Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Cybersecurity Consultant

EGIS SINGAPORE PTE. LTD.
Glasgow
1 week ago
Create job alert

Role purpose:

As a Operational Cybersecurity Consultant you will work with team in project delivery, producing deliverables for securing systems, particularly those which are used within critical aviation (airports and ATM) infrastructures and state-level systems. You will work in both new deployment projects (greenfield) and in enhancing the cybersecurity of existing systems (brownfield). Your primary responsibility will be to develop and deliver a balanced cybersecurity solution which recognises the operational environments in which our clients systems work. Interaction, compromise and support of related disciplines such as safety and regulatory compliance is key. This position is part of a global team working in a variety of industrial specialisms and with a common interest in developing cybersecurity in operational aviation and ATM environments.

Core tasks:

  • Client Needs Analysis: Thoroughly understand the specific cybersecurity requirements of clients for their aviation and ATM projects. Analyze technical specifications and clauses, synthesize them, and provide regulatory and normative complements in accordance with the client's needs.
  • Cybersecurity Solutions Design verification: review Design cybersecurity solutions tailored to projects, taking into account client constraints and objectives. Integrate cutting-edge technologies to enhance system security.
  • Project Assistance: Actively participate in all project phases, from preliminary design to implementation, reception, and commissioning, ensuring the incorporation of cybersecurity measures from the outset (Secure by Design).
  • Risk Assessment, System Mapping, Specification Writing: Evaluate risks to systems in collaboration with stakeholders. Establish information system mapping. Draft security requirements for system application.
  • Contractor Selection: Collaborate with the contractor selection teams to choose competent and specialized cybersecurity partners for project execution.
  • Work Execution Control: Ensure rigorous monitoring of the compliance of cybersecurity work execution by contractors.
  • Homologation and Commissioning: Actively participate in the homologation of operational technology information systems, contributing to the preparation of the Homologation Dossier to ensure the acceptance of cyber risks before commissioning.
  • Team Awareness: Present key risks, security standards, and best practices in cybersecurity to project teams. Act as a technical advisor to project teams, providing specific recommendations to strengthen system security.

Key Result Areas

Key Actions Strategy

▬ Appreciate Egis�� strategic direction and plan for cybersecurity & aviation

People

▬ Build positive and effective relationships with key internal and external stakeholders

▬ Act as subject matter expert to develop relevant skills in Consultants and Graduate Consultants

▬ Be open to, and actively seek, feedback from colleagues and clients

Operations

▬ Assist project lead and project team in completing project tasks to meet client requirements

▬ Communicate effectively with project team and relevant client staff

▬ Complete all project administrative tasks as specified in the company’s quality manual and procedures

▬ Timely submission of accurate weekly/ monthly timesheets

Clients

▬ Ensure deliverables meet client expectations

▬ Maintain effective communication with clients

▬ Develop understanding of client’s context and challenges

Financial

▬ Ensure spending is within budget and consistent with delegations of authority

▬ Ensure time spent on each project is within client budget as guided by Project Lead

▬ Achieve agreed utilisation targets

Integrated Management System

▬ Compliance with Quality Policy and Health, Safety and Environment Policy

▬ Awareness of the integrated management system and related procedures

Personal

▬ Behaviour consistent with Egis’ Code of Conduct, policies and values

▬ Commitment to personal and professional development

Key role experiences, competencies and qualifications:

▬ Tertiary Qualification(s) in relevant field

▬ Organisational and prioritisation skills

▬ Strong research and analytic skills

▬ Excellent written and verbal communication skills

▬ Knowledge of the aviation/ATM environment

▬ Computer literate with advanced skills in Microsoft Office suite (Word, PowerPoint, Excel)

▬ Experience with professional services business environments preferred

Key personal attributes:

▬ Authentic, collaborative and self-aware

▬ Strong Interpersonal relation skills and capacity to solve issues

▬ Enjoys working with others and building effective internal and external relationships

▬ Effectively manages self and others under pressure, mature approach to resolving conflicting business priorities

▬ Accepts responsibility for making things happen

▬ Shows initiative

▬ Is positive and instils confidence in others

▬ Is adaptable and flexible – comfortable with change and ambiguity


#J-18808-Ljbffr

Related Jobs

View all jobs

Cybersecurity Consultant

Cybersecurity Consultant

Cybersecurity Consultant

Cybersecurity Consultant / Concierge Security Engineer 2

Junior Cybersecurity Consultant (UK)

Senior Cybersecurity Consultant 3 / Concierge Security Engineer 3

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.