Infrastructure Platform Engineer (Contract) - Cyber

TN United Kingdom
West Midlands
1 week ago
Create job alert

Social network you want to login/join with:

Client:

Methods

Location:

Worcestershire, United Kingdom

Job Category:

-

EU work permit required:

Yes

Job Reference:

04fac86e78cd

Job Views:

6

Posted:

03.03.2025

Expiry Date:

17.04.2025

Job Description:

Methods Business and Digital Technology Limited

Methods is a £100M+ IT Services Consultancy who has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Established over 30 years ago and UK-based, we apply our skills in transformation, delivery, and collaboration from across the Methods Group, to create end-to-end business and technical solutions that are people-centred, safe, and designed for the future.

Our human touch sets us apart from other consultancies, system integrators and software houses - with people, technology, and data at the heart of who we are, we believe in creating value and sustainability through everything we do for our clients, staff, communities, and the planet.

We support our clients in the success of their projects while working collaboratively to share skill sets and solve problems. At Methods we have fun while working hard; we are not afraid of making mistakes and learning from them.

Predominantly focused on the public-sector, Methods is now building a significant private sector client portfolio.

Methods was acquired by the Alten Group in early 2022.

Methods is currently recruiting for an Infrastructure Platform Engineer (On-Prem) Consultant to join our team on a permanent basis. This role will be based on-site.

Requirements

  1. Specialized in on-premise management of platforms, applications, data, and supporting infrastructure in the capacity of a system administrator.
  2. Developing automation to support continuous delivery of changes using technologies tailored to on-prem environments.
  3. Developing infrastructure as a service configuration to automate the creation of infrastructure and platforms to host test and production systems.
  4. Building and setting up new development tools and infrastructure.
  5. Understanding the needs of stakeholders and conveying this to developers.
  6. Working on ways to automate and improve development and release processes.
  7. Testing and examining code written by others and analyzing results.
  8. Ensuring that systems are safe and secure against cybersecurity threats.
  9. Familiar with the NCSC secure design principles.
  10. Familiar with managing the security of on-prem platforms, including administration of secrets, tokens, and certificates.
  11. Working with Architects, Data, and Software Engineers to ensure that development follows established processes and works as intended.
  12. Planning out projects and being involved in project management decisions.
  13. Responsible for the design, security, and maintenance of on-prem infrastructure.
  14. Making and guiding effective decisions, explaining clearly how the decision has been reached with the ability to understand and resolve technical disputes across varying levels of complexity and risk.
  15. Communicating effectively across organizational, technical, and political boundaries to understand the context and how to make complex and technical information and language simple and accessible for non-technical audiences.
  16. Understanding of how to expose data from systems (for example through APIs), link data from multiple systems, and deliver streaming services.
  17. Ensuring that risks associated with deployment are adequately understood and documented.

Ideal Candidates will demonstrate:

  1. Experience working across cyber security teams would be beneficial.
  2. Solid infrastructure design experience for on-prem environments to implement or migrate applications and databases.
  3. Solid experience in a range of technologies and be able to make assessments as to what is best to be used for the projects and the organization. As well as suggest and develop innovative approaches within constrained projects and environments.
  4. Strong experience in software development change/release management processes and technical governance to fully understand the typical lifecycle and maintenance of live systems.
  5. Ability to work with containerization platforms such as Kubernetes, PKS, Docker; provisioning software including Ansible, Terraform; and application performance analysis and monitoring.
  6. Experience of functional and non-functional testing, including automated deployment experience of applications and databases.
  7. Understanding of the government digital service manual and standards across Discovery/Alpha/Beta/Live phases.
  8. Understanding of SaaS, PaaS, IaaS technologies, and the implications of their use compared with bespoke development.
  9. Being able to provide training, support, and mentoring to the wider business.
  10. Knowledge of how to ensure that risks associated with deployment are adequately understood and documented.
  11. Worked as part of a system support team managing live systems and triaging & resolving incidents to resolution, including management of known defects and issues.
  12. Worked as part of a multi-disciplinary project team.
  13. Experience with Terraform to deploy on-prem infrastructure.
  14. Experience with automation tools to build and deploy containerized applications.
  15. Experience implementing effective instrumentation to monitor applications.
  16. Experience implementing SAST and DAST tooling in deployment pipelines like Trivvy and SonarQube.
  17. Experience with on-prem DevOps tooling.

This role will require you to have or be willing to go through Security Clearance. As part of the onboarding process candidates will be asked to complete a Baseline Personnel Security Standard; details of the evidence required to apply may be found on the government website. If you are unable to meet this and any associated criteria, then your employment may be delayed or rejected. Details of this will be discussed with you at interview.

#J-18808-Ljbffr

Related Jobs

View all jobs

Infrastructure Platform Engineer (Contract) - Cyber

K8s/Kubernetes Platform Engineer

Platform engineer

DevOps Engineer

Senior Platform & Security Engineer

Senior Digital Platform Security Engineer, Derbyshire

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.