Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Crimson
to effectively multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and … in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. * Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. * Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. Interested … to effectively multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk managementsystem for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development … skills; Practical experience of the System Development Life Cycle, Software Development Life Cycle, Spiral, V-Models and Agile frameworks; Effective and flexible communication and interpersonal skills; The ability to understand complex engineering processes and the inter-dependency of the process components; A passion for promoting and improving the safety … military aircraft, while boosting export opportunities and generating prosperity around the UK. The company leads the consortium responsible for the Praetorian Defensive Aids Sub-System (DASS) currently installed on the Eurofighter Typhoon and the company's BriteCloud expendable active decoy launched in 2013, represents the most significant advance in More ❯
System Architecture and Security Specialist – EW GCAP Systems Engineering Location: Luton (80%+ on site) Duration: 12 months Rate: £65 per hour PAYE or £88.63 per hour Umbrella Our client seeks a System Architecture and Security Specialist to work within the Combat Air line of business as part … of their modelling and simulation team. This role will focus on supporting the development of Model Based System Engineering for products. A role within the team will provide exposure to EW products and subject-matter experts with expertise within domain, product, and technology fields. Responsibilities Baseline updates and releases … of models within CAMEO, including source control, design documentation and user guides. Development of systems engineering plans, analysis and trade study reports. Contribution to system performance reports. Develop and maintain Hazard Log, Security Risk Mitigation, Technical Risk List in the model. Manage and generate documentation from the module, candidate More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk into the risk management process. Identity the controls failures that contribute to changing security threats, compliance requirements and changes to business access requirements. Recommending information security … protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY … rest, data-in-transit and data-in-use. Detailed understanding of privacy engineering controls e.g. encryption, masking and pseudonymisation. Detailed understanding of the information lifecycle and the self assurance framework for Records Management. Experience of implementing data security standards such as ISO27001, PCI DSS, NIST CSF, CAA CAF More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
do Creation of Test Reports following Verification and Validation of sub-systems Creation of Integration and Trials Reports following unit integration into the full system Creation of Security Management Reports following Verification and Trials activities Technical Discussions with suppliers and customers Document management to support … caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self More ❯
protects people and platforms in complex threat environments. What You'll Do Produce key documentation including Test Reports, Integration & Trials Reports, and Security Management Reports. Support Verification and Validation (V&V) activities for advanced sub-systems. Collaborate with internal and external stakeholders during technical discussions. Manage technical documentation … You'll Bring Strong knowledge of electronic hardware Verification and Validation processes. Understanding of Security principles in Information Warfare, Networking, Cryptography, and System Vulnerability. Effective communicator with the confidence to lead technical interchange discussions. Proficient in product data management tools (e.g., Teamcenter, SharePoint, Confluence). More ❯
protects people and platforms in complex threat environments. What You'll Do Produce key documentation including Test Reports, Integration & Trials Reports, and Security Management Reports. Support Verification and Validation (V&V) activities for advanced sub-systems. Collaborate with internal and external stakeholders during technical discussions. Manage technical documentation … You'll Bring Strong knowledge of electronic hardware Verification and Validation processes. Understanding of Security principles in Information Warfare, Networking, Cryptography, and System Vulnerability. Effective communicator with the confidence to lead technical interchange discussions. Proficient in product data management tools (e.g., Teamcenter, SharePoint, Confluence). More ❯