Briefing note: GCHQ Internships



Similar documents
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Executive summary. Today s researchers require skills beyond their core competencies

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change.

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change.

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Huawei Cyber Security Evaluation Centre: Review by the National Security Adviser

Cybersecurity in a Quantum World: will we be ready?

A NEW APPROACH TO CYBER SECURITY

FORWARD: Standards-and-Guidelines-Process.pdf. 1

Programme Specification (Undergraduate) Date amended: 28 August 2015

MSc in Computer and Information Security

University of Bradford. 1 year full time, 2 years part-time

ASSOCIATE PROJECT MANAGER

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Lessons learned from creating a change management framework

Appointment details Lecturer/Senior Lecturer in Accounting

Valid from: 2012 Faculty of Humanities and Social Sciences Oxford and Cherwell Valley College Thames Valley Police

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13

University of Sussex School of Mathematical and Physical Sciences. Mathematics.

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.

Department of Information Systems and Cyber Security

Cyber Security in the Financial Industry

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

European Security Standards Reference Implementation Initiative (ESSRII)

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Assessment Strategy for. Audit Practice, Tax Practice, Management Consulting Practice and Business Accounting Practice.

MSC IN SOFTWARE ENGINEERING

Adversary Modelling 1

Application Guidance CCP Penetration Tester Role, Practitioner Level

Internship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group

Change to Program/Graduate Diploma Academic Requirements Proposal Template

MS Information Security (MSIS)

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

Transitional Strategic Plan Youth Work Ireland 2013 & 2014

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Programme Specifications

CYBER SECURITY TRAINING SAFE AND SECURE

Programme Specification Date amended: April 8, 2008

MSc Cyber Security. identity. hacker. virus. network. information

Educational Requirement Analysis for Information Security Professionals in Korea

Integrated Dual Degree Programme

Newton-Mosharafa PhD Programme

Cyber DTU. Lars Ramkilde Knudsen

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Data Analysis Officer - Service Development Team

Research at Henley Business School

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

CESG Certification of Cyber Security Training Courses

Information Technology

Position Description (PD)

SCHOOL OF ENGINEERING. RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement

Management School. MRes. Business and Management Research Methods. University of Stirling Management School

CESG Certified Professional

CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk

University of Cambridge: Programme Specifications

One LAR Course Credits: 3. Page 4

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Programme Specification (Postgraduate) Date amended: March 2014

Social work and social work professions

MA in Health and Social Care

Teaching institution: Institute of Education, University of London

Why Cryptosystems Fail. By Ahmed HajYasien

School of Health in Social Science. Counselling and Psychotherapy. PhD/MPhil DEGREES IN COUNSELLING STUDIES INFORMATION BOOKLET,

Data Science. BSc Hons

POSTGRADUATE OPEN DAY

National Commission for Academic Accreditation & Assessment. National Qualifications Framework for Higher Education in the Kingdom of Saudi Arabia

CPP30411 Certificate III Security Operations Recognition of Prior Learning & Current Competency Kit. Evidence Matrix and Collation Report

British Council Poland Internship Programme 2010

GUIDE TO COMPLETING THE ONLINE APPLICATION FORM FOR GRADUATE STUDY

Bachelor of Information Technology (Network Security)

Transcription:

Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2 to sponsor internships for mathematical PhD students in selected areas applicable to GCHQ work. There are currently opportunities to become an intern in the following areas: 1. Network analysis; 2. Security proofs; 3. PQ cryptography. Interns are typically current or recently graduated PhD students, or early stage researchers in the mathematical sciences who spend 4-6 months working on site on a project of real importance and value to the sponsoring organisation. They are supported by an academic supervisor and the staff of the Smith Institute. Funding is available for the stipend of the Intern and for their supervision. GCHQ reserves the right to restrict what an Intern is allowed to publish from the work undertaken during the project, but work can still contribute to the host University s submission to the REF. Further information on each project and details for applicants are provided below. Applications are welcome by 21 st July 2014. Please request an application form for the project you wish to apply for, from judy.reynolds@smithinst.co.uk. 1 www.gchq.gov.uk 2 www.smithinst.co.uk 1

1. Network analysis Do you have a conceptual framework for handling big data? Are you motivated by the chance to have access to real world data and apply your proposed approach? This project is to develop models for very large, complex heterogeneous networks conveying behaviour of people and systems to develop statistical tests for anomalous behaviour and novel streaming algorithms for analytical detection. The relevant disciplines would be mathematics, computer science and statistics. Interns will work as part of an in-house data science team and with subject matter experts in several specific areas of application. Network data for each application area would typically be hundreds of peta-bytes and may contain only tiny signals of anomalous behaviour. With only one data set and very little idea of the underlying process, the challenge for each application-specific problem is to use a combination of data science and subject matter expertise to model a random system. The overall aim is to identify an approach suited to multiple areas of application: to apply and refine a conceptual framework for handling big data in order to develop application-specific models of network behaviour more efficiently. Successful candidates will have a background in large scale data science and a genuine interest in working with very large-scale real-world data. They should be confident in the use of approaches for the study of behaviour in networks and the identification of anomalous behaviour. Moreover they should be ready to adapt their conceptual approach as the realities of dealing with real world data are encountered. 2

2. Security proof Do you have a background in provable security research? Are you motivated by the challenge of bridging the gap between mathematical theory and engineering practice? This project is to take standard security proof models in cryptography and systems security and relate them to CESG evaluation techniques to improve GCHQ evaluation process and understand the practical limitations of security models. Interns will work closely with in-house experts to gain a working knowledge of security risk assessment in practice. In-house approaches in this area may have diverged in recent years from the approaches published from academic research, at least in terms of the use of language. This project attempts to transfer knowledge into GCHQ regarding current academic research on provable security. Overall the aim is to identify areas of agreement and difference by reviewing current practice in product evaluation in comparison with academic research in provable security. Successful candidates will have a thorough understanding of the research landscape in provable security and an interest in exploring the similarities and differences between provable security in theory and practice. They will need to have the ability to reach consensus on an issue, even when already biased to be on one side of the debate. 3

3. PQ cryptography Do you have expertise in classical cryptography? Are you motivated by the challenge of developing a framework for the assurance of proposed classical cryptographic methods in a post-quantum world? Interns will work with in-house experts in quantum algorithms and experts in the classical evaluation of cryptographic systems. Given the possibility that quantum based technology may be developed in future that can crack current public key encryption protocols, the development of post-quantum encryption algorithms is an active area of research. In parallel, it is necessary to develop standards for certification of cryptographic systems as robust against both quantum attack and classical attack. The aim of this project will be to evolve the criteria for the evaluation of currently proposed postquantum cryptographic systems to enable assurance in a post-quantum world. Successful candidates will have expertise in classical cryptography, including methods based on lattices and learning with errors and an interest in their evaluation for a post-quantum world. This project is not about research into quantum cryptography, nor is it about the development of new ideas for post-quantum cryptographic systems. 4

Further information for applicants Applications should be submitted by 21 st July 2014, and candidates chosen by end October ready for projects to start in March 2015. To be considered you must meet the following criteria: a) You must be a British Citizen b) One of your parents must also be a British citizen or have substantial ties with the United Kingdom or if deceased have had such citizenship or ties before their death. c) You must normally have been a resident in the UK for 10 years prior to the date of your application. To ensure suitability you must undergo a thorough security process. As part of this a criminal records check and a drugs test will be conducted. You will be asked to complete a medical and several Developed Vetting (DV) Questionnaires. If you do not meet the DV requirement or fail to disclose security related issues or concerns you will not be considered for the sponsorship. Further details on GCHQ acceptance criteria can be found at www.gchqcareer.co.uk/applicationprocess/applicationprocess/nationality-security 5