BT Security Recruitment



Similar documents
Ministry of Defence. Supporting Narrative and Pay Scales

Unit 3 Cyber security

BT Assure Threat Intelligence

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Career Paths in Information Security v6.0

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

2 Gabi Siboni, 1 Senior Research Fellow and Director,

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

THE FUTURE OF NZDF TALENT MANAGEMENT UNDERSTANDING SAP HCM TALENT MANAGEMENT CAPABILITIES MARCH 2015

Application Guidance CCP Penetration Tester Role, Practitioner Level

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CYBER SECURITY Audit, Test & Compliance

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

CYBER SECURITY TRAINING SAFE AND SECURE

IT Division....working in partnership

Internet security: Shutting the doors to keep hackers off your network

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Cybercrime: risks, penalties and prevention

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Testing the Security of your Applications

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

HMG Security Policy Framework

2012 Hays IT Salary Guide

PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH

Information Security in the undergraduate curriculum

e-discovery Forensics Incident Response

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Combating a new generation of cybercriminal with in-depth security monitoring

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

Career Analysis into Cyber Security: New & Evolving Occupations

Cyber security organisational standards: call for evidence

Achieving Information Security

CESG Certified Professional

Cyber Security for audit committees

How To Protect Your Business From A Cyber Attack

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Who will secure your organisation in the future? Selecting for cyber-security personnel

Resilience and Cyber Essentials

SECURITY CONSIDERATIONS FOR LAW FIRMS

Big 4 Information Security Forum

93% of large organisations and 76% of small businesses

Paul Vlissidis Group Technical Director NCC Group plc

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle

A GUIDE TO THE MILITARY CORRECTIVE TRAINING CENTRE. 1. The Military Corrective Training Centre (MCT C) is located in Colchester, Essex.

BT Assure Rethink the Risk

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Bio-inspired cyber security for your enterprise

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. October 1st, 2014

Vacancy Number: A03/0516. Post Number: OCG COX Job Title: Engineer (Information Assurance) NATO Grade: A-2

I ve been breached! Now what?

Symantec Cyber Security Services: A Recipe for Disaster

Gregg Gerber. Strategic Engagement, Emerging Markets

Hackers are here. Where are you?

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary

Nine Steps to Smart Security for Small Businesses

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Michelle Govan & Anand Philip Network & Security Engineering

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Network Engineering Technology

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance

Cyber Security solutions

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

IT Security Management 100 Success Secrets

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

About Allocate Software

The enemies ashore Vulnerabilities & hackers: A relationship that works

New-Age Master s Programme

Developing a robust cyber security governance framework 16 April 2015

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Cyber Security and Science

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

How To Build A Cybersecurity Company

The Cancer Running Through IT Cybercrime and Information Security

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Intelligence expertise and psychological insights to help Governments and Corporate Clients identify and manage risk. Company

Who s Doing the Hacking?

Transcription:

BT Recruitment BT An Option For You? 1 Introduction - Tinker, tailor, soldier cyber-defender? (Taken from the BT Assure RUSI article: http://www.globalservices.bt.com/static/assets/pdf/defence/rusi_bt_v2.pdf) We ve come a long way since the 1970s. When Le Carré wrote Tinker, Tailor, Soldier, Spy, the East and West were locked in an expensive and dangerous game. Spies like Smiley s roamed the world, gathering state secrets for their masters. Today, we re locked in a very different conflict one between cybercriminals, cyber-terrorists and state-sponsored attackers on one side, and IT security specialists and cyber-defence teams on the other. Costs are escalating a report produced for the Cabinet Office estimated the hit on the British economy at 27 billion a year and spies are back in vogue. The costs of intellectual property theft and industrial espionage alone were projected at more than 16 billion a year. The tabloids may focus on teenagers hacking into highly-secure IT systems from their bedrooms, but this is clearly just a small part of the problem. Look deeper and you get an entirely different picture one in which criminal firms are emerging and operating on an industrial scale. While teenage hackers do the equivalent of spraying graffiti and breaking windows, these professionals are getting away with organisations crown jewels. There is even talk of them having developed specialised operating systems for their computers things analogous to Windows, but tailored to their illicit tasks. Cyber defence is high risk, and a key corporate and public priority, but it is also growing and big business, in which BT is on the cutting edge. We are growing and we need you to help us grow and to maintain our world class status. 2 BT/Military fit From our experience the military fit well into BT. The culture and drive to succeed of Royal Navy, Army and Royal Air Force matches neatly our core BT values. In addition to this you understand the need to be discreet about and you also bring an understanding and experience of key security partners. The transition from the military to civilian life can be challenging and in particular working out where you fit into an organisation can be difficult. To help with this we have put together this equivalence table: Issue: BT Military/ Recruitment Briefing V1.1 1

Royal Navy Army RAF BT Grade Example work AB LH Pte Cpl SAC - Cpl C3 D1 Team Members Lt LH - PO Lt Capt Cpl Sgt FO Flt Lt Cpl - Sgt Analysts 24 hr Operating Centre Analysts Technical Practitioner Implementation Team Members Lt Lt Cdr CPO WO2 Capt Maj SSgt WO2 Flt Lt Sqn Ldr s Lt - Lt Cdr Capt Maj Flt Lt WO1 WO1 Sqn Ldr 24 hr Shift Leaders Technical Experts Implementation Leaders Operating Centres Team Manager/Leaders Implementation Manager/Leader roles are available on an ad hoc basis, please consult the website for details This table is only a guide, if you feel you have the experience and skills to apply for a role which does not match your current rank/grade please feel free to do so. We will evaluate every application on its merits. 3 What jobs are we trying to fill? As the demand for Cyber grows so does BT and we currently have over 50 vacancies in our 10+ world-wide Operating Centres. We have a varied set of roles available, suitable for different types of people. We need leaders to build and strengthen our organisation. We need people to work on 24/7 shift rotas protecting our customers and BT by managing security device, e.g. firewall, proxies and Intrusion Protection systems, or reacting to/investigating live security incidents. We are also looking for highly skilled people to undertake complex security engineering tasks and projects with large multi-national companies. A list of our current vacancies, correct at date of issue, can be found in Annex A. 4 What skills are we looking for? We are currently recruiting and we would be keen to talk to anyone who has good IP networking skills and/or good management experience. In particular we are looking for people with the following skills: Strategic network/systems engineering (e.g. CCNA, CCNP, JNCIP) Cyber and/or Physical Leadership/Management (e.g. CISSP) Cyber defence/attack practitioner Vulnerability analysis/assessment Experience of designing, evaluation, certification and accreditation of systems to HMG security requirements (as defined by the MPS and associated HMG / CESG InfoSec Memoranda material) Ethical Hacker practitioner/penetration Tester Issue: BT Military/ Recruitment Briefing V1.1 2

Leadership and management skills and experience 5 Next Steps If anything in this briefing has interested you please get in contact with us. For general information please go to the BT PLC Website: http://www.btplc.com/ If you are interested in one of the specific roles please check out the details BT Jobs website: http://www.btplc.com/careercentre/ If you would like to chat to one of the BT Recruitment team please email us at cyber.recruitment@bt.com with a copy of your CV and we will be in touch Issue: BT Military/ Recruitment Briefing V1.1 3

Annex A Current BT Vacancies The following information was correct at when this briefing was issued. Reference Job Role Description Country Grade BTS0705 2nd Line Analyst Australia Analyst BTS0490 3rd Line Professional Australia BTS0640 Engineering Australia BTS0747 UNIX System Administrator/ Platform Engineer France BTS0632 A number of 2nd Line Analyst India Analyst BTS1215 A number of 3rd Line India Analyst BTS0841 Threat Management Sec Analyst UK Analyst BTS1174 Lessons Analyst UK Analyst A number of SOC Ops Surveillance Team BTS1182 Members UK Analyst BTS1186 A number of SOC Pre-emptive Team Analysts UK Analyst BTS1223 Team Member SOC 2nd Line UK Analyst BTS1176 SOC Plans Co-Ord/Malware Expert UK D1 BTS1187 Global Threat Monitoring Analyst UK D1 BTS1173 Education and Reporting Manager UK BTS1180 SOC Ops B Manager UK BTS1181 SOC Ops A Manager UK BTS1183 Pre-emptive Team Manager UK BTS1232 Technical Implementation Mgr UK BTS0743 Network UK BTS0828 Technical Implementation Manager UK BTS0831 Technical Implementation Manager UK BTS0852 3rd Line UK BTS1179 A number of SOC Ops Reaction Team Members UK BTS1184 A number of SOC Pre-emptive Team s UK BTS1202 Software Developer - Alogsec UK OFD12227 A number of Firewall Rules Analyst UK BTS1142 A number of Technical Implementation Mgr UK BB2 Issue: BT Military/ Recruitment Briefing V1.1 4

BTS0868 Professional US BTS1046 A number of Engineering - Implementation US BTS1047 Systems US BTS1227 A number of Device Engineer US Issue: BT Military/ Recruitment Briefing V1.1 5