Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk managementsystem for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development … skills; Practical experience of the System Development Life Cycle, Software Development Life Cycle, Spiral, V-Models and Agile frameworks; Effective and flexible communication and interpersonal skills; The ability to understand complex engineering processes and the inter-dependency of the process components; A passion for promoting and improving the safety … military aircraft, while boosting export opportunities and generating prosperity around the UK. The company leads the consortium responsible for the Praetorian Defensive Aids Sub-System (DASS) currently installed on the Eurofighter Typhoon and the company's BriteCloud expendable active decoy launched in 2013, represents the most significant advance in More ❯
System Architecture and Security Specialist – EW GCAP Systems Engineering Location: Luton (80%+ on site) Duration: 12 months Rate: £65 per hour PAYE or £88.63 per hour Umbrella Our client seeks a System Architecture and Security Specialist to work within the Combat Air line of business as part … of their modelling and simulation team. This role will focus on supporting the development of Model Based System Engineering for products. A role within the team will provide exposure to EW products and subject-matter experts with expertise within domain, product, and technology fields. Responsibilities Baseline updates and releases … of models within CAMEO, including source control, design documentation and user guides. Development of systems engineering plans, analysis and trade study reports. Contribution to system performance reports. Develop and maintain Hazard Log, Security Risk Mitigation, Technical Risk List in the model. Manage and generate documentation from the module, candidate More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
protects people and platforms in complex threat environments. What You'll Do Produce key documentation including Test Reports, Integration & Trials Reports, and Security Management Reports. Support Verification and Validation (V&V) activities for advanced sub-systems. Collaborate with internal and external stakeholders during technical discussions. Manage technical documentation … You'll Bring Strong knowledge of electronic hardware Verification and Validation processes. Understanding of Security principles in Information Warfare, Networking, Cryptography, and System Vulnerability. Effective communicator with the confidence to lead technical interchange discussions. Proficient in product data management tools (e.g., Teamcenter, SharePoint, Confluence). More ❯
solution. In this project, we need to ensure that all the data held in Capita Open Housing for tenancies, repairs, asset and compliance management can be transferred into the replacement solution. Role: The role of the data officer is to work with the housing and DDAT teams to … co-ordinate data findings, recommendations, approvals and actions taken. Make requests to Tenancy Officers to carry out audits with tenants to obtain missing information not in our systems. Experience of creating and maintaining Microsoft Word and Excel is required. Work with the business and input into the development More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
extend Location: Hybrid working - London or Bristol Essential Skills: The ideal candidate will hold active SC clearance and a proven Commercial/Procurement Management background, with the following skills/experience: Experience in Public sector End-to-end Procurement. Experience in the Procurement Act 2023 & PCR 2015 Experience … of supporting end-to-end sourcing of Information Technology/Digital Procurement contracts within the Defence or Central Government. Experience of supporting the development and delivery of complex Invitations to Tender, negotiations and contracts Experience of using Qualifying Defence Contracts (QDCs) - Desired Working understanding of Oracle Fusion or More ❯