CHIEF INFORMATION SECURITY OFFICER-AEROSPACE AND DEFENSE:

CHIEF INFORMATION SECURITY OFFICER-AEROSPACE AND DEFENSE:

Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation.

JOB DESCRIPTION:

The oversight requires a more sophisticated operating model that allows for a stronger security posture centralized  security operations Center SOC. Then able to oversee the entire global operations with a maximum amount of attention and unify the management of API calls, space applications & navigation, to integrate and orchestrate with very dissect tools in order to bring them into our systems of record to then see from a holistic risk management perspective how all the different signals interact and work together. Areas to cover will include: The automation requires processes; create a platform sharing content so the initiative is to take this modular playbooks, actions and integrations, connectors to the ecosystem into our IT & security infrastructure and accelerate the development processes. Build further tuning and see what signals need to be tuned and take all that signals and normalise them. Introducing new risk management techniques or friction between BLUE TEAMS AND RED TEAMS will undergo a formal approval, review and voted by representatives for Security impact analysis, THE C.A.B (CHANGE APPROVAL BOARD). Areas to cover will include: incident response and remediation, orchestrating and automating signals together, prioritising cases and incident response, enrichment, cyber threats intelligence, dark web monitoring, stolen data detection, data breach, systems that don’t normally network together, misconfiguration, taking out sensors moving further out, ability to ingest information to centralized the data sources and all the information from the edge, space applications & navigation. Eliminate the traditional network perimeter and ensure no device can be trusted until proven. Areas to focus will include: Vulnerability management team, Nation-state threats and exploitations, Ransomware transformation, virtual attacks, Hacktivism attacks, Jamming attacks, Threat detection and Prevention, Ransomware readiness testing, Spoofing detection & spoofing attacks, automated security controls, security control validation, vulnerability assessment, exposure management, attack surface management. How you build the organization security ecosystem, you’ll still be introducing risk no matter the vertical scale, the software development security, application security, making sure that you truly focus on the codes that’s written and barrel the application security engineers, developers, penetration testing engineers and product vulnerability, risk mitigation teams, enable them to shift through the noise and actually see what’s active and what needs to be prioritised. There will be one group, BLUE TEAM/RED TEAM in the company who translates this 50plus security controls and data protection, will be addressing global operations in all aspects. There will be a high-level review of classic engineering artefact management, traceability and governance, controls and regulations in place that demands reporting-line procedures, that needs to be manage track and trace. Areas to focus: Create a resilient cybersecurity culture within the organization to effectively combat cyber threats. The NIST cybersecurity framework, DoD requirements in conformity to controlled unclassified information (CUI) in accordance with requirements defined in NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The Cybersecurity Maturity Model Certification or CMMC associated with CUI and information processing facilities shall be identified and an inventory of controlled unclassified information shall be effectuate into policies and maintained. You will also be micromanaging the cybersecurity engineers, penetration testing engineers, cyber architects, network security engineers, Incident detection engineers, DevSecOps engineers, Manual test engineers, Automated test engineers, security engineers, IT infrastructure engineers, security analysts, Structured cabling engineers. We are a startup enhancing the formation of early stages of a product development project.

PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job.

ENVIRONMENT: This position will operate in the following areas of the organization regulatory [ROCKET FUEL] MISSION INTELLIGENCE DIVISION”. Innovation, powering, speed and space exploration in science systems”

Employees must be legally authorized to work in the UK.Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for

this position.

QUALIFICATIONS, KEY REQUIREMENTS  AND SKILLSET:

  • 20yrs+ in cybersecurity and digital solutions engineering
  • Proficiency in strong key generation, key lifecycle management and policy management, risk management, risk assessment processes is essential.
  • (GSEC) or Offensive Security Certified Professional (OSCP)
  • Certified Information Security Manager (CISM) is essential.
  • Certified Authorization Professional (CAP)
  • Certified Network Defender (CND)
  • Information Systems Security Architecture Professional (ISSAP)
  • Health Care Information Security and Privacy Practitioner (HCISPP)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Security Leadership Certificate (GSLC)
  • Information Systems Security Engineering Professional (ISSEP)
  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensics Investigator (CHFI)
  • Information assurance system architecture and engineer (IASAE)
  • It’s prerequisite to be certified one of the listed DoD 8570 Certifications.
  • INTERVIEW PROCESS:

    • STAGE 1: COGNITIVE ABILITY TEST
    • STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST:
    • STAGE 3: PRE-SCREENING (verification checks & DV security clearance)
    • STAGE 4: INTERVIEW WITH THE: CEO & CTO
Job Type: Full Time
Job Location: London

Apply for this position

Allowed Type(s): .pdf