Cyber Security Engineer Apprentice (L4) – Givenergy – Newcastle-under-Lyme, ST5 9HX – £20k-£23.8k

GIVENERGY SOFTWARE LTD

NEWCASTLE (ST5 9HX)

Closes in 25 days (Wednesday 30 April 2025 at 11:59pm)

Posted on 3 April 2025


Summary

We're seeking an enthusiastic Cyber Security Apprentice, with a genuine interest in computers, who is keen to learn more about cyber security and help our business to stay secure using modern tools and techniques.

Wage

£20,000 a year

Check minimum wage rates (opens in new tab)

Salary range between £20,000 - £23,800 p/a

Training course
Cyber security technologist (2021) (level 4)
Hours
Monday to Friday, shifts to be confirmed.

37 hours 30 minutes a week

Start date

Wednesday 14 May 2025

Duration

1 year 9 months

Positions available

1

Work

Most of your apprenticeship is spent working. You’ll learn on the job by getting hands-on experience.

What you’ll do at work

Please note that this job description is a general overview and responsibilities may evolve over time. 
 
The role involves identifying security risks, threats and vulnerabilities to inform information security systems and design effective security controls. It includes identifying attacks, unusual behaviour, supporting security risk assessments, incident management, configuring security technology, and developing scripts for deploying configuration and querying logs. Responsibilities also cover reviewing logs and configuration, cybersecurity operations, participating in simulations, and staying updated with industry trends.  
 
The role requires consideration of current and future security configuration of Microsoft Azure, AWS, local networks and internet connectivity. You’ll be implementing security controls and preventing data breaches using a selection of industry tools and techniques.  
 
In addition to the above, you will also:

  • Identify security vulnerabilities in a system to ensure security is effectively maintained. 
  • Identify security threats and risks to a system, service or processes to inform risk assessments and design of security features.   
  • Research and investigate attack techniques and recommend ways to defend against them.   
  • Support cyber security risk assessments, cyber security audits and cyber security incident management. 
  • Develop security designs with design justification to meet the defined cyber security parameters. 
  • Configure, deploy and use computer, digital network and cyber security technology. 
  • Develop program code or scripts for a computer or other digital technology for example exploring security log information and applying security baseline configurations to computer systems.  
    Write reports, give verbal reports and presentations in the context of the cyber security role. 
  • Manage cyber security operations processes in accordance with organisational policies and standards and business requirements. 
  • Participate in cyber security simulations (technical & non-technical) for example to better understand cyber-attack and defence, rehearse responses, test and evaluate cyber security techniques.
  • Keep up to date with industry trends and developments to enhance relevant skills and take responsibility for own professional development. 
  • Work from a given design requirement to design, build and test digital networks. 
  • Analyse security requirements and develop a security case taking account of all applicable laws and regulations. 
  • Implement structured and reasoned security controls in a digital system in accordance with a security case. 
  • Prevent security breaches using a variety of tools, techniques and processes. 

Where you’ll work

UNIT 1
BRYMBO ROAD
LYMEDALE BUSINESS PARK
NEWCASTLE
ST5 9HX

Training

Apprenticeships include time away from working for specialist training. You’ll study to gain professional knowledge and skills.

College or training organisation

TECHNICAL PROFESSIONALS LIMITED

Your training course

Cyber security technologist (2021) (level 4)

Equal to higher national certificate (HNC)

Course contents
  • Discover vulnerabilities in a system by using a mix of research and practical exploration
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
  • Identify cyber security threats relevant to a defined context
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
  • Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
  • Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
  • Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case
  • Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
  • Use tools, techniques and processes to actively prevent breaches to digital system security.
  • Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
  • Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
  • Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
  • Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
  • Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation..
  • Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
  • Assess security culture using a recognised approach.
  • Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
  • Develop plans for incident response for approval within defined governance arrangements for incident response.
  • Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach
  • Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
  • Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
  • Manage local response to non-major incidents in accordance with a defined procedure.
  • Discover vulnerabilities in a system by using a mix of research and practical exploration
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
  • Identify cyber security threats relevant to a defined context
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.

Your training plan

Expected duration:  21 months 
Apprenticeship level: Level 4  
Programme: Cyber Security Technologist (Engineer pathway) 

During this apprenticeship, you will follow a fully supported training programme with LearnTech, delivered through combined weekly remote classroom-based training, workplace assessment/training and online learning working towards completing the Level 4 Cyber Security Technologist qualification. 

The training covers the following core occupational duties:  

https://www.instituteforapprenticeships.org/apprenticeship-standards/cyber-security-technologist-2021-v1-0  

Requirements

Essential qualifications

GCSE in:

  • English (grade 4)
  • Maths (grade 4)

Desirable qualifications

A Level in:

  • Computer Science/IT (grade C)

T Level in:

  • Computer Science/IT (grade C)

BTEC in:

  • Computer Science/IT (grade Pass)

Let the company know about other relevant qualifications and industry experience you have. They can adjust the apprenticeship to reflect what you already know.

Skills

  • Communication skills
  • Attention to detail
  • Problem solving skills
  • Analytical skills
  • Team working
  • Computer networks - Basic
  • Operating systems knowledge
  • Familiarity with security tool
  • Up to date with cyber trends
  • Basic code writing

Other requirements

It is a requirement to have five GCSE 9-4 grades or equivalent (including English and Maths) to apply for this type of apprenticeship. If you do not have these grades but have completed numeracy and literacy Key Skills/Functional Skills at level two you may also apply for these apprenticeships. You must meet the following eligibility criteria to apply for the role: Have been a UK/EEA resident for the last 3 years Hold valid residency status Have the right to work in the UK

About this company

GivEnergy is the UK’s no. 1 provider of residential battery storage systems, with a mission to empower energy freedom for all. The GivEnergy range includes inverters, battery systems, EV chargers, energy management software, and a host of supporting accessories. Together, these products create an end-to-end ecosystem for customers to control their energy. With a GivEnergy system, customers can store energy – either from the grid and/or renewables. They can then peak shave and power their lives cheaply, sustainably, and with informed autonomy.

https://givenergy.co.uk/ (opens in new tab)

After this apprenticeship

  • Upon competion of the apprenticeship, the applicant will have a Level 4 qualification as a cyber security technologist.

Ask a question

The contact for this apprenticeship is:

TECHNICAL PROFESSIONALS LIMITED

The reference code for this apprenticeship is VAC1000313528.

Apply now

Closes in 25 days (Wednesday 30 April 2025 at 11:59pm)

When you apply, you’ll be asked to sign in with a GOV.UK One Login. You can create one at the same time as applying for this apprenticeship.