Cyber Security Engineer - Defence

Cyberfort
1 month ago
Applications closed

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer, Crowdstrike, SIEM - Hybrid, London 75k

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Job Title:

Cyber Security Engineer

Reporting to:

Head of Defence and Aerospace Consultancy

Location:

Remote with travel to customer site (Feltham)

Role Requirements:

  • Must hold a current government security vetting at SC level OR Be eligible to obtain such clearance.
  • Must be currently resident in the UK
  • Must have resided in the UK for the last 5 years consecutively.

Desirable

  • Previous experience within defence.
  • Delivering Security within agile projects

Reward Package:

  • Salary Package - £65,000 - £85,000 DOE
  • 25 days annual holiday + Birthday off in addition and option to buy/sell additional 5 days
  • Company Pension Scheme
  • Private medical Cover
  • Life Assurance
  • Extensive non-taxable benefits

THE ROLE

This is an exciting opportunity to join our world class Consultancy arm, as a Senior/Lead Cyber Security Risk Consultant, supporting the next phase of Cyberfort’s growth. You’ll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture and Risk planning. We work across a number of sectors with a diverse client base. We aim to create an environment where everyone can reach their full potential. We work together, we are passionate, creative, and we embrace difference.

In this role you’ll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security risk assessment and best practice solutions that match their requirements. You’ll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice.


As a Security Consultant, you will be involved in a variety of work which may include responsibility for leading, advising and implementing risk management frameworks, Information Security Management Systems, Enterprise Security Risk Management (2nd line assurance), 1st line identification of risks relating to Security Architecture, maintaining an awareness of published vulnerabilities and best practices across various platforms, especially cloud infrastructures, leading and delivering security assurance coordinator activities, providing Security & Information Risk Advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk-informed decisions, ensuring protection of client assets and transformation of their security architecture.


This role forms part of the wider Consultancy team and will work cross functionally with the Delivery Managers and others to support and assure project delivery through all phases of the agile workflow. As a team we’re always looking to raise the bar, learn new things and incorporate new technologies and you will too! You’ll share your knowledge with the team and the wider Cyberfort community, contributing to Group blogs and undertaking research related to technology enhancements.


Responsibilities:

General Responsibilities:


Vulnerability Scanning & Reporting

Perform regular vulnerability scans and generate reports utilising the below tool sets. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system.

  • SonarQube: perform regular scans with SonarQube to audit code quality metrics, potential bugs, and security vulnerabilities.
  • Trivvy:perform regular scans with Trivvy to identify vulnerabilities within containers.
  • Nessus:perform regular Nessus scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities.
  • Reporting:assist the Vulnerability and Patch Manager withgenerating regular vulnerability management reports, which are to be provided to the P-ASG cyber security and IA lead.


Endpoint Security

  • Trellix:perform regular updates to Trellix to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats.
  • Antivirus and Anti-malware Protection:perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team.
  • Firewalls:perform compliance checks and regular audits of Firewall rules to ensure that unauthorised access and threats are being blocked.
  • Access Control:ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems.


Incident Management & Tickets

  • Incident Identification:help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives.
  • Incident Response:respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations.
  • Ticket Requests:respond to and resolve any tickets raised to the Leidos Security group on SD+ that require Cyber Security Engineering input.


System Hardening

  • Patch Updates to Security Products:ensure that the following security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security:
  • Trellix
  • Bolden James
  • Nessus
  • SonarQube
  • Trivvy
  • System Compliance:perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc.
  • Security Enforcing Group Policy Objects (GPOs):perform regular reviews and updates to security enforcing GPOs to ensure that they are compliant and fit for purpose.
  • Vulnerability Assessments:conduct periodic assessments to identify and address potential vulnerabilities.


Change Work

  • Security Impact Triage Tool (SITT):if a SITT is required for new software or hardware then it is the responsibility of the Cyber Security Engineer to fill outSection 2of the SITT tool.
  • Security Evaluation, Testing and Assurance (ST&V):perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning.


Participation in Regular Meetings

Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This includes the following:

  • Security Working Group (SWG):Lead Cyber Security Engineer to attend.
  • Vulnerability Triage:Lead Cyber Security Engineer to manage and other Cyber Security Engineers to attend.
  • Security Workshop:All Cyber Security Engineers to attend.
  • PI Planning:Change Cyber Security Engineers to participate and attend.
  • Daily Standups (Blue/Green Team):Change Cyber Security Engineers to attend every day.


Documentation

Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation. This includes High-Level & Low-Level Designs (HLD/LLD), Standard Operating Procedures (SOP) and compliance reports.

To be Great at the role:

  • Be customer focused and a strong verbal and written communicator.
  • Possess strong hands-on experience in reviewing project delivery plans relating to security systems; evaluation of network and security technologies; developing requirements for network and cloud security designs as well as hardware & software, able to implement cyber security and risk management frameworks, deliver cyber risk assessment in line with established risk methodologies, providing Security & Information Risk Advice.
  • Have experience building and implementing secure by design principals within the software development lifecycle (SDLC).
  • Possess awareness and understanding of HMG and NCSC Security policies, standards and guidance, alongside MOD Joint Service Publications i.e. JSP440 and JSP604
  • Passionate in cyber security.
  • Motivated, self-directed and able to work in large and virtual teams.


Our Purpose:


The Cyberfort Group is a community of 180+ passionate people united by one overall mission... to make the world safer, one business at a time. We are the "one-stop shop" for all things cyber and are working to build a centre of excellence for our customers by building an amazing place to work, learn and develop for our people.


We work with a diverse range of clients, including large Governmental departments as well as other public sector organisations and businesses within the private sector. We're growing our business and our team through our continuous investment in developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threat intelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market.


If that sounds like you, we'd like to see......

  • Your CV


Find your place at the Cyberfort Group -Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of backgrounds that are to be themselves, are celebrated for thinking differently and work together as one team.

We know that a one size fits all approach to our recruitment and selection practices will not allow us to reach some of the incredible people that are out there and it’s common practice for us to make adjustments. When you apply to work for us please let us know if there’s anything we can do to allow you to showcase your skills and talents to the best of your ability.

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.