current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computersecurity, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computersecurity, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
for all electronic communications systems at the site, as well as taking a leading role in delivering technology change/improvement projects and managing external support agreements. The Cyber Security Analyst is required to focus on the detection, investigation and response to cyber security events and incidents. Other tasks involve BAU security tasks, supporting cyber security projects and assisting with regulatory compliance. The role will involve using a diverse security toolset and the successful applicant will build extensive experience in all areas of cyber security. Daily tasks will involve the following: • Endpoint monitoring and analysis. • Incident readiness and handling as part of the ComputerSecurity Incident Response (CSIRT) team. • Monitor and administer … Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Vulnerability identification & mitigation/remediation. • Compose security alert notifications. • Help develop cyber security process & procedures. • Advise incident responders & other teams on threat. • Triage security events and incidents apply containment and More ❯
operations. In return, you’ll be at the cutting edge of new technology, learning new skills and gaining certifications that are recognised and respected across the industry. Our advanced Security Operations Centre (SOC) uses a combination of established solutions and cutting-edge internally developed technology to protect IT networks from a wide range of cyber threats on a 24x7x365 … all in-life services delivered to customers across a wide variety of market sectors. This is a shift based role which is responsible for analysing and responding to all security and service related events on a 24x7 basis. The role is ‘hands-on’, with a requirement to carry out cyber analysis . Working within the SOC, you will play … key role in helping to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression. Assist in ComputerSecurity Incident Response activities for More ❯
of the Role The Head of IT is responsible for providing comprehensive IT services to support academics, staff, students, and visitors across the College, while managing the institution's computer systems and network infrastructure. This role demands adaptability to the rapid evolution of both hardware and software technologies, alongside the growing and diverse needs of the user population. Given … all user groups-staff, students, academics, and visitors-through troubleshooting, helpdesk services, and ensuring the smooth operation of all systems. 2. System and Network Management Overseeing the administration of computer systems, servers, and network infrastructure to ensure optimal performance, security, and uptime. 3. Strategic Planning and Implementation Planning, executing, and managing IT projects, system upgrades, and ensuring that … changes in the academic calendar, emergencies, or periods of peak usage. This includes ensuring IT services are maintained during critical times, such as exams, deadlines, or unforeseen issues. 6. Security Implementing and managing robust security protocols to protect systems, networks, and data. This includes overseeing firewalls, encryption, and access control measures. Essential Skills and Experience A relevant degree More ❯
Atomic Weapons Establishment, Aldermaston, Reading, Berkshire, England
AWE PLC
into different placements within the HPC group. During these placements, you will learn a range of skills, including: Linux operating system administration (installation, configuration and management) Linux shell scripting Computer hardware (building/repairing) Networking File system management Computersecurity concepts System monitoring and fault diagnosis Customer interaction and problem investigation Training is primarily in-house but … one extraordinary mission: keeping the UK safe and secure. The UK’s independent nuclear deterrent has existed for 75 years to deter the most extreme threats to our national security and way of life, helping to guarantee our safety, and that of our NATO allies. Our work is critical. We’re delivering Astraea, the next warhead for the UK More ❯