Cyber security jobs contract
UK manufacturing and technology sectors are vying for first and second place as the most cyber-attacked industry sectors, according to the 2019 Global Threat Intelligence Report (GTIR) from US firm NTT Security – the report is compiled from trillions of logs and millions of attacks, said NTT, whose data is analysed across 18 industry sectors.
“While manufacturing took top billing in the 2018 GTIR, with 46% of all cyber attacks in the UK, this year’s report shows a significant fall to second place with 20% of attacks,” according to NTT. “However, the tech sector, which attracted 23% last year, jumps to top spot with 47% of attacks in the UK.
Finance, which is apparently the most attacked EMEA sector, is lucky in the UK because it only gets third spot with 13%, followed by business-and-professional services (4%) and 3% for healthcare.
“While manufacturing may have dropped down a position, the fact that it is still attracting a fifth of all attacks against UK organisations is a major concern,” said NTT cyber security manager David Gray. “The critical national infrastructure sectors tend to grab the headlines, such as the attacks on the Ukrainian national grid in 2016, or the Wannacry attack on the NHS in 2017. However, the recent attacks on Norsk Hydro demonstrate the impact that cyber attacks can have on other sectors, such as manufacturing, and highlight the importance of effective incident response.”
- Get the basics right. Without the right fundamentals in place, attacks do not need to be advanced to succeed. People are often a manufacturer’s greatest threat, so invest in staff awareness and training, and highlight the importance of collective responsibility.
- Take an intelligence-driven approach to security. IT and security should avoid working in silos and having a ’not in my backyard’ mentality by developing robust holistic processes and procedures.
- Develop threat intelligence capabilities. There is no such thing as an isolated incident and there is a need to manage the whole incident by developing threat intelligence – pervasive visibility is essential.
- Manufacturers are still failing to prepare. There is still an element of ‘head in the sand’, where they do not think it is going to happen to them. Having effective incident response capabilities that are tested regularly is key and enables organisations to respond quickly in order to mitigate the threat and identify the cause.
And wake up to what counts as vulnerable.
“The lines between traditional and digital manufacturing are blurring,” said Grey, “where high value manufacturing and advanced technologies are key for global competitiveness and there is greater convergence of IT with operational technology, which brings with it greater complexity and risk. The problem is that operational technology has traditionally been something of a dark art for IT and security teams who lack the knowledge and skills to effectively map their operational technology risk landscape and implement practical plans and processes.”
Where are those attacks coming from?
- Once again China is the number one source of attacks (20%) by country against UK organisations, followed by the US (16%) and France (10%).
- Apart from Sweden, the UK is the only country to see most attacks coming from China.
- Across EMEA, China is second (13%) just behind the US (16%).
- Globally, again the US is top attack source (22%) followed by China on 13%.
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.