Junior Operational Architect
BT - United Kingdom | Full-time
Our purpose is to use the power of communications to make a better world. For each other, for our customers, for society and our communities. We need you to help us do this. This job matters to provide Service Design input for all new Complex Deals and Change notes in our GMA 800 contracts. The […]
Covert Technical Operations Specialist
MI5 - London, United Kingdom | Full-time
At MI5, we help to keep the country safe. Our talented teams work against ever-evolving threats, from terrorism to espionage. In Covert Technical Operations, our specialists disrupt the work of potential terrorists. Leading on high-profile cases, they use technical capabilities to collect vital intelligence. And now we’re looking for more forward-thinking individuals to join us. […]
Analyst Security Services
BT - Wiltshire, United Kingdom | Full-time
Our purpose is to use the power of communications to make a better world. For each other, for our customers, for society and our communities. We need you to help us do this. Working for a number of UK Defence contracts, to assist with the operational management of risk related to people, information, assets, revenues and […]
Junior Security Designer/Implementer
BT - United Kingdom | Full-time
Our purpose is to use the power of communications to make a better world. For each other, for our customers, for society and our communities. We need you to help us do this. Millions of people around the world rely on our products, networks and services to go about their daily lives and businesses. We’re a […]
Mivy is the Head of Consulting for National Security and Defence, BAE Systems Applied Intelligence. She worked towards and took a degree course in Computer Science & Maths having previously discovered the joy of writing code when she was just nine years old.
Andy Gill is a penetration tester at Pentest Partners. He had some tough times at school but found a passion for cyber security which led him to study the subject and take part in competitions. He now writes books and blogs to help other newbies find their way.
Jane is the founder of Cyber Security Capital and the IN Security Movement. Jane isn’t your typical ‘techie’, having started out studying art and design during her university years. She went on to set up her own cyber security practice with a fresh approach and a sheer determination.
Russ is a cyber security consultant. He started his career in IT support, helping teams of individuals look after their machines and managing the company’s machines and servers. However, Russ became very interested in security and forged his way into industry through CSCUK’s competition programme.
Jade is Managing Director of The AntiSocial Engineer Ltd. She overcame self-doubt and broke the mould on what jobs ‘women could do’, channelling her business savvy and human behaviour skills into a growing business. Now she changes people’s lives for the better every single day.
Lucy is a Delivery Lead at Panaseer. Deciding that the world of chemistry wasn’t for her, she became involved in data analysis and took a small jump into the world of cyber security becoming a Cyber Investigator and learning on the job. She now heads up a team of her own.
Helena looks after Human Centred Design for BAE Systems Applied Intelligence. She started her career training in graphic design with the intent of working in advertising, but she soon became gripped by studying human behaviour.
Sam is a data scientist for the National Cyber Crime Unit, part of the National Crime Agency. He processes data seized in investigations to form cases around cyber criminals.
Melanie Oldham, Founder, and CEO, Bob’s Business shares her journey into cyber security from hospitality and event management to running her own cyber consultancy. She also gives her top tips for joining the industry and how a little bit of passion, adaptability and a good splash of stubbornness can get you a long way.
Daisy is proving a lot of people wrong, taking the apprentice route into cyber security instead of traditional university and formal qualification routes. She harnesses her networks to make her an effective communicator and never underestimates the power of curiosity.
Daniel is a Digital Risk and Security Graduate at National Grid. He started tinkering with coding and programming at a young age which led him to study computer science. His problem solving and team working skills have helped him to become a successful cyber professional, utilising all of his self-taught skills.
Alex is a software developer within the National Crime Agency’s Cyber Crime Unit. He develops unique software to inform the NCCU of critical data and analytics. He started out studying for a degree in Physics, but decided to use his software skills and knowledge towards a job he felt would really make a difference.
An ethical hacker is a computer expert who tries to break computers and networks to find out where their weaknesses are.
The difference between these guys and the bad guys is that they have permission to look for these flaws and do it for the greater good, not to make money.
Being a social engineer is all about knowing people. This job uses psychology and behaviour science to learn how people think and act.
A social engineer goes under cover in businesses to help find the weak links in humans and their behaviour
Secure games developer
Gaming is an industry that keeps growing and one that lots of people would like to secure careers in.
But, lots of games have big security issues in them, so we need games developers with security skills to help keep the gaming world safe and secure.
Technology and Security Chiefs
There are several board-level management roles in cyber security; Chief Technology Officer (CTO), Chief Information Officer (CIO), Chief Information Security Officer (CISO) and more.
Having strong technical expertise and good business acumen are essential for a CTO as they are responsible for aligning a company’s business goals with its technology strategy.
Cyber security lawyer
Lawyers can specialise in the advice and prosecution of data security and Internet crime.
The need for expert advice is growing with high levels of crime and penalties for organisations that don’t protect data sufficiently.
For system to work successfully, someone needs to constantly design secure code and applications; architect secure systems or create new security tools.
These are all essential parts of cyber security but nothing stays still so to be successful in this role, you have to be able to think fast.
Cyber Forensics Officer
Much like crime scene officers, cyber forensics specialists pick apart a system or network and try to figure out what has happened.
They look for small pieces of evidence and ‘digital fingerprints’ that can point towards a perpetrator.
Risk Analysts and Managers need to understand which threats will have the worst business impact and advise Boards in non-technical language why and how they should spend on reducing these risks.
Some risk managers also audit networks and make sure they comply with the law.
Operations and Security Managers protect data on networks, laptops and mobile devices, they may manage encryption and other protective measures like firewall rules.
Security education specialist
Education, training and awareness are demanding, whether the job is about training newcomers, keeping experts up-to-date or enabling staff or customers to benefit fully from technology they are using.
Education specialists make sure everyone else is taught and reminded about best practice in security.
Psychology or Behaviour Specialist
A large proportion of security incidents happen because of human error.
Hackers work to people’s weaknesses in order to gain access or lay traps, so it is important to understand how people behave in different environments and the psychology behind the decisions they make.
A cryptographer or cryptanalyst is part of a team of intelligence specialists that look for patterns, codes and information to help defeat the bad guys.
They are great problem solvers and are usually quite good with numbers.
As a society, we are producing and collecting more and more data every day. Organisations use data scientists to turn large volumes of data into useful information and recommendations using clever formulas and computer skills.
They are usually analytical people and like statistics.
Secure Code Developer
Everything that requires code needs a level of security.
The best way to do this is to make sure that security is built into the code right at the beginning, so secure development is critically important and a lack of it could lead to security weaknesses throughout businesses.
The main task of a compliance manager is to make sure that an organisation can tick all of the boxes of legal and industry standards in terms of information security.
The look after the rules within the company and make sure everyone is working to best practice.
The are hundreds of nasty cyber security bugs and viruses out there.
A malware hunter’s job is to track down some of these nasty infections, learn how they work, much like a hunter would learn animal behaviour, and help to prevent them from attacking more organisations in the future.
Retail Security Manager
These are specialists in eCommerce and online retail security.
It’s their job to keep online shops and their customers safe, helping to reduce fraud and theft and keeping people’s data safe.
Mobile Security Developer
A unique set of developers that specialise in innovations in mobile, including wearables and connected devices (Internet of Things devices).
Mobile security developers will build innovative mobile technology that has different security needs to other platforms.
Cyber Security Sales Consultant
Any organisations that provide a service or product are likely to need a team of sales people, helping the company to continue to grow.
These individuals are extremely important in cyber as they often translate technical practice into everyday business language.
An official whistle-blower receives, assesses and manages the response to phone calls, emails and notes from various sources about security issues via a confidential reporting service.
They will open an investigation into claims, providing updates to management and form a process to resolve the case.
Cyber is a fast-moving industry and one that is important to every single person around the globe.
Bbecause of this, it is important that messages are clearly communicated about risk, solutions and opportunities in cyber; the communications person will do this through media, social media and marketing.
Threat Intelligence Analyst
Threat intelligence is evidence-based information gathering.
These individuals look at indicators of possible issues, the context of them and what else might be on the horizon. They are deeply analytical and are good at spotting trends.