Cyber Security Technician Apprentice (Miller Insurance Services LLP)

MILLER INSURANCE SERVICES LLP

London (EC3R 7NQ)

Closes in 2 days (Monday 28 April 2025)

Posted on 10 April 2025


Summary

Firebrand Training has an exciting new opportunity for a Cyber Security Technologist Apprentice with Miller Insurance Services, an insurance firm based in London.

Training course
Cyber security technologist (2021) (level 4)
Hours
Monday - Friday 9.30am - 5.30pm (with one hour for lunch).

35 hours a week

Start date

Monday 8 September 2025

Duration

1 year 6 months

Positions available

1

Work

Most of your apprenticeship is spent working. You’ll learn on the job by getting hands-on experience.

What you’ll do at work

The Cyber Security Technician (Apprentice) will support the information security department, focusing on safeguarding Miller’s computer networks and systems. They will be expected to learn and implement a variety of cyber defence strategies and digital security techniques. This entry-level role provides hands-on experience in cybersecurity operations, incident response, risk assessment, and compliance. The apprentice will develop technical skills and industry knowledge while contributing to the organisation’s security posture.

Your duties and responsibilities in this role will consist of:

  • Assisting in the installation and maintenance of cybersecurity software tools and solutions
  • Supporting the information security team in managing security vulnerabilities and threats
  • Assisting in the development and implementation of Miller's cybersecurity policies and procedures
  • Participating in the design of information and operational technology infrastructures
  • Working closely with the IT team to ensure the secure configuration and operation of computer systems
  • Participating in the response to cybersecurity incidents and helping implement corrective measures
  • Adhere to and meet fully the expectations of Miller, as set out in its policies and procedures, training material, and embedded in its systems and controls. Our policies and procedures are written to encapsulate the compliance, legal and financial crime related legislation and regulations which apply to Miller
  • Comply with any external rules and requirements imposed on individuals performing their role at Miller, such as Lloyd’s byelaws and FCA rules
  • Promote Miller brand and values to enhance Miller’s reputation in the market

Where you’ll work

70 Mark Lane
London
EC3R 7NQ

Training

Apprenticeships include time away from working for specialist training. You’ll study to gain professional knowledge and skills.

College or training organisation

FIREBRAND TRAINING LIMITED

Your training course

Cyber security technologist (2021) (level 4)

Equal to higher national certificate (HNC)

Course contents
  • Discover vulnerabilities in a system by using a mix of research and practical exploration
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
  • Identify cyber security threats relevant to a defined context
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
  • Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
  • Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
  • Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case
  • Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
  • Use tools, techniques and processes to actively prevent breaches to digital system security.
  • Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
  • Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
  • Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
  • Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
  • Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation..
  • Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
  • Assess security culture using a recognised approach.
  • Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
  • Develop plans for incident response for approval within defined governance arrangements for incident response.
  • Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach
  • Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
  • Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
  • Manage local response to non-major incidents in accordance with a defined procedure.
  • Discover vulnerabilities in a system by using a mix of research and practical exploration
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
  • Identify cyber security threats relevant to a defined context
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.

Your training plan

This training plan has not been finalised. Check with this employer if you’ll need to travel to a college or training location for this apprenticeship.

More training information

Firebrand’s sector-leading Level 4 Cyber Security Technologist (L4CST) Apprenticeship Programme trains apprentices to implement a series of technical, procedural, and physical controls to monitor, detect and respond to a wide range of cyber security threats.

The apprentice is trained in cyber risk and mitigation, maintaining the confidentiality, integrity, and availability of digital data. They will use their skills to feed into policy decisions of a cyber security awareness culture within the business.

The CST standard has 3 distinct options:

  • Cyber Security Engineer - designs, develops and implements security solutions across a network
  • Cyber Risk Analyst - assesses, analyses, and mitigates cyber-related risk
  • Cyber Defender & Responder - configures and monitors security systems and responds to incidents/security breaches

Firebrands course is delivered either online (online live instructor-led), or face to face in the classroom environment (your choice). Our Subject Matter Experts (SMEs), Learning Mentors (LMs) and world-leading trainers prepare apprentices to work across multiple sectors.

Completion of this apprenticeship will provide learners with the following world-class vendor certifications in addition to the Cyber Security Technologist apprenticeship:

  • CompTIA Network+
  • CompTIA Security+
  • EC Council Certified Network Defender

Key areas covered are:

  • Networking & Cyber Security Fundamentals
  • Network Security
  • Threat, Vulnerability and Risk Assessment
  • Operating System Security
  • Cryptography
  • Information Security & Management Frameworks
  • Access Control Systems
  • Security Policies

Requirements

Essential qualifications

GCSE in:

  • 5 GCSE's including English and Maths (grade Grades 9-4 (A*-C))

A Level in:

  • 3 A-Levels (grade (A*-C/9-4))

Let the company know about other relevant qualifications and industry experience you have. They can adjust the apprenticeship to reflect what you already know.

Skills

  • Communication skills
  • Organisation skills
  • Initiative
  • Written communication skills
  • Drive and enthusiasm
  • Willingness to learn
  • To go the extra mile
  • Team player
  • Hard working

Other requirements

• Desire to complete professional examinations. • Able to balance work and study commitments.

About this company

Miller is a leading specialist (re)insurance broking firm with a rich heritage of over 120 years. With our headquarters in London and a global reach spanning from Bermuda to Singapore, we are an international presence in the industry. Our team of professionals harness their distinct expertise and knowledge to the benefit of our clients. It is our specialism, unparalleled service, and client-centric approach that sets us apart from the rest. As a testament to our commitment to professional excellence and high ethical standards, Miller is proud to be a Chartered Insurance Broker, the industry's gold standard. This underscores our commitment to maintaining the highest professional standards in the industry. For more information.

http://www.miller-insurance.com (opens in new tab)

After this apprenticeship

This role is a permanent role at Miller, and you will be supported throughout the apprenticeship and beyond.

Ask a question

The contact for this apprenticeship is:

FIREBRAND TRAINING LIMITED

The reference code for this apprenticeship is VAC1000315006.

Apply now

Closes in 2 days (Monday 28 April 2025)

When you apply, you’ll be asked to sign in with a GOV.UK One Login. You can create one at the same time as applying for this apprenticeship.

After signing in, you’ll apply for this apprenticeship on the company's website.

Company’s application instructions

Please apply through the link provided.