At a Glance
- Tasks: Protect IT infrastructure by implementing security controls and managing vulnerabilities.
- Company: Join a dynamic team focused on safeguarding digital environments in Farnborough, UK.
- Benefits: Enjoy hybrid work options, competitive pay, and opportunities for professional growth.
- Why this job: Be part of a crucial mission to secure systems and make a real impact in cyber security.
- Qualifications: Hands-on experience with AWS and a passion for cyber security are essential.
- Other info: No clearance required; DV process starts upon selection.
The predicted salary is between 48000 - 72000 £ per year.
No Clearance required. DV process will start upon selection.
Location: Hybrid to Farnborough, UK (2-3 days)
Required Skills: Hands-on experience with AWS will be required at this stage of the project.
The Cyber Security Engineer plays a crucial role in protecting the IT infrastructure by using a blend of technical expertise and strategic planning to ensure that the digital infrastructure remains secure from various types of attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure.
Key functions/outputs:
- Vulnerability Scanning & Reporting
- Endpoint Security
- Incident Management & Tickets
- System Hardening
- Change Work
- Participation in Regular Meetings
- Documentation
Main Objectives:
- Vulnerability Scanning & Reporting: Perform regular vulnerability scans and generate reports utilising the below tool sets or similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system.
- Code Scans: Perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities.
- Vulnerability Management Tooling: Perform regular Vulnerability Management Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities.
- Reporting: Assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the cyber security and IA lead.
- Endpoint Security: Perform regular updates to Endpoints to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats.
- Antivirus and Anti-malware Protection: Perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team.
- Network Controls: Perform compliance checks and regular audits of network controls (i.e. firewall rules) to ensure that unauthorised access and threats are being blocked.
- Access Control: Ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems.
- Incident Management & Tickets: Help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives.
- Incident Response: Respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations.
- Ticket Requests: Respond to and resolve any tickets raised to the Security group on SD+ that require Cyber Security Engineering input.
- System Hardening: Ensure that the security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security.
- System Compliance: Perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc.
- Security Enforcing Function Configuration: Assist in the design, reviews and updates to security enforcing functions (i.e. GPOs or System Policies) and system controls to ensure that they are compliant and fit for purpose.
- Vulnerability Assessments: Conduct periodic assessments to identify and address potential vulnerabilities.
- Change Work: Assist in evaluation and impact assessment of system change to security posture of the environments.
- Security Evaluation, Testing and Assurance (ST&V): Perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning.
- Participation in Regular Meetings: Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This may include the following depending on work activity: Security Working Group (SWG), Vulnerability Triage, Security Workshop, PI Planning, Daily Standups (Blue/Green Team).
- Documentation: Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation. This includes High-Level & Low-Level Designs (HLD/LLD), Standard Operating Procedures (SOP) and compliance reports, and other ad-hoc security documentation.
Cyber Security Engineer employer: GardPass Consulting
Contact Detail:
GardPass Consulting Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Engineer
✨Tip Number 1
Familiarise yourself with AWS services and security features, as hands-on experience is crucial for this role. Consider taking online courses or certifications that focus on AWS security to boost your knowledge and demonstrate your commitment.
✨Tip Number 2
Stay updated on the latest trends and threats in cyber security. Follow industry blogs, attend webinars, and participate in forums to engage with other professionals. This will not only enhance your understanding but also show your passion for the field during interviews.
✨Tip Number 3
Practice your incident response skills through simulations or capture-the-flag challenges. Being able to demonstrate your ability to respond effectively to security incidents can set you apart from other candidates.
✨Tip Number 4
Network with current employees or professionals in the cyber security field. Use platforms like LinkedIn to connect and engage in conversations about their experiences. This could provide valuable insights and potentially lead to referrals when applying through our website.
We think you need these skills to ace Cyber Security Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber security, particularly with AWS and vulnerability management. Use specific examples to demonstrate your hands-on skills and achievements in previous roles.
Craft a Strong Cover Letter: Write a cover letter that addresses the key responsibilities mentioned in the job description. Explain how your background aligns with the role of a Cyber Security Engineer and express your enthusiasm for contributing to the company's security efforts.
Showcase Technical Skills: In your application, emphasise your technical expertise, especially in areas like vulnerability scanning, incident management, and endpoint security. Mention any relevant tools or methodologies you are familiar with.
Highlight Soft Skills: Cyber Security Engineers need strong communication and teamwork skills. Include examples of how you've successfully collaborated with teams or communicated complex security concepts to non-technical stakeholders.
How to prepare for a job interview at GardPass Consulting
✨Showcase Your AWS Experience
Since hands-on experience with AWS is crucial for this role, be prepared to discuss specific projects where you've utilised AWS services. Highlight any security measures you implemented and how they contributed to the overall security posture.
✨Demonstrate Your Incident Management Skills
Prepare examples of past incidents you've managed, focusing on your approach to identifying, responding to, and resolving security breaches. Discuss the tools you used and the outcomes of your actions to show your effectiveness in incident management.
✨Familiarise Yourself with Vulnerability Scanning Tools
Research the vulnerability scanning tools mentioned in the job description or similar ones. Be ready to explain how you have used these tools in previous roles, including how you generated reports and addressed identified vulnerabilities.
✨Prepare for Technical Questions
Expect technical questions related to system hardening, endpoint security, and compliance audits. Brush up on industry best practices like CIS, STIG, and NIST, and be ready to discuss how you've applied these in your work.