L4 Cyber Security Apprentice – Simply Business – London, EC2V 7NG – £26k
XBRIDGE LIMITED
London, EC2V 7NG
Closes in 16 days (Tuesday 11 March at 11:59pm)
Posted on 11 February 2025
Contents
Summary
We are looking for two Cyber Security Apprentices to help protect us from threat actors who try and make it past our cyber defences. A Security Operations Defend & Respond Apprentice and a Security Engineer Apprentice.
- Wage
- £26,000 a year
- Training course
- Cyber security technologist (2021) (level 4)
- Hours
-
Monday-Friday, 9:00-17:30
37 hours 30 minutes a week
- Possible start date
-
Friday 11 April
- Duration
-
1 year 9 months
- Positions available
-
2
Work
As an apprentice, you’ll work at a company and get hands-on experience. You’ll gain new skills and work alongside experienced staff.
What you’ll do at work
Security Operations Defend & Respond Apprentice
Responsibilities include:
- Monitor our networks to spot both active and emerging threats.
- Monitor our endpoints to combat malicious activity.
- Identify anomalous behaviour and triage incidents and alerts accordingly.
- Work directly with a team of Cyber Security Analysts and Engineers to investigate issues and escalate incidents.
- Facilitate Vulnerability Management, identifying vulnerabilities in our infrastructure and coordinating remediation efforts with our IT Teams.
- Participate in incident response, collaborating within the business to see security incidents through their full lifecycle.
- Help us to tune our security tools and automate our manual processes to make our SOC more efficient.
- Research, evaluate and assess emerging cybersecurity threats, trends, tools and capabilities.
- Participate in security-focused sessions (presentations, tabletops, and CTFs).
Security Engineer Apprentice
Responsibilities include:
- Help us to develop our security tooling to improve our detections of both active and emerging threats.
- Work with our IT teams to maintain compliance of our endpoints to prevent malicious activity.
- Work directly with a team of Cyber Security Analysts and Engineers to investigate issues and escalate incidents.
- Facilitate Vulnerability Management for our Cloud Environment, looking for any misconfigurations or vulnerabilities and liaising with our DevOps teams to resolve.
- Help us to tune our security tools and automate our manual processes to make our SOC more efficient.
- Research, evaluate and assess emerging cybersecurity threats, trends, tools and capabilities.
- Participate in security-focused sessions (presentations, tabletops, and CTFs).
Skills we need (both roles):
- Demonstrable passion for Cyber Security.
- Good understanding of security fundamentals.
- Understanding of computer networks and their core components.
- Willingness to learn and ability to demonstrate it through previous roles or academic study.
- Time management skills, to manage your apprenticeship work alongside your role.
- Ability to communicate effectively with non-technical and technical people.
- Knowledge of Information Security issues and trends.
- Knowledge of Cloud Technologies.
Where you’ll work
Sixth Floor
99 Gresham Street
London
EC2V 7NG
Training
An apprenticeship includes regular training with a college or other training organisation. At least 20% of your working hours will be spent training or studying.
College or training organisation
TECHNICAL PROFESSIONALS LIMITED
Your training course
Cyber security technologist (2021) (level 4)
Equal to higher national certificate (HNC)
Course contents
- Discover vulnerabilities in a system by using a mix of research and practical exploration
- Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
- Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
- Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
- Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
- Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
- Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
- Configure, deploy and use computer, digital network and cyber security technology.
- Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
- Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
- Identify cyber security threats relevant to a defined context
- Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
- Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
- Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
- Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case
- Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
- Use tools, techniques and processes to actively prevent breaches to digital system security.
- Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
- Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
- Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
- Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
- Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation..
- Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
- Assess security culture using a recognised approach.
- Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
- Develop plans for incident response for approval within defined governance arrangements for incident response.
- Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach
- Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
- Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
- Manage local response to non-major incidents in accordance with a defined procedure.
- Discover vulnerabilities in a system by using a mix of research and practical exploration
- Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
- Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
- Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
- Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
- Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
- Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
- Configure, deploy and use computer, digital network and cyber security technology.
- Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
- Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
- Identify cyber security threats relevant to a defined context
- Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
Your training plan
During this apprenticeship, you will follow a fully supported training programme with LearnTech, delivered through combined classroom-based training, workplace assessment/training and online learning.
The training covers the following core occupational duties:
https://www.instituteforapprenticeships.org/apprenticeship-standards/cyber-security-technologist-2021-v1-0
Requirements
Essential qualifications
GCSE in:
- English (grade 4 (C))
- Maths (grade 4 (C))
Desirable qualifications
A Level in:
- IT/Computer Science (grade A*-C)
BTEC in:
- IT/Computer Science (grade Pass/Merit/Distinction)
Let the company know about other relevant qualifications and industry experience you have. They can adjust the apprenticeship to reflect what you already know.
Skills
- Communication skills
- IT skills
- Organisation skills
- Problem solving skills
- Logical
- Team working
- Initiative
- Passion for Cyber Security
- Willing to learn
Other requirements
Flexible working – at least 2 days in office per week *Please note, the business will shortly be moving to EC1Y 8LZ
About this company
Simply Business is one of the UK’s largest business insurance and landlord insurance providers. We protect nearly one million small businesses and self-employed people across 1,500 trades – from builders to bakers and personal trainers. Our mission? Taking the hassle out of buying insurance, offering simplicity, choice and value wherever we can.
After this apprenticeship
There may be the opportuity to apply for a full-time role at the end of this apprenticeship.
Ask a question
The contact for this apprenticeship is:
TECHNICAL PROFESSIONALS LIMITED
Georgia Dunn
g.dunn@learn-tech.com
The reference code for this apprenticeship is VAC1000302906.
Apply now
Closes in 16 days (Tuesday 11 March at 11:59pm)
When you apply, you’ll be asked to sign in with a GOV.UK One Login. You can create one at the same time as applying for this apprenticeship.