Jobs for Cyber Superstars

Raytheon has emerged as an industry leader in developing Cyber resilience, and their Cyber specialists help other organisations in government and industry to develop their Cyber capabilities.

The job opportunities are at a variety of levels within Raytheon’s new Cyber Innovation Centre; including Cyber Research, Software Development, Systems Engineering and many other roles.The benefits of the digital era come with a steep price; cyber attacks and cyber crime have quadrupled in recent years, and estimates of the losses exceed US$1 trillion.

With this type of crime and terror escalating, today’s organisations require a new generation of digital defence warriors ready to face these global threats in this rapidly changing environment.

Experts predict 75 billion devices will hook into the Internet by 2020. That's a lot of open doors for hackers to exploit, and Raytheon Cyber engineers are working to stop them. So, if code breaking excites you, reverse-engineering seems pretty straightforward and you like to break down information security systems just to build them back, stronger and better, then you are the kind of person we are actively seeking to recruit at Raytheon: a Cyber defence warrior who can help us protect the world's most critical data from breach, fraud, theft and sabotage.

Raytheon UK announces bursaries for the cyber programme at Lancaster University. The innovative cyber course is accredited by GCHQ and includes a comprehensive view of cyber with modules in business, law and psychology to ensure students are best prepared for the working environment.

Raytheon UK will provide a £3000 bursary each to six students towards their annual fees – three students reading data science and three reading cyber security. Students who want to be considered for the scholarship will be set technical challenges and will be asked to respond with a one-page project outline.

Raytheon

« Cyber War Exercise in Central London
UK Police Should Retry Gun Technology Sensors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.