At a Glance
- Tasks: Lead software engineering in aerospace and defence, optimising AI-driven workflows.
- Company: Bullisher is a fintech innovator transforming the $3 trillion aerospace and defence sector.
- Benefits: Enjoy competitive pay, remote work options, and a chance to shape industry standards.
- Why this job: Join a pioneering team making real-time impacts in a high-stakes environment.
- Qualifications: Executive experience in IOMT, advanced degrees in computer science, and various security certifications required.
- Other info: Rigorous interview process includes cognitive assessments and CEO interviews.
The predicted salary is between 72000 - 108000 £ per year.
Bullisher is a data-centric fintech solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility.
This role may suit an individual who is truly specialist in END-TO-END CONTENT INFRASTRUCTURE. A set of software focused applications designed to optimize powerful hidden patterns powered by AI and machine learning to configurable workflows. These incoming workloads get to the decision makers in real-time, intelligently processing data based on size, types, and AI’s confidence score. The overarching objective for the oversight is a chance to become the BIG BIRD EYE-VIEW of the organization’s regulatory engineering division foundation building-blocks.
Areas to cover will include:
- Ingest syndication of data integrated into traditional DAM infrastructure
- Designing models and conducting simulations and analysis of systems and components
- Defining the specification of test plans to validate the model and performance
Responsibilities will include:
- Campaign planning and execution, where decisions and executions have their immediate impact on the outcome of engagement in real-time
- Operational strategy, written process, control policies, and guidelines
- Deriving standard Alpha states from standard control frameworks in conformity to NIST SP 800-171 and NIST SP 800-160
- Creating an ecosystem of practices and preparing incremental improvements
- Creating information security requirements, classifying information sensitivity, and implementing information security architecture requirements
WHAT ARE WE LOOKING FOR:
- Executive level experience in the spectrum of (IOMT) internet of military things and CND
- Academic level training record in building mathematical systems and control theory
- A proven leader with experience in edge protection strategies
- Extensive experience in threat categories
PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing necessary equipment to perform the job.
ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division: MULTIDOMAIN DEFENCE DOCK.
INTERVIEW PROCESS:
- STAGE 1: COGNITIVE ABILITY TEST
- STAGE 2: COGNITIVE ASSESSMENT SCREENING WITH A 30+ YEAR EXPERIENCE PSYCHOLOGIST
- STAGE 3: PRE-SCREENING (verification checks & DV security clearance)
- STAGE 4: INTERVIEW WITH THE CEO, CTO & GC
QUALIFICATION, SKILLS SET AND KEY REQUIREMENT:
- A proven record in building mathematical systems and control theory, edge computing/edge processing, multi-physics, Masters in computer science, custom Artificial Intelligence, data engineering, Bachelors in computer science. Certified Secure Software Lifecycle Professional (CSSLP) is essential.
- Critical modeling experience with a focused processing of converting pieces of unstructured data into structured data
- Extensive experience in AI powered software development management and advanced analytics
- In-depth working knowledge of modeling chaotic dynamics software is essential
- Strong programming skills in JAVA, SQL, C++, RUS and experience with handling large data sets
- Highly analytical individual with strong problem-solving skills and keen attention to details
- Certified Authorization Professional (CAP)
- Certified Network Defender (CND)
- Information Systems Security Architecture Professional (ISSAP)
- Certified Information Security Manager (CISM)
- Information Systems Security Engineering Professional (ISSEP)
- Certified Ethical Hacker (CEH)
- Computer Hacking Forensics Investigator (CHFI)
- Information assurance system architecture and engineer (IASAE)
- It is prerequisite to be certified in one of the listed DoD 8570 Certifications.
VICE PRESIDENT SOFTWARE ENGINEERING: AEROSPACE ANDDEFENSE... employer: Jobbydoo
Contact Detail:
Jobbydoo Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land VICE PRESIDENT SOFTWARE ENGINEERING: AEROSPACE ANDDEFENSE...
✨Tip Number 1
Network with professionals in the aerospace and defence sector. Attend industry conferences, webinars, or local meetups to connect with key players. This can help you gain insights into the company culture and potentially get a referral.
✨Tip Number 2
Familiarise yourself with the latest trends in AI and machine learning as they relate to software engineering in the aerospace and defence industries. Being able to discuss these topics intelligently during interviews will demonstrate your expertise and passion for the field.
✨Tip Number 3
Prepare for the cognitive ability tests by practising similar assessments online. This will help you feel more comfortable and confident when it comes time for the actual test, increasing your chances of passing this crucial stage.
✨Tip Number 4
Research the company's recent projects and initiatives. Understanding their current focus areas will allow you to tailor your discussions during the interview, showing that you're not only knowledgeable but also genuinely interested in contributing to their goals.
We think you need these skills to ace VICE PRESIDENT SOFTWARE ENGINEERING: AEROSPACE ANDDEFENSE...
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your executive-level experience in software engineering, particularly in the aerospace and defence sectors. Emphasise your skills in AI, machine learning, and control theory, as these are crucial for the role.
Craft a Compelling Cover Letter: Write a cover letter that showcases your leadership experience and your understanding of the regulatory engineering division. Mention specific projects or achievements that demonstrate your ability to optimise workflows and implement information security architecture.
Highlight Relevant Certifications: List all relevant certifications prominently in your application. Ensure you include those required for the position, such as Certified Secure Software Lifecycle Professional (CSSLP) and any DoD 8570 Certifications.
Prepare for the Interview Process: Familiarise yourself with the interview stages outlined in the job description. Be ready to discuss your cognitive abilities and provide examples of your experience in edge protection strategies and threat categories during the interview with the CEO, CTO, and GC.
How to prepare for a job interview at Jobbydoo
✨Showcase Your Technical Expertise
Make sure to highlight your experience with mathematical systems, control theory, and AI-powered software development. Be prepared to discuss specific projects where you've successfully implemented these skills.
✨Demonstrate Leadership Experience
As a Vice President, leadership is key. Share examples of how you've led teams in high-pressure environments, particularly in the aerospace and defence sectors. Discuss your approach to operational strategy and campaign execution.
✨Prepare for Cognitive Assessments
Since the interview process includes cognitive ability tests, brush up on relevant concepts and practice problem-solving exercises. This will help you feel more confident and perform better during the assessments.
✨Understand Regulatory Frameworks
Familiarise yourself with NIST SP 800-171 and NIST SP 800-160 standards. Be ready to discuss how you've applied these frameworks in previous roles, especially in relation to information security and compliance.