DevSecOps ENGINEERS-AEROSPACE AND DEFENSE

Gentrian
united kingdom
2 months ago
Create job alert

DevSecOps ENGINEERS-AEROSPACE AND DEFENSE:

Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility.

JOB DESCRIPTION:

The oversight requires you to mitigate the risk and improve resilience to plan and govern, deploy & test, release & deploy, operate & monitor specific requirements forALM (Application lifecycle management).A team of four to integrate security throughout the entire development process to meet the organizational goals. Our focus is specifically agile approach and hybrid approach. This will include a demonstration of DimensionRM, ALM,and Connect showing requirements generation and life cycle management with traceability through product delivery, ofALMas part of our management, testing, security testing, deployment and monitoring of the applications and production.

Areas to cover will include:

  • Requirements, test and defect management
  • Release and sprint management
  • Continuous integration(CI)
  • Functional testing
  • Performance testing and virtualisation
  • Production insights and assets sharing
  • Test execution
  • User story.

There will be a high-level review of classic System Engineering Artefact Management, Traceability and Governance, controls and regulations in place that demands reporting-line procedures, that needs to be managed track and trace:

  • Capability, functional requirements
  • Non-functional, performance requirements
  • Security requirements, epics and user story.

So we have the ability in our solutions to be able to track from capability, epics, to functional requirements, and have that lifecycle traceability across a hybrid environment.Areas to focus will include:

  • Capability requirements
  • Requirements to other requirements
  • Requirements to defects
  • Requirements to test
  • Requirements to code.

GOVERNANCE:Implement and manage the entire system engineering lifecycle, built-in project reporting, dashboard, generate appropriate SRS reports, built-in health reports, graphs and live Analysis to be able to very quickly see as changes are happening within the requirements management and the other areas withinALMand what the impact in these changes are. Focus on high level aroundALMto track those requirements, improve efficiency, with traceability, and automation of different aspects of the lifecycle. Implement high-level security, enforce different built-in workflows and processes around the engineering lifecycle and real-time insights. Support the integration capabilities withALM.

Our systems requirements will be traditionally managed through a hierarchical framework, so the attributes can be tracked and associated with the requirements. Insert/build a guidance rich text as a part of a standard structure document that can be included and supplemented. E.g content of the requirement text or definition which can automatically track, when was it last modified, who created it, requirements to get a uniqueIDthat tracks throughout its lifecycle. Established a live hyper-link requirement to requirement traceability, architecture documents.

The system requirements document(SRS)will include detailed functional requirements for the system on ‘what’ are the behaviors based on specified end-user use cases as well as non-functional requirements for example;GUI, quality & performance, Usability and system behavior requirements that directly or indirectly impact the system. DevSecOps and adopters are expected to clearly understand the definitions and agree upon the ranking of the definitions used with any given requirement.SRStext will automatically be incorporated as part of a standard template. All the instantiationSRStemplates of the project must be platform and database-independent applications. It should be possible to run it on any operating system, should support any database and should work on any web browser. We are a startup enhancing the formation of early stages of a product development project.

PHYSICAL DEMANDS:This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job.

ENVIRONMENT:This position will operate in the following areas of the organization regulatory engineering division:MULTIDOMAIN DEFENCE DOCK:

MULTIDOMAIN DEFENCE DOCK:Standard engineering lab environment.

Employees must be legally authorized to work in theUK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.

QUALIFICATIONS, SKILLSET AND KEY REQUIREMENTS:

7-10 years of extensive experience working in practical labs, real-world projects, and scenario-based exercises. You'll work on integrating security intoCI/CDpipelines, automating security checks, and identifying vulnerabilities in various environments.

  • Masters in computer science, Offensive Security Certified (OSCP), Certified DevSecOps Professional (CDP), Professional, Certified Information Security Manager (CISM), Information Systems Security Engineering Professional (ISSEP), Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Certified Secure Software Lifecycle Professional (CSSLP) is essential.
  • Certified Authorization Professional (CAP)
  • Certified Network Defender (CND)
  • Information Systems Security Architecture Professional (ISSAP)
  • Health Care Information Security and Privacy Practitioner (HCISPP)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Security Leadership Certificate (GSLC)
  • It’s a prerequisite to be certified on two of the listed DoD 8570 Certifications.

INTERVIEW PROCESS:

  • STAGE 1: COGNITIVE ABILITY TEST
  • STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST:
  • STAGE 3: PRE-SCREENING (verification checks & DV security clearance)
  • STAGE 4: INTERVIEW WITH THE: CEO, CTO & CHIEF ENGINEER

#J-18808-Ljbffr

Related Jobs

View all jobs

Principal Security Engineer

DevSecOps Engineer

DevSecOps Engineer Lead

Senior Security Engineer

Product Security Engineer

Lead Application Security Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.