Cyber Security Infrastructure Engineer Aerospace And Defense Job In London

CYBER SECURITY INFRASTRUCTURE ENGINEER- AEROSPACE AND DEFENSE. - Gentrian
  • London, England, United Kingdom
  • via JobLeads GmbH...
-
Job Description

CYBER SECURITY INFRASTRUCTURE ENGINEER - (HYBRID SYSTEMS REFERENCE ARCHITECTURE)- AEROSPACE AND DEFENSE.

Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation.

JOB DESCRIPTION:

This role may suit an individual who is a specialist in truly INTEGRATED HIGHLY SECURE ONE DEVICE SOLUTION INTO TRUSTED SECURITY NETWORKS. The oversight requires you to strengthen security of high value long live digital assets and critical systems. High security seed content generated through the effect of quantum physics. As a newly created role you’ll become the foundation of BULLISHIER’S security policy building blocks of the solutions ecosystem, With encryption at the core of the organization Security.

WHAT ARE WE LOOKING FOR:

  • A proven record in driving computing processing capabilities policy management.
  • Proven record exercising The DoD 8140 and DoD 8570 in computer network defense.
  • The ability to developed reference architecture employing multiple quantum resistance mechanisms.
  • Incrementally, executing multiple reference framework (NIST Special Publication 800-53)-(ISO/IEC 27001) - (NIST SP 800-37)risk management approach in conformity with (DFARS § 252.204-7012) Defense Federal Acquisition Regulation (DFARS).
  • The implementation of NIST SP 800-171 Assessment Methodology.

DUTIES AND RESPONSIBILITIES:

  • Generate key materials from high entropy to random source from master key - distribute the master key to encryption end points and data is then encrypted at source and protected throughout lifecycle no matter where it is moved.
  • Create a secure route of trust that is controlled out of a centralised policy management.
  • Enhance and develop a combine solution to be use to encrypt data at end points- A good example of this is; such as laptops and mobile devices. A large scale data sharing wherever our data is.
  • By deploying new quantum resistance algorithms-as well as quantum cryptography to replace current crypto to maintain confidentiality, authenticity, and data integrity.
  • Evaluate security needs and vulnerabilities.
  • Conduct risk management to become much more crypto agile.
  • Migrating any new security strategy must undergo a rigorous test and installation period before implementing it.
  • As Attacks surfaces is constantly growing in this spectrum-Your Policies needs to be addressed and changed and grown very often in conformity with reporting requirements in forms 8-K and 10-K.
  • Make sure any production data is mass before it goes to any QA or sandbox or staging environment.
  • As we required as a startup, you need to find out where the crown-jewels are and quickly bring them under the corporate policy.
  • Incorporate guidance policies mechanism relevant approach architecture which offers standard interface for supporting flexible deployment.
  • Concrete implementation— As an organization that represents the military industrial complex in world as a grid of square cells and handles sensitive data, the needs to protect all our data and you need to avoid silos and security gaps without disrupting operations and related organizational infrastructure.
  • Areas to cover will include: Balancing protections inside and outside the network -Various ways of prioritizing risk and what doesn’t work - Mapping potential paths into and out of our network .
  • Merging attack surface management, vulnerability and threat information to identify real risk.

PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job, and move about the office.

ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division”MULTIDOMAIN DEFENCE DOCK:

MULTIDOMAIN DEFENCE DOCK“ Standard engineering lab environment ”

Employees must be legally authorized to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.

INTERVIEW PROCESS:

QUALIFICATIONS, KEY REQUIREMENTSAND SKILLSET:

  • Excellent programming skills
  • 20yrs+ in cybersecurity and digital solutions engineering
  • Proficiency in A strong key generation, key lifecycle management and policy management is essential
  • High Level recognised degree in Quantum Physics/ multi physics degree
  • INTERVIEW PROCESS:
    • STAGE 1 : COGNITIVE ABILITY TEST
    • STAGE 2 : COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST:
    • STAGE 3: PRE-SCREENING ( verification checks & security clearance)
    • STAGE 4: INTERVIEW WITH THE: CEO, CTO & GC
#J-18808-Ljbffr

;