
Cyber Security Placement Programme
Remote
Crawley, United Kingdom
Full Time
28-02-2025
Job Specifications
About
Cyber Security Placement Programme - No Experience Required
Are you looking to kick-start a new career in IT?
We are recruiting for companies who are looking to employ our Cyber Security Traineeship graduates to keep up with their growth. The best part is you will not need any previous experience as full training courses will be provided. You will also have the reassurance of a job guarantee upon completion.
Whether you are working full time, part time or unemployed, this package has the flexibility to be completed at a pace that suits you.
Role
The traineeship is completed in 4 easy steps, you can be placed into your first role in as little as 10-12 weeks:
Step 1 - Online Training
The first step is completing a selection of professional, accredited and industry recognised IT Support courses by CompTIA, Microsoft and Cisco. The training is delivered via multimedia rich video tutorials, presentations and quizzes through a portal that you study from home. You will also be assigned an expert tutor to help you throughout your training.
Step 2 – Practical Training
You will gain the practical experience by using our cutting edge Livelabs. Gaining hands-on experience is essential in today’s IT industry for both certifications and keeping up to date with new technologies. Theory is often not enough these days, companies require hands on practical experience to make sure you're job ready.
Step 3 – Official exams
You will then go on to sit the CompTIA A+ exams to give you the official certifications which will be recognised worldwide. The CompTIA A+ is the most commonly asked for certificate in entry level IT roles.
Step 4 – IT Technician placement
You will be placed into your first role as an IT Technician. You will need to gain two years experience in this role before you can progress into a cyber security analyst role. While working as an IT Technician, we will release your second batch of training which is specifically designed to qualify you to move into the cyber security field. This will consist of online training, practical training and an official exam.
Cyber Security Role
Once you have completed all of the mandatory training in step four and have the required two years experience in the IT industry, you will be ready to move into your Cyber Security Analyst role. We have partnered with a number of large IT companies who have a massive shortage of qualified cyber security staff.
At a one off cost of £990, or a deposit of £149 followed by 10 interest free monthly instalments of £104, this represents a great opportunity to start a rewarding career in IT and have a real career ladder to start climbing. If you are not offered a role at the end of the training we will refund 100% of your course fees.
Read through the information? Passionate about starting a career in IT? Apply now and one of our friendly advisors will be in touch.
‘Please note that this is a training course and fees apply
Nice-to-have skills
Cisco
Crawley, England
Work experience
Cyber Security Specialist
Languages
English
About the Company
TieTalent is the career growth platform dedicated to tech professionals. By being part of our community they access exclusive content and perks from our partners for services that help them expend their knowledge. When open for a new opportunity, companies apply for them for jobs they want. On their side, companies benefit from an intelligent system allowing them to hire rare talents in tech quickly and hassle-free, that they need to be successful. TieTalent launched in October 2018 and is already trusted by thousands of ... Know more
Related Jobs


- Company Name
- Securitas UK
- Job Title
- Global Security Analyst
- Job Description
- About The Role At Securitas, we are dedicated to protecting businesses, people, and assets worldwide. As one of the largest security service organisations in the world, we take pride in delivering excellence in safety and security. We are seeking a Global Security Analyst to join our London-based team. In this role, you will be at the forefront of safeguarding our organisation—monitoring and responding to threats, ensuring compliance with security protocols, and upholding privacy and civil liberties. If you're looking for a fast-paced, dynamic, and rewarding career in global security, this is your opportunity to make a real impact. Position: Global Security Analyst Hours: 42 hours per week, days / nights Transport: Access to a vehicle or excellent transport links Requirements: Previous experience as an Analyst is required Why Join Us? Work in an exciting and challenging environment Play a key role in maintaining security and safety Be part of a global leader in the security industry Ready to take on the challenge? We’d love to hear from you! Job Opportunity The Global Security Analyst will be required to carry out the following essential functions: Incident Monitoring & response Incident Identification & Escalation: Identify pertinent events/incidents that are impactful to Customer Local Company’s business operations and/or employee safety. This process involves recognition, verification, and notification of incidents/events to appropriate Customer Local Company personnel. Critical Incident People Location: Identify location of Customer Local Company personnel. This includes producing a list of impacted personnel in the event of an incident or preparing a complete roster ahead of a country evacuation. Employee Advisories: Create accurate advisories of pertinent events with timeliness of dissemination, and ability to include all relevant parties/distros. Create advisories that effectively communicate the most pertinent information regarding an ongoing or upcoming event. Job Description Making your World a Safer Place JD - Issued Integrity Vigilance Helpfulness Employee Wellness Checks: Verify the well-being of Customer Local Company employees potentially affected by an incident. Includes direct phone calls, slacks, or Vismo communications to confirm safety. Supporting travel risk workflows, including triage and escalation of high risk travel bookings. GSAs may be expected to offer research support through the maintenance of office risk assessments as well as the provision of location crime analyses, regular reporting and incident specific SITREPs. Customer Contact Care Safety & Security: Provide emergency or critical assistance to employees: Professionally, quickly, and compassionately handle calls/Slack messages reporting security/safety events, including P0 incidents, Protesters, Harassment/Assault (onsite/offsite), Elevator Entrapment, Fire, Unauthorized Access. Perform follow-ups, as necessary. Understand reporter’s needs and provide personalized solutions via hightouch customer service. Routine Customer Care: Correctly diagnose non-security/safety questions and route caller to the appropriate team (Mobility, People Partners, Corporate Apartments, etc.) if help cannot be provided by Security Operations Centre personnel. Reporting Event Report: Create Event Reports (ERs) for any events and incidents that may require further action or Ensure ERs are in a timely fashion and include accurate and to support event and investigations and avoid delays. Contact reports: Create reports to account for all contact made with the GOC. Fault Reporting: Raise tickets to report faults and issues to be rectified; this could include systems outages. Research Support Ad hoc requests to support the Security functions. Essential Skills Skilled in the use of IT equipment and willing to learn new software products, including those related to incident monitoring and mass communications. Proficiency in navigating and conducting research with open source material is also preferred. Proficient in Microsoft Excel, Outlook & Word Possess a minimum of a bachelor’s degree in a related field and/or 1-3 years’ experience working in Global Security Operations Centre or related field. RTW in the UK & 5-year checkable history Must be willing to participate in a pre-employment screening process, including drug screening and background investigation. Must have the right to work in the UK.


- Company Name
- Cyderes
- Job Title
- Principal Security Analyst - SecOps (Chronicle)
- Job Description
- Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Role: The Managed Services Principal Security Analyst Is a Customer-Facing Role Focused on Delivering Security Solutions and Exceptional Client Experiences. As A Trusted Advisor, The Principal Security Analyst Is Responsible for Strategic Advisory, Advanced Analysis, And Custom Security Content for Cyderes’ Managed Service Customers. This Role Requires Consistent Representation of The Cyderes Brand Through Effective Collaboration and Positive Engagement with Internal Teams and Clients. Responsibilities: Own security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations Lead customer-facing calls to discuss incident investigations, provide strategic guidance, and offer recommendations for improving security posture Perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments Act as a technical lead within the SOC, providing mentorship, guidance, and leadership to other Security Analysts Oversee real-time monitoring and detection activities using SIEM, EDR, and other security tools, ensuring timely identification and escalation of threats Collaborate with internal teams, such as Detection Engineering, to refine detection rules and enhance automation workflows to close gaps in customer security posture Maintain and update security operations processes and incident response playbooks to ensure they remain current and effective Provide training to Security Analysts on tools, processes, and emerging threats to enhance team capabilities Lead post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness Tailor detection and response strategies to meet the unique needs of individual customer environments Stay informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations Requirements: Experience: Minimum 5+ years of professional experience in cybersecurity, with a strong background in security operations System Administration Knowledge/Experience: Expertise securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments Networking Proficiency: Advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively Endpoint Detection and Response (EDR): Hands-on experience with EDR tools such as SentinelOne, CrowdStrike, Microsoft Defender, or equivalent platforms Security Information and Event Management (SIEM): Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar Technical Skills: Proficient in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats Communication: Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations Certifications (Preferred): Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.


- Company Name
- Ministry of Housing, Communities and Local Government
- Job Title
- Operational Security Manager
- Job Description
- Darlington, Leeds, London, Manchester, Wolverhampton Job Summary Here at the Ministry of Housing, Communities & Local Government (MHCLG), we work on things that make a real difference to people’s lives. Whether it's through the homes we live in, the work of our local councils, or the communities we’re all part of, our work is at the top of the political agenda. We have ambitious and far-reaching outcomes to achieve this year and, if you’re thinking of joining us, there’s never been a more exciting time. We have over 3,500 staff who are based in 20 offices across the UK and this Cyber Security role sits in the heart of the Technology team within our Digital Directorate. Our aim is to provide high quality Digital services for our staff, typically using evergreen cloud services. Delivering this responsibility comes with a high demand for adoption of new technologies, systems and applications that require security review and scrutiny to ensure the department operates in a safe and secure environment that is overseen by centralised security products such as a SIEM, vulnerability scanners and security validation tools. Security has never been more important in delivering services for our staff and citizens and the Department is committed to meeting the objectives set out in the Government Cyber Security Strategy. Now is an extremely exciting time to join our Cyber team as we use a modern tech stack, specialist external suppliers and a growing number of internal staff to mature our capabilities and deliver Departmental objectives. We particularly welcome candidates from an ethnic minority background and other underrepresented groups to apply, as we work to continually improve our ability to represent the places and communities we support through our work. Find out more about what it's like to work in a digital, data and technology role at MHCLG including our culture, ways of working, career progression and staff benefits. You can also read the MHCLG Digital blog to learn about the work we're doing. Job Description As an Operational Security Manager, you'll: provide cyber security advice and guidance to the Department, acting as the Champion and face of the team across numerous forums to enhance and maintain the positive perception and visibility of the Cyber Security Team lead on the development and maintenance of Security Policies and associated documentation lead on supporting all internal and external stakeholders in the alignment to the Policies and associated documentation provide Cyber Security input to governance forums as required, including Change Advisory Boards and Technical Design Authorities conduct periodic checks of various technologies and processes across stakeholders in an internal/external audit capacity, subsequently supporting those stakeholders in the development and implementation of remediation plans lead on the development and maintenance of the Departments cyber security oversight of, and support to, its ALBs lead on the conduct of GovAssure and wider Department alignment to the NCSC CAF input to the Cyber Security KPIs and Metrics across all areas of responsibility work with the Head of Security Awareness to design and implement cyber security awareness campaigns act as the overarching lead, join up and work with other elements of the team to support them in service adoption and improvement across all areas including Secure by Design, Supplier Security, Vulnerability Management and Security Operations Centre (SOC). This may on occasion include directly supporting across these teams where required collaborate with, and mentoring of, peers and stakeholders where appropriate As An Operational Security Manager, You'll provide cyber security advice and guidance to the Department, acting as the Champion and face of the team across numerous forums to enhance and maintain the positive perception and visibility of the Cyber Security Team lead on the development and maintenance of Security Policies and associated documentation lead on supporting all internal and external stakeholders in the alignment to the Policies and associated documentation provide Cyber Security input to governance forums as required, including Change Advisory Boards and Technical Design Authorities conduct periodic checks of various technologies and processes across stakeholders in an internal/external audit capacity, subsequently supporting those stakeholders in the development and implementation of remediation plans lead on the development and maintenance of the Departments cyber security oversight of, and support to, its ALBs lead on the conduct of GovAssure and wider Department alignment to the NCSC CAF input to the Cyber Security KPIs and Metrics across all areas of responsibility work with the Head of Security Awareness to design and implement cyber security awareness campaigns act as the overarching lead, join up and work with other elements of the team to support them in service adoption and improvement across all areas including Secure by Design, Supplier Security, Vulnerability Management and Security Operations Centre (SOC). This may on occasion include directly supporting across these teams where required collaborate with, and mentoring of, peers and stakeholders where appropriate Person specification We will use the essential criteria below to evaluate you during the recruitment process. Make sure your CV details how you meet the criteria. As An Operational Security Manager, You’ll Have significant experience in an Information Security/Assurance related role(s) knowledge of relevant laws, regulations, and industry/HMG standards including GDPR, NCSC CAF, Cyber Essentials and ISO27001, with a strong understanding of information security principles, concepts, and best practices experience with risk assessment methodologies and tools familiarity with security principles and technologies for cloud hosted services such as AWS, Azure and SaaS strong knowledge of typical threats and attack vectors with appropriate remediation methods excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to non-technical stakeholders developed problem solving skills including addressing complex technical security and process challenges that ensure delivery at pace to an appropriate risk appetite professional certifications, such as CISSP, CISM, CRISC or equivalent experience experience leading deep dives into adherence against processes, policies and procedures that are mandated for suppliers, services and teams to use in delivery of Digital services Behaviours We'll assess you against these behaviours during the selection process: Making Effective Decisions Managing a Quality Service Communicating and Influencing Alongside your salary of £59,586, Ministry of Housing, Communities and Local Government contributes £17,262 towards you being a member of the Civil Service Defined Benefit Pension scheme. Find out wh...


- Company Name
- Cyberfort
- Job Title
- Cyber Security Engineer - Defence
- Job Description
- Job Title: Cyber Security Engineer Reporting to: Head of Defence and Aerospace Consultancy Location: Remote with travel to customer site (Feltham) Role Requirements: Must hold a current government security vetting at SC level OR Be eligible to obtain such clearance. Must be currently resident in the UK Must have resided in the UK for the last 5 years consecutively. Desirable Previous experience within defence. Delivering Security within agile projects Reward Package: Salary Package - £65,000 - £85,000 DOE 25 days annual holiday + Birthday off in addition and option to buy/sell additional 5 days Company Pension Scheme Private medical Cover Life Assurance Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Senior/Lead Cyber Security Risk Consultant, supporting the next phase of Cyberfort’s growth. You’ll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture and Risk planning. We work across a number of sectors with a diverse client base. We aim to create an environment where everyone can reach their full potential. We work together, we are passionate, creative, and we embrace difference. In this role you’ll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security risk assessment and best practice solutions that match their requirements. You’ll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. As a Security Consultant, you will be involved in a variety of work which may include responsibility for leading, advising and implementing risk management frameworks, Information Security Management Systems, Enterprise Security Risk Management (2nd line assurance), 1st line identification of risks relating to Security Architecture, maintaining an awareness of published vulnerabilities and best practices across various platforms, especially cloud infrastructures, leading and delivering security assurance coordinator activities, providing Security & Information Risk Advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk-informed decisions, ensuring protection of client assets and transformation of their security architecture. This role forms part of the wider Consultancy team and will work cross functionally with the Delivery Managers and others to support and assure project delivery through all phases of the agile workflow. As a team we’re always looking to raise the bar, learn new things and incorporate new technologies and you will too! You’ll share your knowledge with the team and the wider Cyberfort community, contributing to Group blogs and undertaking research related to technology enhancements. Responsibilities: General Responsibilities: Vulnerability Scanning & Reporting Perform regular vulnerability scans and generate reports utilising the below tool sets. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. SonarQube: perform regular scans with SonarQube to audit code quality metrics, potential bugs, and security vulnerabilities. Trivvy: perform regular scans with Trivvy to identify vulnerabilities within containers. Nessus: perform regular Nessus scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the P-ASG cyber security and IA lead. Endpoint Security Trellix: perform regular updates to Trellix to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats. Antivirus and Anti-malware Protection: perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team. Firewalls: perform compliance checks and regular audits of Firewall rules to ensure that unauthorised access and threats are being blocked. Access Control: ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems. Incident Management & Tickets Incident Identification: help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives. Incident Response: respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations. Ticket Requests: respond to and resolve any tickets raised to the Leidos Security group on SD+ that require Cyber Security Engineering input. System Hardening Patch Updates to Security Products: ensure that the following security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security: Trellix Bolden James Nessus SonarQube Trivvy System Compliance: perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc. Security Enforcing Group Policy Objects (GPOs): perform regular reviews and updates to security enforcing GPOs to ensure that they are compliant and fit for purpose. Vulnerability Assessments: conduct periodic assessments to identify and address potential vulnerabilities. Change Work Security Impact Triage Tool (SITT): if a SITT is required for new software or hardware then it is the responsibility of the Cyber Security Engineer to fill out Section 2 of the SITT tool. Security Evaluation, Testing and Assurance (ST&V): perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning. Participation in Regular Meetings Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This includes the following: Security Working Group (SWG): Lead Cyber Security Engineer to attend. Vulnerability Triage: Lead Cyber Security Engineer to manage and other Cyber Security Engineers to attend. Security Workshop: All Cyber Security Engineers to attend. PI Planning: Change Cyber Security Engineers to participate and attend. Daily Standups (Blue/Green Team): Change Cyber Security Engineers to attend every day. Documentation Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation...