At a Glance
- Tasks: Join a team to secure high-value digital assets in aerospace and defence.
- Company: Bullisher is a fintech innovator transforming the $3 trillion aerospace and defence sector.
- Benefits: Enjoy a dynamic work environment with opportunities for growth and innovation.
- Why this job: Be at the forefront of cybersecurity, shaping policies and protecting critical systems.
- Qualifications: 20+ years in cybersecurity, advanced degrees, and multiple certifications required.
- Other info: This role requires UK work eligibility; no visa sponsorship available.
The predicted salary is between 72000 - 108000 ÂŁ per year.
Bullisher is a data centric fintech solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility.
This role may suit an individual who is a specialist in truly integrated highly secure one device solution into trusted security networks. The oversight requires you to strengthen security of high value long live digital assets and critical systems. As a newly created role for a team of eight, you’ll become the foundation of Bullisher’s security policy building blocks of the solutions ecosystem, with encryption at the core of the organisation's security.
What are we looking for:
- A proven record in driving computing processing capabilities policy management.
- Proven record exercising the DoD 8140 and DoD 8570 in computer network defense.
- The ability to develop reference architecture employing multiple quantum resistance mechanisms.
- Incrementally executing multiple reference framework (NIST Special Publication 800-53)-(ISO/IEC 27001) - (NIST SP 800-37) risk management approach in conformity with (DFARS § 252.204-7012) Defense Federal Acquisition Regulation Supplement.
- The implementation of NIST SP 800-171 Assessment Methodology.
Duties and Responsibilities:
- Generate key materials from high entropy to random source from master key - distribute the master key to encryption end points and ensure data is encrypted at source and protected throughout its lifecycle.
- Create a secure route of trust that is controlled out of a centralized policy management.
- Enhance and develop a combined solution to encrypt data at endpoints, such as laptops and mobile devices.
- Deploy new quantum resistance algorithms and quantum cryptography to maintain confidentiality, authenticity, and data integrity.
- Evaluate security needs and vulnerabilities.
- Conduct risk management to become more crypto agile.
- Migrating any new security strategy must undergo a rigorous test and installation period, which will undergo a formal approval, review, and vote by representatives for security impact analysis, the C.A.B. (Change Approval Board).
- Ensure production data is masked before it goes to any QA or sandbox or staging environment.
- Identify and protect the organisation’s crown jewels under corporate policy.
- Incorporate guidance policies and mechanisms relevant to architecture which offers a standard interface for supporting flexible deployment.
- Ensure processes adhere to standards for secure systems design in conformity to NIST SP 800-160.
- Concrete implementation to protect sensitive data while avoiding silos and security gaps.
- Areas to cover include balancing protections inside and outside the network, various ways of prioritising risk, and mapping potential paths into and out of our network.
- Merging attack surface management, vulnerability, and threat information to identify real risk.
Physical Demands:
This position requires the ability to communicate and exchange information, utilise equipment necessary to perform the job, and move about the office.
Environment:
This position will operate in the following areas of the organisation regulatory engineering division “Multidomain Defence Dock”. Employees must be legally authorized to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.
Qualifications, Key Requirements and Skillset:
- Excellent programming skills.
- 20+ years in cybersecurity and digital solutions engineering.
- Proficiency in strong key generation, key lifecycle management, and policy management is essential.
- High-level recognised degree in Quantum Physics or multi-physics degree.
- (GSEC) and Offensive Security Certified Professional (OSCP) are essential.
- Certified Information Security Manager (CISM) is essential.
- Certified Authorization Professional (CAP).
- Certified Network Defender (CND).
- Information Systems Security Architecture Professional (ISSAP).
- Health Care Information Security and Privacy Practitioner (HCISPP).
- GIAC Certified Intrusion Analyst (GCIA).
- GIAC Security Leadership Certificate (GSLC).
- Information Systems Security Engineering Professional (ISSEP).
- Certified Ethical Hacker (CEH).
- Computer Hacking Forensics Investigator (CHFI).
- It is a prerequisite to be certified in one of the listed DoD 8570 Certifications.
Interview Process:
- Stage 1: Cognitive Ability Test
- Stage 2: Cognitive Assessment Screening: with a 30+ years experience psychologist
- Stage 3: Pre-screening (verification checks & DV security clearance)
- Stage 4: Interview with the CEO, CTO & GC
CYBER SECURITY INFRASTRUCTURE ENGINEER- AEROSPACE AND DEFENSE. employer: Gentrian
Contact Detail:
Gentrian Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land CYBER SECURITY INFRASTRUCTURE ENGINEER- AEROSPACE AND DEFENSE.
✨Tip Number 1
Familiarise yourself with the specific cybersecurity frameworks mentioned in the job description, such as NIST SP 800-53 and ISO/IEC 27001. Understanding these frameworks will not only help you during the interview but also demonstrate your commitment to the role.
✨Tip Number 2
Network with professionals in the aerospace and defence sector, especially those who have experience with quantum resistance mechanisms. Engaging in discussions or forums can provide insights and potentially valuable connections that could aid your application.
✨Tip Number 3
Prepare to discuss your experience with policy management and key lifecycle management in detail. Be ready to share specific examples of how you've implemented security measures in previous roles, as this will be crucial for demonstrating your fit for the position.
✨Tip Number 4
Stay updated on the latest trends and technologies in cybersecurity, particularly those related to quantum cryptography and data encryption. Showing that you are proactive about learning can set you apart from other candidates.
We think you need these skills to ace CYBER SECURITY INFRASTRUCTURE ENGINEER- AEROSPACE AND DEFENSE.
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in cybersecurity, particularly in areas relevant to the aerospace and defence sectors. Emphasise your familiarity with DoD 8140 and DoD 8570 standards, as well as any specific projects that demonstrate your ability to manage high-value digital assets.
Craft a Strong Cover Letter: In your cover letter, express your passion for cybersecurity and how it aligns with Bullisher's mission to revolutionise the industry. Mention your experience with quantum resistance mechanisms and risk management frameworks like NIST and ISO/IEC, showcasing how you can contribute to their security policy.
Highlight Relevant Certifications: List all relevant certifications prominently in your application. Ensure you include essential qualifications such as GSEC, OSCP, CISM, and any other DoD 8570 certifications, as these are crucial for this role.
Showcase Problem-Solving Skills: Provide examples of past experiences where you successfully identified vulnerabilities and implemented security solutions. This could include deploying encryption strategies or conducting risk assessments, demonstrating your ability to enhance security measures effectively.
How to prepare for a job interview at Gentrian
✨Showcase Your Technical Expertise
Make sure to highlight your extensive experience in cybersecurity and digital solutions engineering. Be prepared to discuss specific projects where you've implemented security measures, especially those involving encryption and risk management frameworks like NIST and ISO.
✨Demonstrate Problem-Solving Skills
Prepare examples of how you've tackled complex security challenges in the past. Discuss your approach to evaluating security needs and vulnerabilities, and how you’ve successfully implemented new strategies or technologies to enhance security.
✨Familiarise Yourself with Relevant Regulations
Understand the key regulations and standards mentioned in the job description, such as DoD 8140, DoD 8570, and DFARS. Being able to speak knowledgeably about these will show that you're well-prepared and serious about the role.
✨Engage with the Interviewers
During the interview, don't just answer questions—engage with the CEO, CTO, and GC. Ask insightful questions about their current security challenges and how they envision the role contributing to their goals. This shows your interest and initiative.