Cyber Superstars

Raytheon has emerged as the industry leader in developing Cyber resilience, and our expert cyber engineers help other organisations in government and industry do the same.

If you’re an innovative cyber professional then Raytheon want to hire you
 
Exciting opportunities at a variety of levels within our new Cyber Innovation Centre! Including Cyber Research, Software Development, Systems Engineering and many other roles.
The benefits of the digital era come with a steep price; cyber attacks and cyber crime have quadrupled in recent years, and estimates of the losses exceed US$1 trillion.
With this type of crime and terror escalating, today’s organisations require a new generation of digital defence warriors ready to face these global threats in this rapidly changing environment .
Trying to prevent all manner of Cyber threats is no longer considered realistic. Instead, governments and businesses now seek ways to withstand attacks while continuing to operate effectively.
Raytheon has emerged as the industry leader in developing Cyber resilience, and we offer that expertise and experience to help other organisations in government and industry do the same.
Experts predict 75 billion devices will hook into the Internet by 2020. That's a lot of open doors for hackers to exploit, and Raytheon Cyber engineers are working to stop them.
So, if code breaking excites you, reverse-engineering seems pretty straightforward and you like to break down information security systems just to build them back, stronger and better, then you are the kind of person we are actively seeking to recruit at Raytheon: a Cyber defence warrior who can help us protect the world's most critical data from breach, fraud, theft and sabotage.
With opportunities at our new Gloucester-based Cyber Innovation Centre, as well as other customer and partner sites, we are recruiting across a range of disciplines and welcome applications from individuals at all levels.
Working in a dynamic environment, we seek enthusiastic and driven individuals to work on truly challenging projects – stepping away from the typical dull beige environment and projects.
Click below to search our current Cyber roles based in Gloucester or email your CV to our Raytheon UK recruitment team 'recruitment@raytheon.co.uk' and one of our Recruitment team will be in touch.
Raytheon UK : http://bit.ly/1JbLnka

 

« Cybersecurity: Don’t Bank On It With 3rd Parties
Will Open Source Save the Internet of Things? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.