton. (Hybrid) -2/3 split pending business need - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa 50,000 - Depending on experience and skills What you'll be doing: Building and implementing processes and procedures for continuous and effective threat modelling capability Producing reports detailing key threats to BAE at a strategic level for business units to digest Contributing to plans and delivering activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape Maintaining up to date knowledge of cyber security threats, analyst toolsets and relevant activity group tactics, techniques, and procedures (TTPs) Identifies security gaps within the BAE estate, and builds attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts Your skills and experiences: An in-depth understanding of the external security environment and how the organisation reacts to security threats Good knowledge of cyber threat landscape, current affairs, and geopolitics, including activity groups and how to apply this knowledge within an operational environment Knowledge of infrastructure analysis, e.g., Perimeters, network endpoints and user behaviour analytics CREST & GIAC qualifications or equivalent proven industry experience Benefits: You'll receive benefits including a competitive pension scheme, enhanced annual leave allowance and a Company contributed Share Incentive Plan. You'll also have access to additional benefits such as flexible working, an employee assistance programme, Cycle2work and employee discounts - you may also be eligible for an annual incentive. The Cyber Operations team: Cyber Operations is responsible for protecting BAE Systems from Cyber Attack by various threat actors. Not only do we protect BAE systems and its employees, indirectly we protect those who protect us - the women and men who serve in our armed forces and rely on the products and services this company creates. Across Threat Intelligence, Detection, Incident Response and now Active Defence we work to evolve cyber operations as a world-class capability. Why BAE Systems? This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture that values diversity, rewards integrity, and merit, and where you'll be empowered to fulfil your potential. We welcome candidates from all backgrounds and particularly from sections of the community who are currently underrepresented within our industry, including women, ethnic minorities, people with disabilities and LGBTQ+ individuals. We also want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Please be aware that many roles working for BAE Systems will be subject to both security and export control restrictions. These restrictions mean that factors including your nationality, any previous nationalities you have held, and your place of birth may limit those roles you can perform for the organisation. Closing Date: 20th March 2024 We reserve the right to close this vacancy early if we receive sufficient applications for the role. Therefore, if you are interested, please submit your application as early as possible.
Role: IT Security Operations Lead Type: Permanent, Full-time Locations: Hybrid - 2 days in Central London office Competitive salary + Car allowance, generous Pension, bonus & other benefits Our client is an internationally renowned mining corporation, boasting a diverse portfolio of valuable resources. They are looking for an IT Security Operations Lead to join their dynamic Information Management (IM) team and be at the forefront of driving digital transformation and security optimization within their enterprise. As a Cyber/IT Security Operations Lead, you will play a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities: Manage a global team of IT security operations analysts, supporting their development and training. Select, deploy, and maintain cyber defence technologies such as Endpoint Detect and Response, Anti-Virus, SIEM, and SOAR. Monitor and manage the use of cyber defence tools, ensuring efficient performance and driving operational efficiency. Develop Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threat intelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. Understanding of relevant cybersecurity regulations and standards (e.g., GDPR, HIPAA, NIST) If you feel like this is a good match for your skill set and experience, please apply to the role for an initial chat to find out more!
Mar 28, 2024
Full time
Role: IT Security Operations Lead Type: Permanent, Full-time Locations: Hybrid - 2 days in Central London office Competitive salary + Car allowance, generous Pension, bonus & other benefits Our client is an internationally renowned mining corporation, boasting a diverse portfolio of valuable resources. They are looking for an IT Security Operations Lead to join their dynamic Information Management (IM) team and be at the forefront of driving digital transformation and security optimization within their enterprise. As a Cyber/IT Security Operations Lead, you will play a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities: Manage a global team of IT security operations analysts, supporting their development and training. Select, deploy, and maintain cyber defence technologies such as Endpoint Detect and Response, Anti-Virus, SIEM, and SOAR. Monitor and manage the use of cyber defence tools, ensuring efficient performance and driving operational efficiency. Develop Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threat intelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. Understanding of relevant cybersecurity regulations and standards (e.g., GDPR, HIPAA, NIST) If you feel like this is a good match for your skill set and experience, please apply to the role for an initial chat to find out more!
Role: IT Security Operations Lead Type: Permanent, Full-time Locations: Hybrid - 2 days in Central London office Competitive salary + Car allowance, generous Pension, bonus & other benefits Our client is an internationally renowned mining corporation, boasting a diverse portfolio of valuable resources. They are looking for an IT Security Operations Lead to join their dynamic Information Management (IM) team and be at the forefront of driving digital transformation and security optimization within their enterprise. As a Cyber/IT Security Operations Lead, you will play a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities: Manage a global team of IT security operations analysts, supporting their development and training. Select, deploy, and maintain cyber defence technologies such as Endpoint Detect and Response, Anti-Virus, SIEM, and SOAR. Monitor and manage the use of cyber defence tools, ensuring efficient performance and driving operational efficiency. Develop Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threat intelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. Understanding of relevant cybersecurity regulations and standards (e.g., GDPR, HIPAA, NIST) If you feel like this is a good match for your skill set and experience, please apply to the role for an initial chat to find out more!
Mar 28, 2024
Full time
Role: IT Security Operations Lead Type: Permanent, Full-time Locations: Hybrid - 2 days in Central London office Competitive salary + Car allowance, generous Pension, bonus & other benefits Our client is an internationally renowned mining corporation, boasting a diverse portfolio of valuable resources. They are looking for an IT Security Operations Lead to join their dynamic Information Management (IM) team and be at the forefront of driving digital transformation and security optimization within their enterprise. As a Cyber/IT Security Operations Lead, you will play a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities: Manage a global team of IT security operations analysts, supporting their development and training. Select, deploy, and maintain cyber defence technologies such as Endpoint Detect and Response, Anti-Virus, SIEM, and SOAR. Monitor and manage the use of cyber defence tools, ensuring efficient performance and driving operational efficiency. Develop Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threat intelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. Understanding of relevant cybersecurity regulations and standards (e.g., GDPR, HIPAA, NIST) If you feel like this is a good match for your skill set and experience, please apply to the role for an initial chat to find out more!
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. This is a remote-first hybrid role. See here for details about our hybrid workstyle. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
Mar 28, 2024
Full time
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. This is a remote-first hybrid role. See here for details about our hybrid workstyle. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
Global Information Security Operations Manager This is a senior technical lead position that will focus on MLP's security incident response and manage global security operations staff. The role will also include maintenance, monitoring and administration of key information security technologies. The Information Security Team fosters a collaborative environment and is building a best of breed practice to partner with the business to protect the Firm's information and computer systems. The successful candidate must have hands-on technical experience in supporting infrastructure platforms and providing leadership to junior members of the team. The role is suited to individuals with prior experience developing and implementing security procedures and controls as well as management experience in a Security Operations Center (SOC) environment. Millennium is a complex and robust technical environment and securing the Firm from external and internal threats is a top priority which makes this role very challenging. Principal Responsibilities Responsible for the daily operation of enterprise security systems including SIEM, SOAR, Elastic, ticketing, alerting, and messaging systems. Manage junior level analysts in the daily operation of enterprise security systems including shift rotations and hand-offs. Work closely with Managed Security Providers (MSP) to maintain runbooks, escalation procedures, and consume available threat intelligence. Utilize detective controls to develop rules and alerts to drive security monitoring. Perform hunt activities across our log aggregation and SIEM platforms. Recommend, test, tune and implement SIEM and other tooling correlation rules. Identify false-positives from alerting, and perform incident response, triage, incident analysis and remediation tasks. Recommend and develop new SIEM use cases/rules with engineering teams. Maintain documentation for the SOC function, including training program for new Security Operations personnel. Participate in Information Security Incident Response activities for the Firm's environment. Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries. Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required. Collaborate with the Information Security Team to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc. Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures. Actively monitor new and emerging security and privacy related technologies, trends, issues, and solutions and assess their applicability to Millennium key business initiatives and business strategies. Provide technical support to IT staff in the detection and resolution of security problems. Develop and maintain documentation of all Security products including specific tools, technologies and processes. Qualifications/Skills Required Experience performing security monitoring and incident response and triage work in a 24/7 environment. Experience with people management in a technical role, preferably in a SOC setting. Experience with ticketing systems and API integration work. Hands-on experience with one of the major SIEM platforms in use i.e Splunk, Q1Radar, etc Excellent understanding of common exploit scenarios and indicators of compromise (IOCs) Log analysis and experience reviewing security events. Ability to manipulate data and produce relevant metrics and reporting around security incidents. Excellent understanding and experience across broad spectrum of technologies - including operating system, cloud, Active Directory, Group Policy, DNS, Messaging. High level understanding of internetworking, data transmission and encryption protocols. Experience with vulnerability management scanning platforms. Ability to handle sensitive and/or confidential materials with appropriate discretion. Scripting and development skills (Python, Powershell, VBscript, Rest a plus). Possess a passion for Information Security and Technology. Able to prioritize in a fast moving, high pressure, constantly changing environment; High sense of urgency Ability to communicate and collaborate across technology teams. Bachelor's degree (Computer Science or Engineering preferred) with strong IT background. Have substantial experience working in a technical role and extensive experience concentrating on information security, financial industry At least one security certification (CISSP, CEH, GCIA, CISM, etc.).
Mar 25, 2024
Full time
Global Information Security Operations Manager This is a senior technical lead position that will focus on MLP's security incident response and manage global security operations staff. The role will also include maintenance, monitoring and administration of key information security technologies. The Information Security Team fosters a collaborative environment and is building a best of breed practice to partner with the business to protect the Firm's information and computer systems. The successful candidate must have hands-on technical experience in supporting infrastructure platforms and providing leadership to junior members of the team. The role is suited to individuals with prior experience developing and implementing security procedures and controls as well as management experience in a Security Operations Center (SOC) environment. Millennium is a complex and robust technical environment and securing the Firm from external and internal threats is a top priority which makes this role very challenging. Principal Responsibilities Responsible for the daily operation of enterprise security systems including SIEM, SOAR, Elastic, ticketing, alerting, and messaging systems. Manage junior level analysts in the daily operation of enterprise security systems including shift rotations and hand-offs. Work closely with Managed Security Providers (MSP) to maintain runbooks, escalation procedures, and consume available threat intelligence. Utilize detective controls to develop rules and alerts to drive security monitoring. Perform hunt activities across our log aggregation and SIEM platforms. Recommend, test, tune and implement SIEM and other tooling correlation rules. Identify false-positives from alerting, and perform incident response, triage, incident analysis and remediation tasks. Recommend and develop new SIEM use cases/rules with engineering teams. Maintain documentation for the SOC function, including training program for new Security Operations personnel. Participate in Information Security Incident Response activities for the Firm's environment. Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries. Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required. Collaborate with the Information Security Team to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc. Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures. Actively monitor new and emerging security and privacy related technologies, trends, issues, and solutions and assess their applicability to Millennium key business initiatives and business strategies. Provide technical support to IT staff in the detection and resolution of security problems. Develop and maintain documentation of all Security products including specific tools, technologies and processes. Qualifications/Skills Required Experience performing security monitoring and incident response and triage work in a 24/7 environment. Experience with people management in a technical role, preferably in a SOC setting. Experience with ticketing systems and API integration work. Hands-on experience with one of the major SIEM platforms in use i.e Splunk, Q1Radar, etc Excellent understanding of common exploit scenarios and indicators of compromise (IOCs) Log analysis and experience reviewing security events. Ability to manipulate data and produce relevant metrics and reporting around security incidents. Excellent understanding and experience across broad spectrum of technologies - including operating system, cloud, Active Directory, Group Policy, DNS, Messaging. High level understanding of internetworking, data transmission and encryption protocols. Experience with vulnerability management scanning platforms. Ability to handle sensitive and/or confidential materials with appropriate discretion. Scripting and development skills (Python, Powershell, VBscript, Rest a plus). Possess a passion for Information Security and Technology. Able to prioritize in a fast moving, high pressure, constantly changing environment; High sense of urgency Ability to communicate and collaborate across technology teams. Bachelor's degree (Computer Science or Engineering preferred) with strong IT background. Have substantial experience working in a technical role and extensive experience concentrating on information security, financial industry At least one security certification (CISSP, CEH, GCIA, CISM, etc.).
Working With Us The founder and sponsor of the Harris Federation, Lord Harris of Peckham, opened our first school in 1990. We have, over the past thirty years, implemented ideas and initiatives that have transformed the opportunities of pupils from working class and disadvantaged backgrounds. Harris academies are widely recognised as a force for social mobility. We are immensely proud of the role that our alumni are now beginning to play in the world and of what we believe our current generation of pupils will go on to achieve. We now have over 50 schools educating more than 40,000 young people across London and Essex, and employ over 5,000 staff across our academies and head office. With the majority of our academies located in areas of high socioeconomic disadvantage, a high-quality education is key to the futures of the pupils we serve. As a provider of employment and education, we value the diversity of our staff and students, and all our staff are equally valued and respected. We are committed to providing a fair, equitable and mutually supportive learning and working environment for our students and staff. Our work will impact many generations to come, and our staff come from all backgrounds and walks of life, coming together to inspire young minds. We promote an inclusive culture that embraces the valuable and enriching contribution that all of our community make. We continue to be proactive in uplifting and supporting all voices at Harris. To discover more about our culture, ethos and what it is like to work here, visit the Why Work For Us page. Main Areas of Responsibility Your responsibilities will include: Working in conjunction with the Cyber Security Team, Infrastructure Team and Service Delivery to act as a conduit between all teams to ensure vulnerabilities are being monitored, tracked and remediated Participating in proactive and reactive threat hunting Executing vulnerability assessments, provide analysis and recommendations to mitigate potential threats Working with the Cyber Security Team and Infrastructure Team to perform penetration tests Make sure best practices are adhered to when handling security threats and breaches and conducting investigation techniques, such as CIS benchmark, ISO27001 and NCSC Continuously researching and investigating new and emerging vulnerabilities including Zero Day events, and participating in external security communities, sharing findings across the security functions Recommending remediation strategies and providing advice on complex configuration changes in support of vulnerability remediation Conducting vulnerability scanning activities of the internal and external footprint to identify threats and reduce the attack surface Reviewing latest sources and vendor news to identify potential risks and vulnerabilities and raising awareness to the business Liaising with internal and external security teams including TVM threat intelligence to assess impact and drive timely remediation of high-risk vulnerabilities Producing reporting on threat metrics to monitor progress and maturity level What We are Looking For eWe would like to hear from you if you have: A clear understanding and drive to meet security and compliance standards with a 'security first' ethos A minimum of three years' experience carrying out a similar role In-depth understanding of Microsoft Defender, patch management tools (such as MECM & PatchMyPC) Experience of working with third party security companies (such as MDR or XDR partners) to proactively monitor the estate for new vulnerabilities and identify areas for security hardening In-depth understanding of mobile device management/enterprise mobility management with JamF, MS Intune / MECM and Meraki Understanding of tools and solutions to implement IT security best practice such as MFA and encryption In-depth understanding of Windows 10, MacOS, iOS and iPadOS Good understanding of Windows Server 2016 to Windows server 2022 Good understanding of Microsoft Azure & O365 Good understanding of networking, DNS and DHCP Applying for this Position If you would like to discuss the opportunity further, or if you have any questions, please contact us via email to arrange a conversation. Before applying please ensure you download the job pack from our careers website, this will help with completing your application. Please note that we only accept applications submitted online before the closing date. When applying, you will have the option to import your CV or use a LinkedIn profile which will auto populate the online application. A reminder to check your junk mail for our email communications and add us to your safe senders list to ensure all future email communication is received.
Mar 25, 2024
Full time
Working With Us The founder and sponsor of the Harris Federation, Lord Harris of Peckham, opened our first school in 1990. We have, over the past thirty years, implemented ideas and initiatives that have transformed the opportunities of pupils from working class and disadvantaged backgrounds. Harris academies are widely recognised as a force for social mobility. We are immensely proud of the role that our alumni are now beginning to play in the world and of what we believe our current generation of pupils will go on to achieve. We now have over 50 schools educating more than 40,000 young people across London and Essex, and employ over 5,000 staff across our academies and head office. With the majority of our academies located in areas of high socioeconomic disadvantage, a high-quality education is key to the futures of the pupils we serve. As a provider of employment and education, we value the diversity of our staff and students, and all our staff are equally valued and respected. We are committed to providing a fair, equitable and mutually supportive learning and working environment for our students and staff. Our work will impact many generations to come, and our staff come from all backgrounds and walks of life, coming together to inspire young minds. We promote an inclusive culture that embraces the valuable and enriching contribution that all of our community make. We continue to be proactive in uplifting and supporting all voices at Harris. To discover more about our culture, ethos and what it is like to work here, visit the Why Work For Us page. Main Areas of Responsibility Your responsibilities will include: Working in conjunction with the Cyber Security Team, Infrastructure Team and Service Delivery to act as a conduit between all teams to ensure vulnerabilities are being monitored, tracked and remediated Participating in proactive and reactive threat hunting Executing vulnerability assessments, provide analysis and recommendations to mitigate potential threats Working with the Cyber Security Team and Infrastructure Team to perform penetration tests Make sure best practices are adhered to when handling security threats and breaches and conducting investigation techniques, such as CIS benchmark, ISO27001 and NCSC Continuously researching and investigating new and emerging vulnerabilities including Zero Day events, and participating in external security communities, sharing findings across the security functions Recommending remediation strategies and providing advice on complex configuration changes in support of vulnerability remediation Conducting vulnerability scanning activities of the internal and external footprint to identify threats and reduce the attack surface Reviewing latest sources and vendor news to identify potential risks and vulnerabilities and raising awareness to the business Liaising with internal and external security teams including TVM threat intelligence to assess impact and drive timely remediation of high-risk vulnerabilities Producing reporting on threat metrics to monitor progress and maturity level What We are Looking For eWe would like to hear from you if you have: A clear understanding and drive to meet security and compliance standards with a 'security first' ethos A minimum of three years' experience carrying out a similar role In-depth understanding of Microsoft Defender, patch management tools (such as MECM & PatchMyPC) Experience of working with third party security companies (such as MDR or XDR partners) to proactively monitor the estate for new vulnerabilities and identify areas for security hardening In-depth understanding of mobile device management/enterprise mobility management with JamF, MS Intune / MECM and Meraki Understanding of tools and solutions to implement IT security best practice such as MFA and encryption In-depth understanding of Windows 10, MacOS, iOS and iPadOS Good understanding of Windows Server 2016 to Windows server 2022 Good understanding of Microsoft Azure & O365 Good understanding of networking, DNS and DHCP Applying for this Position If you would like to discuss the opportunity further, or if you have any questions, please contact us via email to arrange a conversation. Before applying please ensure you download the job pack from our careers website, this will help with completing your application. Please note that we only accept applications submitted online before the closing date. When applying, you will have the option to import your CV or use a LinkedIn profile which will auto populate the online application. A reminder to check your junk mail for our email communications and add us to your safe senders list to ensure all future email communication is received.
Exciting Opportunity for SOC Analyst in Hemel Hempstead, UK!Are you a dynamic SOC Analyst looking to make a real impact in the aerospace, defence, and security sectors? Join our esteemed consulting firm committed to delivering top-tier services to a diverse range of clients. We're seeking fresh perspectives and experienced individuals ready to innovate and advance our Security Operations Centre (SOC) team.Location: Hemel Hempstead, United KingdomShift: 24 X 7 onsite rotation in Hemel HempsteadRequirements: Proven experience in a Security Operations Centre SIEM proficiency with Sentinel or Splunk Familiarity with the Mitre Att&ck Framework Deep expertise in log data analysis and intrusion detection systems Detail-oriented with strong organizational and analytical skills Ability to obtain and maintain SC level Security Clearance Basic knowledge of client-server applications, web applications, databases, firewalls, VPNs, and enterprise Anti-Virus products Understanding of networking principles including TCP/IP, WANs, LANs, and Internet protocols Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure Conduct thorough examination of system events, logs, and network traffic for security flaws Assist in containment, eradication, and recovery efforts during incident response Keep the team updated on security operations, triage, and SOC tool expertise Prepare in-depth reports for technical and non-technical audiences Analyze and enhance detection rules using threat-informed defense and Mitre Att&ck Maintain documentation of security incidents and participate in threat intelligence operations Benefits: Opportunity for career advancement in a challenging and stimulating environment Work alongside industry experts in aerospace, defence, and security sectors Continuous learning and development opportunities Please Note: Due to the high level of Security clearance required, applicants must be British Nationals.Ready to take your SOC career to new heights? Apply now to join this innovative team in Hemel Hempstead!If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Mar 25, 2024
Full time
Exciting Opportunity for SOC Analyst in Hemel Hempstead, UK!Are you a dynamic SOC Analyst looking to make a real impact in the aerospace, defence, and security sectors? Join our esteemed consulting firm committed to delivering top-tier services to a diverse range of clients. We're seeking fresh perspectives and experienced individuals ready to innovate and advance our Security Operations Centre (SOC) team.Location: Hemel Hempstead, United KingdomShift: 24 X 7 onsite rotation in Hemel HempsteadRequirements: Proven experience in a Security Operations Centre SIEM proficiency with Sentinel or Splunk Familiarity with the Mitre Att&ck Framework Deep expertise in log data analysis and intrusion detection systems Detail-oriented with strong organizational and analytical skills Ability to obtain and maintain SC level Security Clearance Basic knowledge of client-server applications, web applications, databases, firewalls, VPNs, and enterprise Anti-Virus products Understanding of networking principles including TCP/IP, WANs, LANs, and Internet protocols Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure Conduct thorough examination of system events, logs, and network traffic for security flaws Assist in containment, eradication, and recovery efforts during incident response Keep the team updated on security operations, triage, and SOC tool expertise Prepare in-depth reports for technical and non-technical audiences Analyze and enhance detection rules using threat-informed defense and Mitre Att&ck Maintain documentation of security incidents and participate in threat intelligence operations Benefits: Opportunity for career advancement in a challenging and stimulating environment Work alongside industry experts in aerospace, defence, and security sectors Continuous learning and development opportunities Please Note: Due to the high level of Security clearance required, applicants must be British Nationals.Ready to take your SOC career to new heights? Apply now to join this innovative team in Hemel Hempstead!If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Security Operations Team Leader - Financial Services - FTSE 8 - £80,000 - £90,000 + Fantastic Benefits Including up to 60% Bonus, Free Lunch, Onsite Gym Access + Remote Working Overview: Our client, a leading FTSE 8 Financial Services organisation who operate heavily within the commodities sector are looking for a Security Operations Team Leader to join their London team with remote working. You will be responsible for the coordination of the security operations within the IT environment, ensuring timely incident response and efficient coordination between stakeholders. Role & Responsibilities: Responsible for the selection, deployment and ongoing maintenance of cyber defence related technology such as Endpoint Detect and Response, Anti-Virus, sandboxes, SIEM, SOAR and script library. Control and coordinate the monitoring and use of cyber defence tools, managing ticket and team performance and driving efficiency where possible. Develop Standard Operating Procedures (SOPs) and other publications to support cyber operations team in conducting their work/responding to tickets. Respond to cyber related events and incidents and manage and coordinate cyber operations personnel during the remediation phase and post incident review phase. Enable threat hunting through the fusion of threat intelligence and business risk and produce forecasting products around future threats. Own, build and maintain cyber security related technologies, including basic programming and scripting. Manage a global team of IT security operations analysts, and support their development and ongoing training. Experience Required: Professional certifications and experience in Information Security from industry standard security frameworks, e.g. ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA and key security vendors including Microsoft, Crowdstrike, Qualys, IBM. Scripting and programming Endpoint Detect and Response tools / Anti Virus tools/ Network traffic packet analysis / Sandboxing and malware analysis Threat hunting methodologies Understanding of network protocols, architectures, and components Familiarity with firewalls, intrusion detection/prevention systems (IDS/IPS), and network monitoring tools Ability to configure and manage network security devices Proficiency in securing various operating systems, including Windows, Linux, and macOS Knowledge of large scale security technology deployments - SIEM/SOAR/EDR/NDR Strong understanding of leading of technical teams Proficient in investigation of causes of incidents and seeking resolution within diverse but standardised precedents and procedures by applying operational knowledge and learnings from similar past incidents. Coordinate and control threat hunting exercises based on threat intelligence, OSINT and general network observations. Ability to proactively lead the development/improvement of agreed procedures and tools. Package / Details: £80,000 - £90,000 Basic Salary Up to 60% Bonus Remote Working Free Lunch + Many more Security Operations Team Leader - Financial Services - FTSE 8 - £80,000 - £90,000 + Fantastic Benefits Including up to 60% Bonus, Free Lunch, Onsite Gym Access + Remote Working
Mar 25, 2024
Full time
Security Operations Team Leader - Financial Services - FTSE 8 - £80,000 - £90,000 + Fantastic Benefits Including up to 60% Bonus, Free Lunch, Onsite Gym Access + Remote Working Overview: Our client, a leading FTSE 8 Financial Services organisation who operate heavily within the commodities sector are looking for a Security Operations Team Leader to join their London team with remote working. You will be responsible for the coordination of the security operations within the IT environment, ensuring timely incident response and efficient coordination between stakeholders. Role & Responsibilities: Responsible for the selection, deployment and ongoing maintenance of cyber defence related technology such as Endpoint Detect and Response, Anti-Virus, sandboxes, SIEM, SOAR and script library. Control and coordinate the monitoring and use of cyber defence tools, managing ticket and team performance and driving efficiency where possible. Develop Standard Operating Procedures (SOPs) and other publications to support cyber operations team in conducting their work/responding to tickets. Respond to cyber related events and incidents and manage and coordinate cyber operations personnel during the remediation phase and post incident review phase. Enable threat hunting through the fusion of threat intelligence and business risk and produce forecasting products around future threats. Own, build and maintain cyber security related technologies, including basic programming and scripting. Manage a global team of IT security operations analysts, and support their development and ongoing training. Experience Required: Professional certifications and experience in Information Security from industry standard security frameworks, e.g. ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA and key security vendors including Microsoft, Crowdstrike, Qualys, IBM. Scripting and programming Endpoint Detect and Response tools / Anti Virus tools/ Network traffic packet analysis / Sandboxing and malware analysis Threat hunting methodologies Understanding of network protocols, architectures, and components Familiarity with firewalls, intrusion detection/prevention systems (IDS/IPS), and network monitoring tools Ability to configure and manage network security devices Proficiency in securing various operating systems, including Windows, Linux, and macOS Knowledge of large scale security technology deployments - SIEM/SOAR/EDR/NDR Strong understanding of leading of technical teams Proficient in investigation of causes of incidents and seeking resolution within diverse but standardised precedents and procedures by applying operational knowledge and learnings from similar past incidents. Coordinate and control threat hunting exercises based on threat intelligence, OSINT and general network observations. Ability to proactively lead the development/improvement of agreed procedures and tools. Package / Details: £80,000 - £90,000 Basic Salary Up to 60% Bonus Remote Working Free Lunch + Many more Security Operations Team Leader - Financial Services - FTSE 8 - £80,000 - £90,000 + Fantastic Benefits Including up to 60% Bonus, Free Lunch, Onsite Gym Access + Remote Working
SOC Shift Leader ONSITE Hemel Hempstead, United Kingdom To continue improving the Security Operations Centre (SOC), a SOC Shift Leader is needed to join a top consulting firm that works in the aerospace, defence, and security sectors. My client is committed to providing a wide range of clients with effective and efficient services. Therefore, we are seeking SOC Shift Leader who can provide fresh perspectives and abilities to our innovative team. You will be leading and mentoring a small shift of SOC analysts who are eager to advance. This role is on a 24 X 7 shift pattern on site in Hemel Hempstead. Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure. Lead a small team of SOC Analyst on shift. Conduct a thorough examination of system events, logs, and network traffic to spot any security flaws. Facilitate containment, eradication, and recovery efforts by offering support for incident response Help the team stay up to date on security operations, triage, and SOC tool expertise. In-depth reports for both technical and non-technical audiences should be prepared for managed customers. Using threat-informed defence and Mitre Att&ck, analyse and improve detection rules and use cases. Keep up to current and maintain documentation of security incidents, such as incident reports, analytical results, and mitigating techniques. Whenever necessary, participate in threat intelligence operations. Requirements: Proven experience in a Security Operations Centre. SIEM experience with Sentinel or Splunk. Knowledge and experience with the Mitre Att&ck Framework. Deep technical expertise in log data analysis and intrusion detection systems. Detail-oriented, with strong organizational and analytical skills. Ability to obtain and maintain SC level Security Clearance. Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products. Good understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. Able to work shifts from our office in Hemel Hempstead. A great opportunity for a SOC professional to push there career forward in a challenging and exciting environment. Due to the high level of Security clearance required applicants must have been in the UK for the last 5 years and ideally be British citizens. If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Mar 25, 2024
Full time
SOC Shift Leader ONSITE Hemel Hempstead, United Kingdom To continue improving the Security Operations Centre (SOC), a SOC Shift Leader is needed to join a top consulting firm that works in the aerospace, defence, and security sectors. My client is committed to providing a wide range of clients with effective and efficient services. Therefore, we are seeking SOC Shift Leader who can provide fresh perspectives and abilities to our innovative team. You will be leading and mentoring a small shift of SOC analysts who are eager to advance. This role is on a 24 X 7 shift pattern on site in Hemel Hempstead. Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure. Lead a small team of SOC Analyst on shift. Conduct a thorough examination of system events, logs, and network traffic to spot any security flaws. Facilitate containment, eradication, and recovery efforts by offering support for incident response Help the team stay up to date on security operations, triage, and SOC tool expertise. In-depth reports for both technical and non-technical audiences should be prepared for managed customers. Using threat-informed defence and Mitre Att&ck, analyse and improve detection rules and use cases. Keep up to current and maintain documentation of security incidents, such as incident reports, analytical results, and mitigating techniques. Whenever necessary, participate in threat intelligence operations. Requirements: Proven experience in a Security Operations Centre. SIEM experience with Sentinel or Splunk. Knowledge and experience with the Mitre Att&ck Framework. Deep technical expertise in log data analysis and intrusion detection systems. Detail-oriented, with strong organizational and analytical skills. Ability to obtain and maintain SC level Security Clearance. Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products. Good understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. Able to work shifts from our office in Hemel Hempstead. A great opportunity for a SOC professional to push there career forward in a challenging and exciting environment. Due to the high level of Security clearance required applicants must have been in the UK for the last 5 years and ideally be British citizens. If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Exciting Opportunity for SOC Analyst in Hemel Hempstead, UK! Are you a dynamic SOC Analyst looking to make a real impact in the aerospace, defence, and security sectors? Join our esteemed consulting firm committed to delivering top-tier services to a diverse range of clients. We're seeking fresh perspectives and experienced individuals ready to innovate and advance our Security Operations Centre (SOC) team. Location: Hemel Hempstead, United Kingdom Shift: 24 X 7 onsite rotation in Hemel Hempstead Requirements: Proven experience in a Security Operations Centre SIEM proficiency with Sentinel or Splunk Familiarity with the Mitre Att&ck Framework Deep expertise in log data analysis and intrusion detection systems Detail-oriented with strong organizational and analytical skills Ability to obtain and maintain SC level Security Clearance Basic knowledge of client-server applications, web applications, databases, firewalls, VPNs, and enterprise Anti-Virus products Understanding of networking principles including TCP/IP, WANs, LANs, and Internet protocols Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure Conduct thorough examination of system events, logs, and network traffic for security flaws Assist in containment, eradication, and recovery efforts during incident response Keep the team updated on security operations, triage, and SOC tool expertise Prepare in-depth reports for technical and non-technical audiences Analyze and enhance detection rules using threat-informed defense and Mitre Att&ck Maintain documentation of security incidents and participate in threat intelligence operations Benefits: Opportunity for career advancement in a challenging and stimulating environment Work alongside industry experts in aerospace, defence, and security sectors Continuous learning and development opportunities Please Note: Due to the high level of Security clearance required, applicants must be British Nationals. Ready to take your SOC career to new heights? Apply now to join this innovative team in Hemel Hempstead! If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Mar 25, 2024
Full time
Exciting Opportunity for SOC Analyst in Hemel Hempstead, UK! Are you a dynamic SOC Analyst looking to make a real impact in the aerospace, defence, and security sectors? Join our esteemed consulting firm committed to delivering top-tier services to a diverse range of clients. We're seeking fresh perspectives and experienced individuals ready to innovate and advance our Security Operations Centre (SOC) team. Location: Hemel Hempstead, United Kingdom Shift: 24 X 7 onsite rotation in Hemel Hempstead Requirements: Proven experience in a Security Operations Centre SIEM proficiency with Sentinel or Splunk Familiarity with the Mitre Att&ck Framework Deep expertise in log data analysis and intrusion detection systems Detail-oriented with strong organizational and analytical skills Ability to obtain and maintain SC level Security Clearance Basic knowledge of client-server applications, web applications, databases, firewalls, VPNs, and enterprise Anti-Virus products Understanding of networking principles including TCP/IP, WANs, LANs, and Internet protocols Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure Conduct thorough examination of system events, logs, and network traffic for security flaws Assist in containment, eradication, and recovery efforts during incident response Keep the team updated on security operations, triage, and SOC tool expertise Prepare in-depth reports for technical and non-technical audiences Analyze and enhance detection rules using threat-informed defense and Mitre Att&ck Maintain documentation of security incidents and participate in threat intelligence operations Benefits: Opportunity for career advancement in a challenging and stimulating environment Work alongside industry experts in aerospace, defence, and security sectors Continuous learning and development opportunities Please Note: Due to the high level of Security clearance required, applicants must be British Nationals. Ready to take your SOC career to new heights? Apply now to join this innovative team in Hemel Hempstead! If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in touch.
Job Title: SOC Analyst Contract Details: Permanent Salary: £43,000 - £46,000 per annum ? About Our Client: Our client, a leading financial services organisation, is seeking an experienced and highly skilled SOC Analyst to join their dynamic and innovative cybersecurity team. As an SOC Analyst, you will play a crucial role in protecting our client's reputation, organisational and customer data, while ensuring that key business objectives are met securely and efficiently. ? Benefits & Perks: Competitive salary package Opportunities for professional development and growth Excellent work-life balance Comprehensive benefits package including private healthcare, dental and retail discounts Responsibilities: Monitor security alerts and events to identify potential threats, using cutting-edge technologies. Execute incident response procedures to contain, eradicate, and recover from security incidents. Stay informed about the latest cybersecurity threats, vulnerabilities, and attack vectors. Identify and assess vulnerabilities in the organisation's systems and networks. Collaborate with cross-functional teams to implement and optimise security measures. Essential Requirements: Proven experience as a SOC Analyst with a strong focus on using Microsoft Sentinel. In-depth understanding of cybersecurity principles, protocols, and best practises. Proficiency in writing custom queries and creating dashboards within Microsoft Sentinel. Experience with incident response, threat intelligence, and vulnerability management. Familiarity with other security tools and technologies complementing Microsoft Sentinel. Strong analytical and problem-solving skills. Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
Mar 22, 2024
Full time
Job Title: SOC Analyst Contract Details: Permanent Salary: £43,000 - £46,000 per annum ? About Our Client: Our client, a leading financial services organisation, is seeking an experienced and highly skilled SOC Analyst to join their dynamic and innovative cybersecurity team. As an SOC Analyst, you will play a crucial role in protecting our client's reputation, organisational and customer data, while ensuring that key business objectives are met securely and efficiently. ? Benefits & Perks: Competitive salary package Opportunities for professional development and growth Excellent work-life balance Comprehensive benefits package including private healthcare, dental and retail discounts Responsibilities: Monitor security alerts and events to identify potential threats, using cutting-edge technologies. Execute incident response procedures to contain, eradicate, and recover from security incidents. Stay informed about the latest cybersecurity threats, vulnerabilities, and attack vectors. Identify and assess vulnerabilities in the organisation's systems and networks. Collaborate with cross-functional teams to implement and optimise security measures. Essential Requirements: Proven experience as a SOC Analyst with a strong focus on using Microsoft Sentinel. In-depth understanding of cybersecurity principles, protocols, and best practises. Proficiency in writing custom queries and creating dashboards within Microsoft Sentinel. Experience with incident response, threat intelligence, and vulnerability management. Familiarity with other security tools and technologies complementing Microsoft Sentinel. Strong analytical and problem-solving skills. Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
ROLE SUMMARY The Global Information Security (GIS) organization delivers proactive cyber defense for the global Pfizer enterprise. Our mission is to secure all of Pfizer's information assets ranging from the manufacturing floor to the core data centers and out to the patient facing solutions. We achieve this mission through a team of world-class talent, utilizing top-tier technologies, advanced analytics, and the promotion of a cybersecurity ownership culture across the company. The Cyber Threat Intelligence team works with internal and external partners to reduce risk to Pfizer. The team provides timely situational awareness, conducts in depth analysis of threats, and translates indicators of threat into actionable information to reduce impact to Pfizer. Stakeholders include cybersecurity response teams, internal lines of business, senior leadership, external organizations such as law enforcement, and industry peers and intelligence sharing partners. The Senior Cyber Intelligence Analyst is responsible for conducting in-depth research, documentation, and intelligence analysis of key cyber threats, including threat actor tactics, techniques, and procedures (TTPs), to develop a comprehensive picture of the cyber threat landscape, improve Pfizer's security posture, and reduce risk. This individual will provide domain expertise to aid in the effective prioritization and analysis of threats in line with the needs of our stakeholders. The individual will have experience successfully executing all phases of the intelligence lifecycle in support of driving an intelligence led security organization. An ideal candidate for this role will have technical, communication, and interpersonal skills with previous experience mentoring peer CTI analysts and leading CTI initiatives. The position is an individual contributor role that will engage with cross functional internal colleagues and external partners and reports to the Director, Global Threat Research within the Pfizer Digital Global Information Security organization. ROLE RESPONSIBILITIES Perform intelligence analysis of cyber threat activity through execution of the threat intelligence lifecycle. Conduct in-depth intrusion analysis of cyber threats utilizing frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model and MITRE ATT&CK. Develop strategic, tactical, and operational intelligence products for stakeholder dissemination in support of priority intelligence requirements. Curate threat intelligence related to the cyber threat landscape such as threat actors, malware, vulnerabilities and tactics, techniques, and procedures. Present cyber threat intelligence to stakeholders that helps drive both tactical and strategic priorities. Participate in and lead team projects centered around the cyber threat intelligence mission. Mentor peer CTI analysts through on the job training opportunities. Interface with external sharing communities through the sharing of timely and relevant cyber threats. QUALIFICATIONS BS in Information Security, Computer Sciences, Information Systems, Engineering, or equivalent with demonstrable professional experience in a corporate environment. Experience in understanding the techniques of Computer Network Exploitation and Defense (CNE / CND). Experience using frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model and MITRE ATT&CK. Experience in information analysis and execution of the intelligence lifecycle. Experience developing and curating intelligence related to the cyber threat landscape such as threat actors, malware, vulnerabilities and tactics, techniques, and procedures. Experience with translating threat intelligence from OSINT and private intelligence reports into custom detections and mitigations across multiple security technologies. Experience performing technical indicator and TTP analysis using both open and closed source intelligence sources Ability to provide concise and accurate communications (both verbal and written) in disseminated intelligence products. Ability to communicate and establish rapport with a global team of incident responders and intelligence analysts. Experience mentoring peer analysts in all stages of the intelligence lifecycle. Work Location Assignment: Flexible
Aug 19, 2023
Full time
ROLE SUMMARY The Global Information Security (GIS) organization delivers proactive cyber defense for the global Pfizer enterprise. Our mission is to secure all of Pfizer's information assets ranging from the manufacturing floor to the core data centers and out to the patient facing solutions. We achieve this mission through a team of world-class talent, utilizing top-tier technologies, advanced analytics, and the promotion of a cybersecurity ownership culture across the company. The Cyber Threat Intelligence team works with internal and external partners to reduce risk to Pfizer. The team provides timely situational awareness, conducts in depth analysis of threats, and translates indicators of threat into actionable information to reduce impact to Pfizer. Stakeholders include cybersecurity response teams, internal lines of business, senior leadership, external organizations such as law enforcement, and industry peers and intelligence sharing partners. The Senior Cyber Intelligence Analyst is responsible for conducting in-depth research, documentation, and intelligence analysis of key cyber threats, including threat actor tactics, techniques, and procedures (TTPs), to develop a comprehensive picture of the cyber threat landscape, improve Pfizer's security posture, and reduce risk. This individual will provide domain expertise to aid in the effective prioritization and analysis of threats in line with the needs of our stakeholders. The individual will have experience successfully executing all phases of the intelligence lifecycle in support of driving an intelligence led security organization. An ideal candidate for this role will have technical, communication, and interpersonal skills with previous experience mentoring peer CTI analysts and leading CTI initiatives. The position is an individual contributor role that will engage with cross functional internal colleagues and external partners and reports to the Director, Global Threat Research within the Pfizer Digital Global Information Security organization. ROLE RESPONSIBILITIES Perform intelligence analysis of cyber threat activity through execution of the threat intelligence lifecycle. Conduct in-depth intrusion analysis of cyber threats utilizing frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model and MITRE ATT&CK. Develop strategic, tactical, and operational intelligence products for stakeholder dissemination in support of priority intelligence requirements. Curate threat intelligence related to the cyber threat landscape such as threat actors, malware, vulnerabilities and tactics, techniques, and procedures. Present cyber threat intelligence to stakeholders that helps drive both tactical and strategic priorities. Participate in and lead team projects centered around the cyber threat intelligence mission. Mentor peer CTI analysts through on the job training opportunities. Interface with external sharing communities through the sharing of timely and relevant cyber threats. QUALIFICATIONS BS in Information Security, Computer Sciences, Information Systems, Engineering, or equivalent with demonstrable professional experience in a corporate environment. Experience in understanding the techniques of Computer Network Exploitation and Defense (CNE / CND). Experience using frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model and MITRE ATT&CK. Experience in information analysis and execution of the intelligence lifecycle. Experience developing and curating intelligence related to the cyber threat landscape such as threat actors, malware, vulnerabilities and tactics, techniques, and procedures. Experience with translating threat intelligence from OSINT and private intelligence reports into custom detections and mitigations across multiple security technologies. Experience performing technical indicator and TTP analysis using both open and closed source intelligence sources Ability to provide concise and accurate communications (both verbal and written) in disseminated intelligence products. Ability to communicate and establish rapport with a global team of incident responders and intelligence analysts. Experience mentoring peer analysts in all stages of the intelligence lifecycle. Work Location Assignment: Flexible
Job Description: Job Title: Application Security Analyst Corporate Title: Vice President Location: Chester Role Description: Resource will function as a member of an enterprise network application layer intrusion, detection, prevention, and response team. Will develop and implement custom alerts and dashboards monitoring controls based on OSI layer 7 attack and threat indicators. Provides leadership in assessing new threat vectors and designing and implementing effective controls. Leverages advanced investigative skills using best in class data correlation and network/packet analysis tools. Will partner with senior leaders from lines of business organizations to triage security events and report on impacting security initiatives. Responsible for mentoring and developing the skill sets of less experienced team members. Develops and implements processes or controls in support of audit and risk requirements. The Team: The Network and Endpoint Cybersecurity Operations team provides the first line of defense for Bank of America's global network. It defends against various threats including DDoS, Malware, Web Based Attacks, Remote Attacks, and provides network access assurance across our network and endpoint boundaries. Provides network and endpoint anomaly monitoring for indicators of compromise, and a 24x7 rapid response capability for network and endpoint security related events and incidents. Core Skills: Required Skills: Strong Splunk skill set. The security analyst will leverage Splunk to analyze logs and other security events to find targeted attacks against network-based bank assets. Strong Intrusion Analysis background. Resource must be able to identify and interpret weblogs from various webservers. Knowledgeable of current exploits. Resource must be able to identify common exploits from the appropriate web and event logs. Working knowledge of Linux, Windows, and OS X operating systems. Comfortable with scripting languages and regular expressions Strong knowledge common network protocols Working knowledge of enterprise Client / Server architecture Working knowledge of OSI model 3 through 7 We are a front-line team that handles active security events and highly current threats. On call and after-hours work can be expected although we rotate to approximately one week every 2 months. The analyst will use new intelligence to update existing controls to detect new threats against the bank. Will be expected to have solid technical skills to operate independently and to support others within the security team. Preferred Skills: Experience doing packet captures and interpreting them (wireshark for example). Understanding of stateful firewalls and able to interpret firewall rules. Able to interpret SQL, Apache web logs, IIS, Active Directory and other security logs. Full understanding of modern web site deployments and technology. Familiarity with web application attacks including SQL injection, cross-site scripting, and remote file inclusion. Use tools to detect anomalous/malicious data transmissions on the network. Use advanced analytics / security tools to detect malware on the network. Bank of America: Every day, across the globe, our employees bring a commitment to our purpose and to driving responsible growth by living our values: deliver together, act responsibly, realize the power of our people and trust the team. A key aspect of driving responsible growth is doing so in a sustainable manner, a critical pillar of which is being a great place to work for our teammates. In line with these values, in EMEA we have 9 Employee Networks, a wide range of Sports & Social clubs, and other development and networking opportunities so that you can enjoy a range of experiences and connect with colleagues across the bank. We also offer exclusive discounts to some of the most iconic cultural experiences for you to enjoy in your spare time outside of work. Learn more about our benefits here. Good conduct and sound judgment is crucial to our long term success. It's important that all employees in the organisation understand the expected standards of conduct and how we manage conduct risk. Individual accountability and an ownership mind-set are the cornerstones of our Code of Conduct and are at the heart of managing risk well. We are an equal opportunities employer, and ensure that no applicant is subject to less favourable treatment on the grounds of gender, gender identity, marital status, race, colour, nationality, ethnic or national origins, age, sexual orientation, socio-economic background, responsibilities for dependants, physical or mental disability. The Bank selects candidates for interview based on their skills, qualifications and experience. We strive to ensure that our recruitment processes are accessible for all candidates and encourage any candidates to tell us about any adjustment requirements. As part of our standard hiring process to manage risk, please note background screening checks will be conducted on all hires before commencing employment. Job Band: H5 Shift: Hours Per Week: 35 Weekly Schedule: Referral Bonus Amount: 0
Sep 24, 2022
Full time
Job Description: Job Title: Application Security Analyst Corporate Title: Vice President Location: Chester Role Description: Resource will function as a member of an enterprise network application layer intrusion, detection, prevention, and response team. Will develop and implement custom alerts and dashboards monitoring controls based on OSI layer 7 attack and threat indicators. Provides leadership in assessing new threat vectors and designing and implementing effective controls. Leverages advanced investigative skills using best in class data correlation and network/packet analysis tools. Will partner with senior leaders from lines of business organizations to triage security events and report on impacting security initiatives. Responsible for mentoring and developing the skill sets of less experienced team members. Develops and implements processes or controls in support of audit and risk requirements. The Team: The Network and Endpoint Cybersecurity Operations team provides the first line of defense for Bank of America's global network. It defends against various threats including DDoS, Malware, Web Based Attacks, Remote Attacks, and provides network access assurance across our network and endpoint boundaries. Provides network and endpoint anomaly monitoring for indicators of compromise, and a 24x7 rapid response capability for network and endpoint security related events and incidents. Core Skills: Required Skills: Strong Splunk skill set. The security analyst will leverage Splunk to analyze logs and other security events to find targeted attacks against network-based bank assets. Strong Intrusion Analysis background. Resource must be able to identify and interpret weblogs from various webservers. Knowledgeable of current exploits. Resource must be able to identify common exploits from the appropriate web and event logs. Working knowledge of Linux, Windows, and OS X operating systems. Comfortable with scripting languages and regular expressions Strong knowledge common network protocols Working knowledge of enterprise Client / Server architecture Working knowledge of OSI model 3 through 7 We are a front-line team that handles active security events and highly current threats. On call and after-hours work can be expected although we rotate to approximately one week every 2 months. The analyst will use new intelligence to update existing controls to detect new threats against the bank. Will be expected to have solid technical skills to operate independently and to support others within the security team. Preferred Skills: Experience doing packet captures and interpreting them (wireshark for example). Understanding of stateful firewalls and able to interpret firewall rules. Able to interpret SQL, Apache web logs, IIS, Active Directory and other security logs. Full understanding of modern web site deployments and technology. Familiarity with web application attacks including SQL injection, cross-site scripting, and remote file inclusion. Use tools to detect anomalous/malicious data transmissions on the network. Use advanced analytics / security tools to detect malware on the network. Bank of America: Every day, across the globe, our employees bring a commitment to our purpose and to driving responsible growth by living our values: deliver together, act responsibly, realize the power of our people and trust the team. A key aspect of driving responsible growth is doing so in a sustainable manner, a critical pillar of which is being a great place to work for our teammates. In line with these values, in EMEA we have 9 Employee Networks, a wide range of Sports & Social clubs, and other development and networking opportunities so that you can enjoy a range of experiences and connect with colleagues across the bank. We also offer exclusive discounts to some of the most iconic cultural experiences for you to enjoy in your spare time outside of work. Learn more about our benefits here. Good conduct and sound judgment is crucial to our long term success. It's important that all employees in the organisation understand the expected standards of conduct and how we manage conduct risk. Individual accountability and an ownership mind-set are the cornerstones of our Code of Conduct and are at the heart of managing risk well. We are an equal opportunities employer, and ensure that no applicant is subject to less favourable treatment on the grounds of gender, gender identity, marital status, race, colour, nationality, ethnic or national origins, age, sexual orientation, socio-economic background, responsibilities for dependants, physical or mental disability. The Bank selects candidates for interview based on their skills, qualifications and experience. We strive to ensure that our recruitment processes are accessible for all candidates and encourage any candidates to tell us about any adjustment requirements. As part of our standard hiring process to manage risk, please note background screening checks will be conducted on all hires before commencing employment. Job Band: H5 Shift: Hours Per Week: 35 Weekly Schedule: Referral Bonus Amount: 0
Malware Reverse Engineer Location: Remote working - Office based in Reading Salary: Competitive Salary and Benefits Career Level : Specialist, Associate Manager or Manager About Accenture Cyber Threat Intelligence (ACTI) ACTI is a global team that spans 13 countries and 4 continents and speaks more than 30 languages. We are passionate about delivering intelligence analysis, and providing industry-leading analytic insights, cyber context, and critical services our clients need to achieve their business-line and strategic-growth initiatives. We know success is only possible by developing and supporting our most-critical resources: our talented analysts, developers, and supporting team members. We value creativity and entrepreneurship in our team; where possible, we back staff initiatives with opportunities and investments. We enjoy the hunt. We strive to automate and innovate while working with powerful resources and differentiated data. Above all else, we value an egoless approach to guiding our clients as they navigate their businesses through all aspects of the cyber domain. Who You Are You are passionate about cybersecurity and intelligence analysis. You stay abreast of the latest threats, recognize the value of intelligence, and believe it should drive operations. You are a devoted team member who is always willing to lend a hand, mentor a colleague, or increase our global team's awareness by sharing your knowledge and approaches with others. You are productive, easy to work with, and understand that adherence to a good process is key to excellence. Role Description As a Malware Reverse Engineer at ACTI, you will reverse engineer and analyze malware to evaluate sophisticated malicious code to settle malware capabilities and purposes. Analysis includes the use of specialized systems and tools, including dissemblers, debuggers, hex editors, unpackers, virtual machines, and those for network traffic analysis. Key Responsibilities Analyze malicious events and campaigns to determine attack vectors and retrieve malware payloads. Reverse engineer files suspected or known to belong to identified malware families to determine their command-and-control (C2) infrastructure and targeting. Incorporate analysis results into detailed reporting to include purpose, behavior, C2 server infrastructure, and mitigation techniques related to analyzed malware families, malicious campaigns, and events. Track prevailing malware families, including downloaders, banking Trojans, information stealers, ransomware, and remote access Trojans. Reverse engineer recently discovered malware variants to check potential feature augmentation or configuration structure changes. Improve existing tools that extract known malware family configurations based on reverse engineering results. Research the latest malware detection evasion techniques, such as use of customized packers, customized crypters, fully undetectable (FUD) techniques, host intrusion prevention system (HIPS) bypassing, and anti-virus (AV) software bypassing. Based on research, design and develop generic unpacking methods and tools for use as standalone tools or within automated analysis systems and sandboxes. Provide customer support by responding to requests related to suspicious file analysis that sometimes require malware reverse engineering and determination of contextual information surrounding indicators of compromise; do so by providing detailed analysis reports and mitigation recommendations. Provide customer support by responding to cybersecurity requests, including those for: open-source intelligence (OSINT) research; domain, IP address, or URL analysis; malicious campaign information; and/or event attribution. Provide answers to specific questions, the answers of which clients use for operational mentorship to aid their strategies. Design, develop, and implement Windows kernel modules to support automated malware analysis; such modules include kernel system service filtering modules able to intercept operating system services on 32-bit and 64-bit Windows operating systems without triggering those systems' self-protection mechanisms, and kernel-mode modules able to force designated processes to load specific modules that load decoders designed for extracting malware configurations. Design, develop, and implement generic unpackers that combat widely used malware packing methods to retrieve malicious payloads from packed malware samples automatically. Create detection rules and signatures for detecting malware families, and provide detection or blocking recommendations. Develop decoders to extract malware configurations-including basic C2 settings or secondary dynamic configurations, such as those outlining targeted institutions and web injects-based on reverse engineering results. Provide junior engineers with technical training, including: training on malware analysis; reverse engineering; Windows internals; and development, identification, unpacking, and de-obfuscation of malicious code. Travel occasionally as this position may require doing so to address client needs, improve results, or otherwise support projects. Basic Qualifications Bachelor's Degree in Computer Forensics, Science, Engineering, Information Systems, or another related security field, or comparable experience. Experience with malware analysis, reverse engineering, and development. Ability to write, understand, and/or analyze code in programming and scripting languages, including Assembly x86/x64, C, C++, Python, JavaScript, Java, PHP, and HTML. Basic knowledge of and experience with malware packers, crypters, and obfuscation techniques. Understanding of operating system internals and the Windows API. Experience with debuggers, decompilers, and network traffic analysis tools. Development experience in Assembly, Python, C, or C++. Strong understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.). Practical understanding of malware analysis and/or reverse engineering, and the ability to develop malware detection signatures (e.g. YARA). Required Skills Ability to analyze and unpack obfuscated code. Strong written and verbal skills; can communicate complex concepts at a high level while retaining accuracy and highlighting features in a way that improves audience engagement. Strong problem solving and critical thinking capabilities. Desired Skills Two or more years of experience in malware analysis, reverse engineering, and development fields. Deep understanding of operating system internals and the Windows API. Ability to work with a high degree of independence. Ability to collaborate in a team environment to focus on a common goal. Show more Show less Qualifications What's in it for you At Accenture in addition to a competitive basic salary, you will alsohave an extensive benefits package which includes 25days' vacation per year, gym subsidy, private medical insurance and 3 extra days leave per year for charitable work of your choice! About Accenture Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. We combine unmatched experience and specialized capabilities across more than 40 industries - powered by the world's largest network of Advanced Technology and Intelligent Operations centers. With 509,000 people serving clients in more than 120 countries, Accenture brings continuous innovation to help clients improve their performance and create lasting value across their enterprises. Visit us at Accenture is an equal opportunities employer and encourages applications from all sections of society and does not discriminate on grounds of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, or gender identity, or any other basis as protected by applicable law. Closing Date for Applications: 30/10/2022 Accenture reserves the right to close the role prior to this date should a suitable applicant be found.
Sep 24, 2022
Full time
Malware Reverse Engineer Location: Remote working - Office based in Reading Salary: Competitive Salary and Benefits Career Level : Specialist, Associate Manager or Manager About Accenture Cyber Threat Intelligence (ACTI) ACTI is a global team that spans 13 countries and 4 continents and speaks more than 30 languages. We are passionate about delivering intelligence analysis, and providing industry-leading analytic insights, cyber context, and critical services our clients need to achieve their business-line and strategic-growth initiatives. We know success is only possible by developing and supporting our most-critical resources: our talented analysts, developers, and supporting team members. We value creativity and entrepreneurship in our team; where possible, we back staff initiatives with opportunities and investments. We enjoy the hunt. We strive to automate and innovate while working with powerful resources and differentiated data. Above all else, we value an egoless approach to guiding our clients as they navigate their businesses through all aspects of the cyber domain. Who You Are You are passionate about cybersecurity and intelligence analysis. You stay abreast of the latest threats, recognize the value of intelligence, and believe it should drive operations. You are a devoted team member who is always willing to lend a hand, mentor a colleague, or increase our global team's awareness by sharing your knowledge and approaches with others. You are productive, easy to work with, and understand that adherence to a good process is key to excellence. Role Description As a Malware Reverse Engineer at ACTI, you will reverse engineer and analyze malware to evaluate sophisticated malicious code to settle malware capabilities and purposes. Analysis includes the use of specialized systems and tools, including dissemblers, debuggers, hex editors, unpackers, virtual machines, and those for network traffic analysis. Key Responsibilities Analyze malicious events and campaigns to determine attack vectors and retrieve malware payloads. Reverse engineer files suspected or known to belong to identified malware families to determine their command-and-control (C2) infrastructure and targeting. Incorporate analysis results into detailed reporting to include purpose, behavior, C2 server infrastructure, and mitigation techniques related to analyzed malware families, malicious campaigns, and events. Track prevailing malware families, including downloaders, banking Trojans, information stealers, ransomware, and remote access Trojans. Reverse engineer recently discovered malware variants to check potential feature augmentation or configuration structure changes. Improve existing tools that extract known malware family configurations based on reverse engineering results. Research the latest malware detection evasion techniques, such as use of customized packers, customized crypters, fully undetectable (FUD) techniques, host intrusion prevention system (HIPS) bypassing, and anti-virus (AV) software bypassing. Based on research, design and develop generic unpacking methods and tools for use as standalone tools or within automated analysis systems and sandboxes. Provide customer support by responding to requests related to suspicious file analysis that sometimes require malware reverse engineering and determination of contextual information surrounding indicators of compromise; do so by providing detailed analysis reports and mitigation recommendations. Provide customer support by responding to cybersecurity requests, including those for: open-source intelligence (OSINT) research; domain, IP address, or URL analysis; malicious campaign information; and/or event attribution. Provide answers to specific questions, the answers of which clients use for operational mentorship to aid their strategies. Design, develop, and implement Windows kernel modules to support automated malware analysis; such modules include kernel system service filtering modules able to intercept operating system services on 32-bit and 64-bit Windows operating systems without triggering those systems' self-protection mechanisms, and kernel-mode modules able to force designated processes to load specific modules that load decoders designed for extracting malware configurations. Design, develop, and implement generic unpackers that combat widely used malware packing methods to retrieve malicious payloads from packed malware samples automatically. Create detection rules and signatures for detecting malware families, and provide detection or blocking recommendations. Develop decoders to extract malware configurations-including basic C2 settings or secondary dynamic configurations, such as those outlining targeted institutions and web injects-based on reverse engineering results. Provide junior engineers with technical training, including: training on malware analysis; reverse engineering; Windows internals; and development, identification, unpacking, and de-obfuscation of malicious code. Travel occasionally as this position may require doing so to address client needs, improve results, or otherwise support projects. Basic Qualifications Bachelor's Degree in Computer Forensics, Science, Engineering, Information Systems, or another related security field, or comparable experience. Experience with malware analysis, reverse engineering, and development. Ability to write, understand, and/or analyze code in programming and scripting languages, including Assembly x86/x64, C, C++, Python, JavaScript, Java, PHP, and HTML. Basic knowledge of and experience with malware packers, crypters, and obfuscation techniques. Understanding of operating system internals and the Windows API. Experience with debuggers, decompilers, and network traffic analysis tools. Development experience in Assembly, Python, C, or C++. Strong understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.). Practical understanding of malware analysis and/or reverse engineering, and the ability to develop malware detection signatures (e.g. YARA). Required Skills Ability to analyze and unpack obfuscated code. Strong written and verbal skills; can communicate complex concepts at a high level while retaining accuracy and highlighting features in a way that improves audience engagement. Strong problem solving and critical thinking capabilities. Desired Skills Two or more years of experience in malware analysis, reverse engineering, and development fields. Deep understanding of operating system internals and the Windows API. Ability to work with a high degree of independence. Ability to collaborate in a team environment to focus on a common goal. Show more Show less Qualifications What's in it for you At Accenture in addition to a competitive basic salary, you will alsohave an extensive benefits package which includes 25days' vacation per year, gym subsidy, private medical insurance and 3 extra days leave per year for charitable work of your choice! About Accenture Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. We combine unmatched experience and specialized capabilities across more than 40 industries - powered by the world's largest network of Advanced Technology and Intelligent Operations centers. With 509,000 people serving clients in more than 120 countries, Accenture brings continuous innovation to help clients improve their performance and create lasting value across their enterprises. Visit us at Accenture is an equal opportunities employer and encourages applications from all sections of society and does not discriminate on grounds of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, or gender identity, or any other basis as protected by applicable law. Closing Date for Applications: 30/10/2022 Accenture reserves the right to close the role prior to this date should a suitable applicant be found.
BAE Systems Digital Intelligence
Guildford, Surrey
JOB ROLE BIO BAE Systems Digital Intelligence works with governments and businesses around the world to help them defend against cyber threats, reduce their risk in the connected world, comply with regulation and transform their operations. The Wireless Products group works with customers to develop innovative mission critical technology. Applications include software radios, space technology and underwater systems. We are looking for bright, enthusiastic and committed individuals to work as electronics engineers in one of our customer-facing product teams. Relevant industry experience is preferable but most of all we are looking for bright, enthusiastic and committed individuals with a strong academic background and the ability to learn quickly. We have a range of roles available, from graduate entry through to experienced engineers. We are interested in hearing from anyone who can make a strong contribution to our work. What you could be doing for us We'd like to hear from people keen to develop their career in engineering who have a baseline of experience in some or all of the following areas that we cover: RF PCB development. We design a variety of RF circuit boards ranging from low power embedded sensors, designed for use in harsh environments, through to high performance analogue designs for radio equipment covering bands from VLF through to millimetre wave systems. This development may involve modelling (eg using Matlab, Agilent ADS, CST, Spice etc) as well as schematic capture and RF circuit board layout. Digital, mixed signal and power PCB development. We develop a wide range of boards such as state-of-the art digital signal processing platforms incorporating the latest FPGAs, SoCs and processors. Mechanical design and system integration. We design chassis and enclosures for our PCBs to ensure the optimum solution for its intended environment. The designs have to be easily assembled and repaired through life but also provide for cooling and protection in challenging environments. This work often involves compliance testing for CE, airborne, military and space applications. System engineering. Most of our solutions comprise of a blend of hardware, firmware and software. Early in the development lifecycle you will be involved in the design activity responsible for partitioning the functionality in to these domains taking into account the requirements and constraints. Development work, depending on the level of seniority, will include: Client interaction to understand and influence requirements, deliver solutions and be involved in bidding for new work. Development team lead, including mentoring junior engineering staff. Research and monitoring of developments in relevant technology to maintain and enhance our leading-edge capability. The main emphasis of this role is the implementation and delivery of hardware solutions; advice and support from senior technical specialists is expected to be provided, particularly in the early stages of design What background are we looking for? We are looking for ambitious, high-calibre people with the following characteristics: Highly motivated with a strong academic background typically in Engineering or Physics a 2:1 or 1st class degree. Understanding of the principles of PCB circuit design and layout. Understanding of the principles of mechanical design. Experience with 3D CAD would be an advantage, but is not essential. Proven record of set-to-work and verification of complex hardware, sometimes under demanding project timescales. Competent in the use of laboratory measurement equipment (eg oscilloscopes, spectrum analysers, vector network analysers etc). An appreciation of the technologies involved in software radio. Experience in the use of software and firmware development tools and environments, e.g. C/C++, Java, Linux, particularly as needed to support hardware test and debug. Comfortable working on multiple projects at the same time and in a dynamic environment where deadlines and priorities are changeable. Experience of working within multi-disciplinary development teams in a project-based environment. Client-facing experience and influencing skills, as well as strong inter-personal skills. Experience of designing products for production. Experience of designing products for compliance against industry standards (eg CE, FCC, DEF STAN). How we will support you: Work-life balance is important; you'll get 25 days holiday a year and, via our flexible benefits package the option to buy/sell and carry over from the year before Our flexible benefits package includes; private medical and dental insurance, a competitive pension scheme, cycle to work scheme, taste cards and more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme You are welcome to join any/all of our Diversity and Support groups. These groups cover everything from gender diversity to mental health and wellbeing. About BAE Systems Digital Intelligence: We help nations, governments and businesses around the world defend themselves against cyber-crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. Security Clearance Only those with the permanent and unrestricted right to live and work in the UK will be considered for a position within BAE Systems Digital Intelligence. Due to the nature of our work, successful candidates for this role will be required to go through Government SC clearance prior to starting with us. Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance wellbeing. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Digital Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours.
Sep 24, 2022
Full time
JOB ROLE BIO BAE Systems Digital Intelligence works with governments and businesses around the world to help them defend against cyber threats, reduce their risk in the connected world, comply with regulation and transform their operations. The Wireless Products group works with customers to develop innovative mission critical technology. Applications include software radios, space technology and underwater systems. We are looking for bright, enthusiastic and committed individuals to work as electronics engineers in one of our customer-facing product teams. Relevant industry experience is preferable but most of all we are looking for bright, enthusiastic and committed individuals with a strong academic background and the ability to learn quickly. We have a range of roles available, from graduate entry through to experienced engineers. We are interested in hearing from anyone who can make a strong contribution to our work. What you could be doing for us We'd like to hear from people keen to develop their career in engineering who have a baseline of experience in some or all of the following areas that we cover: RF PCB development. We design a variety of RF circuit boards ranging from low power embedded sensors, designed for use in harsh environments, through to high performance analogue designs for radio equipment covering bands from VLF through to millimetre wave systems. This development may involve modelling (eg using Matlab, Agilent ADS, CST, Spice etc) as well as schematic capture and RF circuit board layout. Digital, mixed signal and power PCB development. We develop a wide range of boards such as state-of-the art digital signal processing platforms incorporating the latest FPGAs, SoCs and processors. Mechanical design and system integration. We design chassis and enclosures for our PCBs to ensure the optimum solution for its intended environment. The designs have to be easily assembled and repaired through life but also provide for cooling and protection in challenging environments. This work often involves compliance testing for CE, airborne, military and space applications. System engineering. Most of our solutions comprise of a blend of hardware, firmware and software. Early in the development lifecycle you will be involved in the design activity responsible for partitioning the functionality in to these domains taking into account the requirements and constraints. Development work, depending on the level of seniority, will include: Client interaction to understand and influence requirements, deliver solutions and be involved in bidding for new work. Development team lead, including mentoring junior engineering staff. Research and monitoring of developments in relevant technology to maintain and enhance our leading-edge capability. The main emphasis of this role is the implementation and delivery of hardware solutions; advice and support from senior technical specialists is expected to be provided, particularly in the early stages of design What background are we looking for? We are looking for ambitious, high-calibre people with the following characteristics: Highly motivated with a strong academic background typically in Engineering or Physics a 2:1 or 1st class degree. Understanding of the principles of PCB circuit design and layout. Understanding of the principles of mechanical design. Experience with 3D CAD would be an advantage, but is not essential. Proven record of set-to-work and verification of complex hardware, sometimes under demanding project timescales. Competent in the use of laboratory measurement equipment (eg oscilloscopes, spectrum analysers, vector network analysers etc). An appreciation of the technologies involved in software radio. Experience in the use of software and firmware development tools and environments, e.g. C/C++, Java, Linux, particularly as needed to support hardware test and debug. Comfortable working on multiple projects at the same time and in a dynamic environment where deadlines and priorities are changeable. Experience of working within multi-disciplinary development teams in a project-based environment. Client-facing experience and influencing skills, as well as strong inter-personal skills. Experience of designing products for production. Experience of designing products for compliance against industry standards (eg CE, FCC, DEF STAN). How we will support you: Work-life balance is important; you'll get 25 days holiday a year and, via our flexible benefits package the option to buy/sell and carry over from the year before Our flexible benefits package includes; private medical and dental insurance, a competitive pension scheme, cycle to work scheme, taste cards and more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme You are welcome to join any/all of our Diversity and Support groups. These groups cover everything from gender diversity to mental health and wellbeing. About BAE Systems Digital Intelligence: We help nations, governments and businesses around the world defend themselves against cyber-crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. Security Clearance Only those with the permanent and unrestricted right to live and work in the UK will be considered for a position within BAE Systems Digital Intelligence. Due to the nature of our work, successful candidates for this role will be required to go through Government SC clearance prior to starting with us. Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance wellbeing. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Digital Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours.
BAE Systems Digital Intelligence
Chelmsford, Essex
Company Overview BAE Systems Digital Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analysing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world - enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems. We are obsessed about solving problems for our customers; we bring together great minds that face tough challenges on a daily basis, and are encouraged to make a difference. Role Summary: Applied Intelligence Laboratories (AI Labs) is the research and technology arm of BAE Systems Digital Intelligence business. In partnership with the other businesses and educational establishments with whom we work, we innovate and develop to transform aspiration and vision into engineered reality. We provide research & development, consultancy, specialist manufacturing and technical services for Applied Intelligence and other BAE Systems businesses. Additionally, our expertise helps the UK MoD, US Department of Defense, universities and our UK industrial partners, and other leading innovation organisations to achieve their goals. We are looking to recruit an enthusiastic, hard-working and professional engineer into the Antennas and Electromagnetics group at AI Labs based in Great Baddow, near Chelmsford, Essex. The Antenna and Electromagnetics group undertakes research and development across the EW spectrum from near and far-field ranges for antenna characterisation from a few hundred MHz to millimetre wave frequencies. Our research includes the in the following areas; Novel antenna concepts Installed antenna performance Low Observable (LO) antenna design, Design of microwave devices, Radar range equation based calculations for radar and communication system performance prediction. Evaluation of Electromagnetic Compatibility and Hazard (EMC/EMH) problems. Prediction and measurement of the Radar Cross Section of civil and military vehicles and structures is undertaken, particularly in relation to LO antenna design. The candidate does not need to have experience in all of these areas, but a good general understanding of the principles involved in undertaking work of this nature would be of benefit. The Engineer role will involve leading the delivery of innovative research projects to quality, time and budget while working with teams of scientific and engineering staff. Candidates will be expected to provide both technical input into programmes and support bidding activities and be willing to take an active role in finding and securing future work. For motivated candidates there will be future opportunities for project and people management. The successful candidate would be expected to: Work with a team of multi-disciplined scientists and / or engineers to execute projects for customers. A large proportion of the projects undertaken will results in practical demonstrations at TRL 2 to 5 and operational system up to TRL 9 Have the skills to lead a team of scientists and / or engineers to execute projects for customers Develop new business opportunities and timely generation of high quality, well planned and innovative bids with an acceptable level of risk Provide inputs into technical strategy in line with the wider AI Labs strategy Identification and delivery of internally funded (PV) work that builds capability for exploitation in line with the AI Labs strategy Develop & maintain key business relationships with internal and external customers, suppliers and external institutions to support new business and awareness of the state-of-the-art Promote the technical excellence of AI Labs through generation of patents and external publicity in scientific journals and / or the press Ensure that all projects are undertaken in line with AI Labs process & governance. Assist with the development of new business opportunities and participate in the timely generation of high quality, well planned and innovative bids with an acceptable level of risk Engage with customers and AI Labs management on a daily basis Develop & maintain key business relationships with internal and external customers, suppliers and external institutions to support new business and awareness of the state-of-the-art Promote the technical excellence of AI Labs through generation of patents and external publicity in scientific journals and / or the press Ensure that all projects are undertaken in line with AI Labs process & governance Qualifications / Skills: A 2:1 degree in a relevant discipline (e.g. Physics; Mathematics; Computer Science; Electronic/Electrical Engineering; or a related discipline) A background in physics, electrical engineering or a related discipline is highly desirable, whist prior experience in electromagnetic prediction, although beneficial, is not essential. Familiarity with general microwave test equipment such as Vector Network Analysers would be an advantage. Some knowledge or an interest in technical computing, a programming language, scientific computing packages or CAD manipulation would be of benefit. Good communication, presentation and report writing skills are essential A higher degree in a relevant area would be advantageous Solid grounding in engineering with typically >10 years' experience in an engineering or technology based environment, working on complex, multi-disciplinary projects Member of a relevant professional body, preferably at Chartered Engineer or equivalent level, would be advantageous. Ability to assess and understand the impact of emerging technologies and how these can be applied Highly motivated with the ability to quickly digest and apply new concepts and develop novel solutions to challenging problems Able to understand, influence and talk with credibility (in terms of engineering principles) about areas of technology outside of own area of specific expertise Good communication skills, able to present effectively to customers and at conferences if appropriate Ability to work with customers or other stakeholders to capture requirements and highlight the risks and opportunities in a plan Able to work cooperatively and collaboratively with others, to lead or be part of a team and respect the opinions of others Continually build and maintain friendly, reciprocal, and warm relationships with networks of people who may be able to assist in business winning and delivery Familiarity with general purpose IT systems Must be able to obtain full SC security clearance About BAE Systems Digital Intelligence: We help nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Digital Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours...... click apply for full job details
Sep 24, 2022
Full time
Company Overview BAE Systems Digital Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analysing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world - enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems. We are obsessed about solving problems for our customers; we bring together great minds that face tough challenges on a daily basis, and are encouraged to make a difference. Role Summary: Applied Intelligence Laboratories (AI Labs) is the research and technology arm of BAE Systems Digital Intelligence business. In partnership with the other businesses and educational establishments with whom we work, we innovate and develop to transform aspiration and vision into engineered reality. We provide research & development, consultancy, specialist manufacturing and technical services for Applied Intelligence and other BAE Systems businesses. Additionally, our expertise helps the UK MoD, US Department of Defense, universities and our UK industrial partners, and other leading innovation organisations to achieve their goals. We are looking to recruit an enthusiastic, hard-working and professional engineer into the Antennas and Electromagnetics group at AI Labs based in Great Baddow, near Chelmsford, Essex. The Antenna and Electromagnetics group undertakes research and development across the EW spectrum from near and far-field ranges for antenna characterisation from a few hundred MHz to millimetre wave frequencies. Our research includes the in the following areas; Novel antenna concepts Installed antenna performance Low Observable (LO) antenna design, Design of microwave devices, Radar range equation based calculations for radar and communication system performance prediction. Evaluation of Electromagnetic Compatibility and Hazard (EMC/EMH) problems. Prediction and measurement of the Radar Cross Section of civil and military vehicles and structures is undertaken, particularly in relation to LO antenna design. The candidate does not need to have experience in all of these areas, but a good general understanding of the principles involved in undertaking work of this nature would be of benefit. The Engineer role will involve leading the delivery of innovative research projects to quality, time and budget while working with teams of scientific and engineering staff. Candidates will be expected to provide both technical input into programmes and support bidding activities and be willing to take an active role in finding and securing future work. For motivated candidates there will be future opportunities for project and people management. The successful candidate would be expected to: Work with a team of multi-disciplined scientists and / or engineers to execute projects for customers. A large proportion of the projects undertaken will results in practical demonstrations at TRL 2 to 5 and operational system up to TRL 9 Have the skills to lead a team of scientists and / or engineers to execute projects for customers Develop new business opportunities and timely generation of high quality, well planned and innovative bids with an acceptable level of risk Provide inputs into technical strategy in line with the wider AI Labs strategy Identification and delivery of internally funded (PV) work that builds capability for exploitation in line with the AI Labs strategy Develop & maintain key business relationships with internal and external customers, suppliers and external institutions to support new business and awareness of the state-of-the-art Promote the technical excellence of AI Labs through generation of patents and external publicity in scientific journals and / or the press Ensure that all projects are undertaken in line with AI Labs process & governance. Assist with the development of new business opportunities and participate in the timely generation of high quality, well planned and innovative bids with an acceptable level of risk Engage with customers and AI Labs management on a daily basis Develop & maintain key business relationships with internal and external customers, suppliers and external institutions to support new business and awareness of the state-of-the-art Promote the technical excellence of AI Labs through generation of patents and external publicity in scientific journals and / or the press Ensure that all projects are undertaken in line with AI Labs process & governance Qualifications / Skills: A 2:1 degree in a relevant discipline (e.g. Physics; Mathematics; Computer Science; Electronic/Electrical Engineering; or a related discipline) A background in physics, electrical engineering or a related discipline is highly desirable, whist prior experience in electromagnetic prediction, although beneficial, is not essential. Familiarity with general microwave test equipment such as Vector Network Analysers would be an advantage. Some knowledge or an interest in technical computing, a programming language, scientific computing packages or CAD manipulation would be of benefit. Good communication, presentation and report writing skills are essential A higher degree in a relevant area would be advantageous Solid grounding in engineering with typically >10 years' experience in an engineering or technology based environment, working on complex, multi-disciplinary projects Member of a relevant professional body, preferably at Chartered Engineer or equivalent level, would be advantageous. Ability to assess and understand the impact of emerging technologies and how these can be applied Highly motivated with the ability to quickly digest and apply new concepts and develop novel solutions to challenging problems Able to understand, influence and talk with credibility (in terms of engineering principles) about areas of technology outside of own area of specific expertise Good communication skills, able to present effectively to customers and at conferences if appropriate Ability to work with customers or other stakeholders to capture requirements and highlight the risks and opportunities in a plan Able to work cooperatively and collaboratively with others, to lead or be part of a team and respect the opinions of others Continually build and maintain friendly, reciprocal, and warm relationships with networks of people who may be able to assist in business winning and delivery Familiarity with general purpose IT systems Must be able to obtain full SC security clearance About BAE Systems Digital Intelligence: We help nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Digital Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours...... click apply for full job details
The role holder: As part of NS UK Law Enforcement account, we have teams working on-site supporting critical national operational applications, systems and networks as well as developing new solutions to help tackle a broad variety of serious crime. We have a great team on site who have worked closely with the client for many years. We have built a trusted relationship with this client over the years, their office is shiny and new, very close to the Queen Elizabeth Olympic Park and Stratford Westfield shopping centre, which has so many amenities. There is a wide variety of work, constantly evolving with new technology. The individual will have the opportunity to make a real difference, as we work directly with the operational end users who work with partner agencies and also provide these important capabilities to another National LEA. We are looking DevOps Engineers to join our team. At the moment we are particularly keen on anyone who wants to lead a team, as well as engineers with at least 1 years' experience in some of the technologies below (or equivalents) and are willing to learn. Ways of Working: Due to the classification of the work, individuals have to be on site in Stratford at least 4 days a week, with the ability to work from home occasionally. The work requires SC clearance minimum but MoD DV is preferred, so if the individual is willing to go through MOD DV, this would be ideal. The DevOps engineer typically combines the skills of coding or scripting and process reengineering with exemplary team working and communication skills. The DevOps engineer should have a good breadth of knowledge across the disciplines of software development and how software is deployed. Key Accountabilities The DevOps engineer is often the first port of call to diagnose and resolve problems, they need to be able to understand the causes of issues across a number of domains including infrastructure, code, networking and databases with enough knowledge to be able to fault find and identify the root cause. Core Responsibilities involved: Incident management Application design and development Site reliability (observability, alerting, high-availability, self-healing systems etc.) Database administration Infrastructure provisioning Process automation Respond to change requests Main Technologies involved (but not limited to): Oracle DB Docker (with Docker Swarm) Elastic Stack Typescript/React/Node Go Prometheus/Grafana ESRI Maps Ansible Windows & Linux Jenkins Automation skills: Automation is a key skill domain for DevOps engineers, they need to be able to design, build and maintain automation solutions for building, testing, deploying application and infrastructure. Specific automation skills are: Continuous Integration - Skilled in the tooling and principles of continually building, testing and integrating the software that developers produce Continuous Deployment - Skilled in the automation of the deployment of the artefacts produced by the CI Cloud Management - Skilled in the design, deployment and management of Public or Private Cloud environments Configuration Management - Practice good configuration and source code control of all artefacts Life at BAE Systems Digital Intelligence Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Applicants to this role must be amenable to obtain UK Government security clearance
Sep 24, 2022
Full time
The role holder: As part of NS UK Law Enforcement account, we have teams working on-site supporting critical national operational applications, systems and networks as well as developing new solutions to help tackle a broad variety of serious crime. We have a great team on site who have worked closely with the client for many years. We have built a trusted relationship with this client over the years, their office is shiny and new, very close to the Queen Elizabeth Olympic Park and Stratford Westfield shopping centre, which has so many amenities. There is a wide variety of work, constantly evolving with new technology. The individual will have the opportunity to make a real difference, as we work directly with the operational end users who work with partner agencies and also provide these important capabilities to another National LEA. We are looking DevOps Engineers to join our team. At the moment we are particularly keen on anyone who wants to lead a team, as well as engineers with at least 1 years' experience in some of the technologies below (or equivalents) and are willing to learn. Ways of Working: Due to the classification of the work, individuals have to be on site in Stratford at least 4 days a week, with the ability to work from home occasionally. The work requires SC clearance minimum but MoD DV is preferred, so if the individual is willing to go through MOD DV, this would be ideal. The DevOps engineer typically combines the skills of coding or scripting and process reengineering with exemplary team working and communication skills. The DevOps engineer should have a good breadth of knowledge across the disciplines of software development and how software is deployed. Key Accountabilities The DevOps engineer is often the first port of call to diagnose and resolve problems, they need to be able to understand the causes of issues across a number of domains including infrastructure, code, networking and databases with enough knowledge to be able to fault find and identify the root cause. Core Responsibilities involved: Incident management Application design and development Site reliability (observability, alerting, high-availability, self-healing systems etc.) Database administration Infrastructure provisioning Process automation Respond to change requests Main Technologies involved (but not limited to): Oracle DB Docker (with Docker Swarm) Elastic Stack Typescript/React/Node Go Prometheus/Grafana ESRI Maps Ansible Windows & Linux Jenkins Automation skills: Automation is a key skill domain for DevOps engineers, they need to be able to design, build and maintain automation solutions for building, testing, deploying application and infrastructure. Specific automation skills are: Continuous Integration - Skilled in the tooling and principles of continually building, testing and integrating the software that developers produce Continuous Deployment - Skilled in the automation of the deployment of the artefacts produced by the CI Cloud Management - Skilled in the design, deployment and management of Public or Private Cloud environments Configuration Management - Practice good configuration and source code control of all artefacts Life at BAE Systems Digital Intelligence Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Applicants to this role must be amenable to obtain UK Government security clearance
BAE Systems Applied Intelligence
Guildford, Surrey
JOB ROLE The following information aims to provide potential candidates with a better understanding of the requirements for this role. BIO BAE Systems Applied Intelligence works with governments and businesses around the world to help them defend against cyber threats, reduce their risk in the connected world, comply with regulation and transform their operations. The Wireless Products group works with customers to develop innovative mission critical technology. Applications include software radios, space technology and underwater systems. We are looking for bright, enthusiastic and committed individuals to work as electronics engineers in one of our customer-facing product teams. Relevant industry experience is preferable but most of all we are looking for bright, enthusiastic and committed individuals with a strong academic background and the ability to learn quickly. We have a range of roles available, from graduate entry through to experienced engineers. We are interested in hearing from anyone who can make a strong contribution to our work. What you could be doing for us We'd like to hear from people keen to develop their career in engineering who have a baseline of experience in some or all of the following areas that we cover: RF PCB development. We design a variety of RF circuit boards ranging from low power embedded sensors, designed for use in harsh environments, through to high performance analogue designs for radio equipment covering bands from VLF through to millimetre wave systems. This development may involve modelling (eg using Matlab, Agilent ADS, CST, Spice etc) as well as schematic capture and RF circuit board layout. Digital, mixed signal and power PCB development. We develop a wide range of boards such as state-of-the art digital signal processing platforms incorporating the latest FPGAs, SoCs and processors. Mechanical design and system integration. We design chassis and enclosures for our PCBs to ensure the optimum solution for its intended environment. The designs have to be easily assembled and repaired through life but also provide for cooling and protection in challenging environments. This work often involves compliance testing for CE, airborne, military and space applications. System engineering. Most of our solutions comprise of a blend of hardware, firmware and software. Early in the development lifecycle you will be involved in the design activity responsible for partitioning the functionality in to these domains taking into account the requirements and constraints. Development work, depending on the level of seniority, will include: Client interaction to understand and influence requirements, deliver solutions and be involved in bidding for new work. Development team lead, including mentoring junior engineering staff. Research and monitoring of developments in relevant technology to maintain and enhance our leading-edge capability. The main emphasis of this role is the implementation and delivery of hardware solutions; advice and support from senior technical specialists is expected to be provided, particularly in the early stages of design What background are we looking for? We are looking for ambitious, high-calibre people with the following characteristics: Highly motivated with a strong academic background typically in Engineering or Physics a 2:1 or 1st class degree. Understanding of the principles of PCB circuit design and layout. Understanding of the principles of mechanical design. Experience with 3D CAD would be an advantage, but is not essential. Proven record of set-to-work and verification of complex hardware, sometimes under demanding project timescales. Competent in the use of laboratory measurement equipment (eg oscilloscopes, spectrum analysers, vector network analysers etc). An appreciation of the technologies involved in software radio. Experience in the use of software and firmware development tools and environments, e.g. C/C++, Java, Linux, particularly as needed to support hardware test and debug. Comfortable working on multiple projects at the same time and in a dynamic environment where deadlines and priorities are changeable. Experience of working within multi-disciplinary development teams in a project-based environment. Client-facing experience and influencing skills, as well as strong inter-personal skills. Experience of designing products for production. Experience of designing products for compliance against industry standards (eg CE, FCC, DEF STAN). How we will support you: Work-life balance is important; you'll get 25 days holiday a year and, via our flexible benefits package the option to buy/sell and carry over from the year before Our flexible benefits package includes; private medical and dental insurance, a competitive pension scheme, cycle to work scheme, taste cards and more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme You are welcome to join any/all of our Diversity and Support groups. These groups cover everything from gender diversity to mental health and wellbeing. About BAE Systems Applied Intelligence: We help nations, governments and businesses around the world defend themselves against cyber-crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. Security Clearance Only those with the permanent and unrestricted right to live and work in the UK will be considered for a position within BAE Systems Applied Intelligence. Due to the nature of our work, successful candidates for this role will be required to go through Government SC clearance prior to starting with us. Life at BAE Systems Applied Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance wellbeing. Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Applied Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Applied Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Applied Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours.
Sep 24, 2022
Full time
JOB ROLE The following information aims to provide potential candidates with a better understanding of the requirements for this role. BIO BAE Systems Applied Intelligence works with governments and businesses around the world to help them defend against cyber threats, reduce their risk in the connected world, comply with regulation and transform their operations. The Wireless Products group works with customers to develop innovative mission critical technology. Applications include software radios, space technology and underwater systems. We are looking for bright, enthusiastic and committed individuals to work as electronics engineers in one of our customer-facing product teams. Relevant industry experience is preferable but most of all we are looking for bright, enthusiastic and committed individuals with a strong academic background and the ability to learn quickly. We have a range of roles available, from graduate entry through to experienced engineers. We are interested in hearing from anyone who can make a strong contribution to our work. What you could be doing for us We'd like to hear from people keen to develop their career in engineering who have a baseline of experience in some or all of the following areas that we cover: RF PCB development. We design a variety of RF circuit boards ranging from low power embedded sensors, designed for use in harsh environments, through to high performance analogue designs for radio equipment covering bands from VLF through to millimetre wave systems. This development may involve modelling (eg using Matlab, Agilent ADS, CST, Spice etc) as well as schematic capture and RF circuit board layout. Digital, mixed signal and power PCB development. We develop a wide range of boards such as state-of-the art digital signal processing platforms incorporating the latest FPGAs, SoCs and processors. Mechanical design and system integration. We design chassis and enclosures for our PCBs to ensure the optimum solution for its intended environment. The designs have to be easily assembled and repaired through life but also provide for cooling and protection in challenging environments. This work often involves compliance testing for CE, airborne, military and space applications. System engineering. Most of our solutions comprise of a blend of hardware, firmware and software. Early in the development lifecycle you will be involved in the design activity responsible for partitioning the functionality in to these domains taking into account the requirements and constraints. Development work, depending on the level of seniority, will include: Client interaction to understand and influence requirements, deliver solutions and be involved in bidding for new work. Development team lead, including mentoring junior engineering staff. Research and monitoring of developments in relevant technology to maintain and enhance our leading-edge capability. The main emphasis of this role is the implementation and delivery of hardware solutions; advice and support from senior technical specialists is expected to be provided, particularly in the early stages of design What background are we looking for? We are looking for ambitious, high-calibre people with the following characteristics: Highly motivated with a strong academic background typically in Engineering or Physics a 2:1 or 1st class degree. Understanding of the principles of PCB circuit design and layout. Understanding of the principles of mechanical design. Experience with 3D CAD would be an advantage, but is not essential. Proven record of set-to-work and verification of complex hardware, sometimes under demanding project timescales. Competent in the use of laboratory measurement equipment (eg oscilloscopes, spectrum analysers, vector network analysers etc). An appreciation of the technologies involved in software radio. Experience in the use of software and firmware development tools and environments, e.g. C/C++, Java, Linux, particularly as needed to support hardware test and debug. Comfortable working on multiple projects at the same time and in a dynamic environment where deadlines and priorities are changeable. Experience of working within multi-disciplinary development teams in a project-based environment. Client-facing experience and influencing skills, as well as strong inter-personal skills. Experience of designing products for production. Experience of designing products for compliance against industry standards (eg CE, FCC, DEF STAN). How we will support you: Work-life balance is important; you'll get 25 days holiday a year and, via our flexible benefits package the option to buy/sell and carry over from the year before Our flexible benefits package includes; private medical and dental insurance, a competitive pension scheme, cycle to work scheme, taste cards and more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme You are welcome to join any/all of our Diversity and Support groups. These groups cover everything from gender diversity to mental health and wellbeing. About BAE Systems Applied Intelligence: We help nations, governments and businesses around the world defend themselves against cyber-crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes. Our success is down to our people. The changing nature of our business means that we're constantly looking for the brightest talent to help us fulfil our ambitions. As an experienced professional, we'll entrust you with responsibility; this means that you'll have client contact, variety and support from day one. We'll encourage and support you to develop your skills and reward you as you grow. Whatever your area of expertise, you'll be much more than just a job title; you'll be an integral part of the business where your individual contribution makes a difference every day. Great minds deserve great rewards, so we also offer a very competitive salary and benefits package. Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. Staying competitive in today's global marketplace requires an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. We also welcome discussions about flexible working. Security Clearance Only those with the permanent and unrestricted right to live and work in the UK will be considered for a position within BAE Systems Applied Intelligence. Due to the nature of our work, successful candidates for this role will be required to go through Government SC clearance prior to starting with us. Life at BAE Systems Applied Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance wellbeing. Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Applied Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Division overview: Capabilities At BAE Systems Applied Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Capabilities is the engine that keeps the business moving forward. It is the largest area of Applied Intelligence, containing our Engineering, Consulting and Project Management teams that design and implement the defence solutions and digital transformation projects that make us a globally recognised brand in both the public and private sector. As a member of the Capabilities team, you will be creating and managing the solutions that earn us our place in an ever changing digital world. We all have a role to play in defending our clients, and this is yours.
As part of National Security Law enforcement, we have teams working on-site supporting critical national operational applications, systems and networks as well as developing new solutions to help tackle a broad variety of serious crime. We have a great team on site who have worked closely with the client for many years. We have built a trusted relationship with this client over the years, their office is shiny and new, very close to the Queen Elizabeth Olympic Park and Stratford Westfield shopping centre, which has so many amenities. National Security LE's on site teams are included in all the usual social events, including Account forums, team lunches and evenings out. There is a wide variety of work, constantly evolving with new technology. You will have the opportunity to make a real difference, due to the fact that we work directly with the operational end users who work with partner agencies and also provide these important capabilities to another National LEA. We are looking for full-stack developers and DevOps engineers to join the team ASAP. At the moment we are particularly keen on anyone who wants to lead a team, as well as engineers with at least 1 years' experience in some of the technologies below (or equivalents) and are willing to learn. Core Responsibilities involved: • Incident management • Application design and development • Site reliability (observability, alerting, high-availability, self-healing systems etc.) • Database administration • Infrastructure provisioning • Process automation Respond to change requests Main Technologies involved (but not limited to): • Oracle DB • Docker (with Docker Swarm) • Elastic Stack • Typescript/React/Node • Go • Prometheus/Grafana • ESRI Maps • Ansible • Windows & Linux • Jenkins Ways of Working: Due to the classification of the work, we have to be on site in Stratford at least 4 days a week, with ability to work from home occasionally. The work requires SC clearance minimum but MoD DV is preferred, so if you are willing to go through MOD DV, this would be ideal. This role is part of our National Security business, where we develop operational solutions and deliver mission-critical services to Law Enforcement Agencies and Government departments. Our dedicated engineers and business consultants form multi-disciplinary teams, working together to provide a variety of solutions that help to prevent, protect and pursue criminals involved in serious and organised crime, enhance operational capabilities and deliver digital transformation programmes. Our work is a mix of remote working with some travel to various LEA sites around the UK. We need proactive, solution finding individuals with a can do attitude to join our teams to help solve some of the most difficult challenges so even if this role isn't a perfect fit we'd still love to hear from you! Life at BAE Systems Applied Intelligence Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Applied Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Applicants to this role must be amenable to obtain UK Government security clearance Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence BAE Systems Digital Intelligence is home to 4,800 digital, cyber and intelligence experts. We work collaboratively across 16 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Launched in 2022, Digital Intelligence is part of BAE Systems, and has a rich heritage in helping to defend nations and businesses around the world from advanced threats.
Sep 23, 2022
Full time
As part of National Security Law enforcement, we have teams working on-site supporting critical national operational applications, systems and networks as well as developing new solutions to help tackle a broad variety of serious crime. We have a great team on site who have worked closely with the client for many years. We have built a trusted relationship with this client over the years, their office is shiny and new, very close to the Queen Elizabeth Olympic Park and Stratford Westfield shopping centre, which has so many amenities. National Security LE's on site teams are included in all the usual social events, including Account forums, team lunches and evenings out. There is a wide variety of work, constantly evolving with new technology. You will have the opportunity to make a real difference, due to the fact that we work directly with the operational end users who work with partner agencies and also provide these important capabilities to another National LEA. We are looking for full-stack developers and DevOps engineers to join the team ASAP. At the moment we are particularly keen on anyone who wants to lead a team, as well as engineers with at least 1 years' experience in some of the technologies below (or equivalents) and are willing to learn. Core Responsibilities involved: • Incident management • Application design and development • Site reliability (observability, alerting, high-availability, self-healing systems etc.) • Database administration • Infrastructure provisioning • Process automation Respond to change requests Main Technologies involved (but not limited to): • Oracle DB • Docker (with Docker Swarm) • Elastic Stack • Typescript/React/Node • Go • Prometheus/Grafana • ESRI Maps • Ansible • Windows & Linux • Jenkins Ways of Working: Due to the classification of the work, we have to be on site in Stratford at least 4 days a week, with ability to work from home occasionally. The work requires SC clearance minimum but MoD DV is preferred, so if you are willing to go through MOD DV, this would be ideal. This role is part of our National Security business, where we develop operational solutions and deliver mission-critical services to Law Enforcement Agencies and Government departments. Our dedicated engineers and business consultants form multi-disciplinary teams, working together to provide a variety of solutions that help to prevent, protect and pursue criminals involved in serious and organised crime, enhance operational capabilities and deliver digital transformation programmes. Our work is a mix of remote working with some travel to various LEA sites around the UK. We need proactive, solution finding individuals with a can do attitude to join our teams to help solve some of the most difficult challenges so even if this role isn't a perfect fit we'd still love to hear from you! Life at BAE Systems Applied Intelligence Diversity and inclusion are integral to the success of BAE Systems Applied Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Applied Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals. Applicants to this role must be amenable to obtain UK Government security clearance Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being. Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence BAE Systems Digital Intelligence is home to 4,800 digital, cyber and intelligence experts. We work collaboratively across 16 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Launched in 2022, Digital Intelligence is part of BAE Systems, and has a rich heritage in helping to defend nations and businesses around the world from advanced threats.