Cyber Security Technologist Higher Apprenticeship
THE NORTH EAST APPRENTICESHIP COMPANY LIMITED
Tyne And Wear, NE8 3BE
Closes in 9 days (Thursday 31 October)
Posted on 11 October 2024
Summary
We're seeking talented individuals with a keen interest in the cyber industry to join as Cyber Security Engineer apprentices. If you're methodical, a problem-solver, articulate, & a fast learner, this role is for you. You'll design, build, and test secure networks, manage requirements, budgets, schedules, & risks, and influence successful delivery.
-
Training course
-
Cyber security technologist (2021) (level 4)
-
Hours
-
Monday - Friday
Exact shifts to be confirmed
37 hours a week
-
Possible start date
-
Monday 2 December
Work
As an apprentice, you’ll work at a company and get hands-on experience. You’ll gain new skills and
work alongside experienced staff.
What you’ll do at work
As a Cyber Security Technologist with PlanBEE Cyber, you will:
- Identify Vulnerabilities: Discover and assess security weaknesses in systems.
- Analyse Threats: Investigate and evaluate potential security threats and hazards.
- Develop Solutions: Create security designs and implement protective measures.
- Respond to Incidents: Monitor, detect, and respond to security breaches.
- Gain Diverse Experience: Rotate every 6 months to work with different top-tier employers.
- Stay Updated: Keep up with the latest industry trends and technologies.
Where you’ll work
Gateshead College Baltic Campus Baltic Business Quarter
Quarryfield Road
Gateshead
Tyne And Wear
NE8 3BE
Training
An apprenticeship includes regular training with a college or
other training organisation. At least 20% of your working hours will be spent training or studying.
College or training organisation
GATESHEAD COLLEGE
Your training course
Cyber security technologist (2021) (level 4)
Equal to higher national certificate (HNC)
Course contents
Discover vulnerabilities in a system by using a mix of research and practical exploration
Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
Configure, deploy and use computer, digital network and cyber security technology.
Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
Identify cyber security threats relevant to a defined context
Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case
Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
Use tools, techniques and processes to actively prevent breaches to digital system security.
Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation..
Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
Assess security culture using a recognised approach.
Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
Develop plans for incident response for approval within defined governance arrangements for incident response.
Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach
Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
Manage local response to non-major incidents in accordance with a defined procedure.
Discover vulnerabilities in a system by using a mix of research and practical exploration
Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
Configure, deploy and use computer, digital network and cyber security technology.
Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
Identify cyber security threats relevant to a defined context
Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
Your training plan
You’ll spend one day a week at Gateshead College studying towards the Level 4 Cyber Security Technologist apprenticeship standard, focusing on the Cyber Security Engineer route. This will develop your knowledge through a combination of lectures, hands on experience and tutorials.
More training information
Over the two-year programme, you’ll work with four different companies from different sectors to gain the breadth of knowledge, skills, and experience, needed to succeed in your future career as a Cyber Security Engineer.
Requirements
Essential qualifications
GCSE in:
- English (grade A*-C/4-9)
- Maths (grade A*-C/4-9)
- Science (grade A*-C/4-9)
- in 3 subjects (grade A*-C)
- Any subject - desirable within a digital subject (grade Merit/Distinction)
Let the company know about other relevant qualifications and industry experience you have. They can
adjust the apprenticeship to reflect what you already know.
Skills
- Communication skills
- IT skills
- Problem solving skills
- Administrative skills
- Number skills
- Analytical skills
- Logical
- Team working
- Initiative
- Methodical
- Interest in Cyber Industry
- Driven
- Motivated
- Confident
- Driving license - desirable
Other requirements
* We will shortlist your form against the set criteria. If you are successfully shortlisted, you will be invited to take part in our Assessment Centre. This will consist of a range of assessments, including literacy, mathematics, communication and problem-solving skills. *Subject to successful completion of the assessments, you will also be invited to a formal interview with a panel of employers.
About this company
Our new PlanBEE Cyber is a unique programme designed to recruit and train the next generation of Cyber Security Engineers. You’ll have a real job from day one, learning ‘on the job’ for four days per week.
On a typical day, you might meet with key stakeholders, design and build digital networks, test security systems, or configure and deploy cyber security technologies.
After this apprenticeship
You will complete a Level 4 Higher Apprenticeship programme in Cyber Security technologist (2021), providing a pathway to professional qualifications or university.
Ask a question
The contact for this apprenticeship is:
GATESHEAD COLLEGE
The reference code for this apprenticeship is
VAC1000281712.
Apply now
Closes in 9 days (Thursday 31 October)
When you apply, you’ll be asked to sign in with a GOV.UK One Login. You can
create one at the same time as applying for this apprenticeship.
After signing in, you’ll apply for this apprenticeship on the company's website.