Cyber Security Engineer - Defence

Cyberfort
Bristol
1 week ago
Applications closed

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Job Title:

Cyber Security Engineer

Reporting to:

Head of Defence and Aerospace Consultancy

Location:

Remote with travel to customer site (Feltham)

Role Requirements:

  • Must hold a current government security vetting at SC level OR Be eligible to obtain such clearance.
  • Must be currently resident in the UK
  • Must have resided in the UK for the last 5 years consecutively.

Desirable

  • Previous experience within defence.
  • Delivering Security within agile projects

Reward Package:

  • Salary Package - £65,000 - £85,000 DOE
  • 25 days annual holiday + Birthday off in addition and option to buy/sell additional 5 days
  • Company Pension Scheme
  • Private medical Cover
  • Life Assurance
  • Extensive non-taxable benefits

THE ROLE

This is an exciting opportunity to join our world class Consultancy arm, as a Senior/Lead Cyber Security Risk Consultant, supporting the next phase of Cyberfort’s growth. You’ll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture and Risk planning. We work across a number of sectors with a diverse client base. We aim to create an environment where everyone can reach their full potential. We work together, we are passionate, creative, and we embrace difference.

In this role you’ll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security risk assessment and best practice solutions that match their requirements. You’ll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice.


As a Security Consultant, you will be involved in a variety of work which may include responsibility for leading, advising and implementing risk management frameworks, Information Security Management Systems, Enterprise Security Risk Management (2nd line assurance), 1st line identification of risks relating to Security Architecture, maintaining an awareness of published vulnerabilities and best practices across various platforms, especially cloud infrastructures, leading and delivering security assurance coordinator activities, providing Security & Information Risk Advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk-informed decisions, ensuring protection of client assets and transformation of their security architecture.


This role forms part of the wider Consultancy team and will work cross functionally with the Delivery Managers and others to support and assure project delivery through all phases of the agile workflow. As a team we’re always looking to raise the bar, learn new things and incorporate new technologies and you will too! You’ll share your knowledge with the team and the wider Cyberfort community, contributing to Group blogs and undertaking research related to technology enhancements.


Responsibilities:

General Responsibilities:


Vulnerability Scanning & Reporting

Perform regular vulnerability scans and generate reports utilising the below tool sets. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system.

  • SonarQube: perform regular scans with SonarQube to audit code quality metrics, potential bugs, and security vulnerabilities.
  • Trivvy:perform regular scans with Trivvy to identify vulnerabilities within containers.
  • Nessus:perform regular Nessus scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities.
  • Reporting:assist the Vulnerability and Patch Manager withgenerating regular vulnerability management reports, which are to be provided to the P-ASG cyber security and IA lead.


Endpoint Security

  • Trellix:perform regular updates to Trellix to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats.
  • Antivirus and Anti-malware Protection:perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team.
  • Firewalls:perform compliance checks and regular audits of Firewall rules to ensure that unauthorised access and threats are being blocked.
  • Access Control:ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems.


Incident Management & Tickets

  • Incident Identification:help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives.
  • Incident Response:respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations.
  • Ticket Requests:respond to and resolve any tickets raised to the Leidos Security group on SD+ that require Cyber Security Engineering input.


System Hardening

  • Patch Updates to Security Products:ensure that the following security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security:
  • Trellix
  • Bolden James
  • Nessus
  • SonarQube
  • Trivvy
  • System Compliance:perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc.
  • Security Enforcing Group Policy Objects (GPOs):perform regular reviews and updates to security enforcing GPOs to ensure that they are compliant and fit for purpose.
  • Vulnerability Assessments:conduct periodic assessments to identify and address potential vulnerabilities.


Change Work

  • Security Impact Triage Tool (SITT):if a SITT is required for new software or hardware then it is the responsibility of the Cyber Security Engineer to fill outSection 2of the SITT tool.
  • Security Evaluation, Testing and Assurance (ST&V):perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning.


Participation in Regular Meetings

Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This includes the following:

  • Security Working Group (SWG):Lead Cyber Security Engineer to attend.
  • Vulnerability Triage:Lead Cyber Security Engineer to manage and other Cyber Security Engineers to attend.
  • Security Workshop:All Cyber Security Engineers to attend.
  • PI Planning:Change Cyber Security Engineers to participate and attend.
  • Daily Standups (Blue/Green Team):Change Cyber Security Engineers to attend every day.


Documentation

Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation. This includes High-Level & Low-Level Designs (HLD/LLD), Standard Operating Procedures (SOP) and compliance reports.

To be Great at the role:

  • Be customer focused and a strong verbal and written communicator.
  • Possess strong hands-on experience in reviewing project delivery plans relating to security systems; evaluation of network and security technologies; developing requirements for network and cloud security designs as well as hardware & software, able to implement cyber security and risk management frameworks, deliver cyber risk assessment in line with established risk methodologies, providing Security & Information Risk Advice.
  • Have experience building and implementing secure by design principals within the software development lifecycle (SDLC).
  • Possess awareness and understanding of HMG and NCSC Security policies, standards and guidance, alongside MOD Joint Service Publications i.e. JSP440 and JSP604
  • Passionate in cyber security.
  • Motivated, self-directed and able to work in large and virtual teams.


Our Purpose:


The Cyberfort Group is a community of 180+ passionate people united by one overall mission... to make the world safer, one business at a time. We are the "one-stop shop" for all things cyber and are working to build a centre of excellence for our customers by building an amazing place to work, learn and develop for our people.


We work with a diverse range of clients, including large Governmental departments as well as other public sector organisations and businesses within the private sector. We're growing our business and our team through our continuous investment in developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threat intelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market.


If that sounds like you, we'd like to see......

  • Your CV


Find your place at the Cyberfort Group -Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of backgrounds that are to be themselves, are celebrated for thinking differently and work together as one team.

We know that a one size fits all approach to our recruitment and selection practices will not allow us to reach some of the incredible people that are out there and it’s common practice for us to make adjustments. When you apply to work for us please let us know if there’s anything we can do to allow you to showcase your skills and talents to the best of your ability.

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Tips for Staying Inspired: How Cyber Security Pros Fuel Creativity and Innovation

Cyber security professionals face a rapidly changing digital landscape, where new threats emerge almost daily and the stakes—protecting critical data, safeguarding personal privacy, and defending entire infrastructures—could not be higher. It’s easy to be consumed by vulnerability scans, incident response workflows, and endless compliance checks. Yet, thriving in this high-pressure environment demands more than just technical know-how. It also requires creativity and innovation, which enable you to stay one step ahead of potential attackers. So how do cyber security experts remain inspired and agile, even when the challenges can feel relentless? Below, we’ll explore ten actionable strategies to help security analysts, threat hunters, penetration testers, and security engineers maintain fresh perspectives and keep innovating. If you’re looking to sharpen your problem-solving skills and rediscover the spark that drew you to cyber security in the first place, these tips can guide you toward a more fulfilling and impactful career.

Top 10 Cyber Security Career Myths Debunked: Key Facts for Aspiring Professionals

In a hyper-connected world, cyber security is no longer an afterthought—it’s a core component of modern business, government, and everyday life. From stopping ransomware attacks to safeguarding personal data, cyber security professionals shoulder a vital responsibility: keeping digital systems, networks, and data safe. Unsurprisingly, the demand for skilled cyber security talent continues to surge, offering robust and often lucrative career paths. Yet, despite the industry’s prominence, myths and misconceptions about cyber security careers abound. Is it really just about hacking? Do you need to be a superhuman coder with years of experience? Or is cyber security just a niche field, reserved for tech giants? At CyberSecurityJobs.tech, we see firsthand how these myths deter capable individuals from entering or advancing in one of the most dynamic fields in tech. This article aims to bust the top 10 cyber security career myths—providing clear, evidence-based insights into what it really takes to thrive in this ever-evolving domain. Whether you’re a recent graduate exploring the field, a mid-career professional seeking a pivot, or simply curious about the prospects, read on to discover the true breadth and promise of cyber security careers.

Global vs. Local: Comparing the UK Cyber Security Job Market to International Landscapes

Understanding opportunities, salaries, and work culture in cyber security across the UK, the US, Europe, and Asia Cyber security has rapidly ascended from a back-office concern to a strategic priority for every industry. As data breaches, ransomware, and nation-state attacks increase in frequency and sophistication, organisations worldwide are racing to fortify their digital defences. This ongoing surge in cyber threats fuels an unprecedented demand for skilled security professionals—ranging from penetration testers and threat intelligence analysts to cloud security architects and CISOs. In this article, we’ll explore how the UK cyber security job market compares to major international hubs in the United States, Europe, and Asia. We’ll discuss job opportunities, salary bands, work culture, and provide guidance for those who might be contemplating remote or overseas positions. By understanding the nuances of each region’s cyber security ecosystem, you can make a more informed decision about where and how to advance your career in this high-impact, fast-evolving sector. Whether you’re a seasoned expert with years of experience or a career-changer eager to break into cyber security, this overview will help you navigate the global landscape. By the end, you’ll have a clearer perspective on each region’s advantages and challenges—along with practical insights for seizing the best opportunities in a field that has become mission-critical for every modern organisation.