Technical Graduate Opportunities Ref. 510

Mind Achieving Impact AwardSocial Mobility Foundation AwardThe Times Top 100Disability confident leaderThe Prince's Responsible Business

Technology Roles
Cheltenham, Bude, Scarborough, Harrogate, Greater Manchester
Competitive package based on qualifications and experience

As one of our technical graduates you will have many exciting challenges and career paths open to you.  We offer tailored development and training opportunities, with everything from bespoke technical training to support to gain professional qualifications. Whether you want to build on your existing talents, use what you’ve learnt at university or are keen to develop your expertise alongside some of UK’s leading experts in the field, then we’ve got something for you.  Our technical graduate roles are extremely varied and your first role will focus on one of the following areas:

Computer Network Operations Specialists work in both cyber defence and cyber intelligence roles.  We are looking for committed and responsible individuals who have the potential to carry out operations to keep the UK safe.  In cyber defence roles, our operations specialists may find themselves working in a team detecting and preventing attempts to attack the critical national infrastructure or seeking to defend government systems against criminals seeking to steal information, identities or money.  Cyber intelligence specialists might need to develop software to access the computers of a terrorist group, or carry out operations to retrieve vital online clues about the location and identity of members of an organised crime ring.

Cyber Security and Information Assurance community is responsible for safeguarding critical IT infrastructure, data, systems and communications. We are at the forefront of technology, facing a variety of challenges every day.  Our research teams and engineers collaborate with our consultants and Security Information Risk Management Advisors to develop solutions for GCHQ and UK government encompassing leading-edge software and hardware. We also provide vital up-to-date guidance on the use and design of both current and future technologies. Our Cyber Security teams manage intrusion and threat incidents to safeguard against foreign intelligence services and other threat actors. We need a wide range of people and skills, including those who can focus on conducting cutting-edge technical research or deliver an agile technical engineering solution to customers. We also need people who can use their excellent risk management, communication and consultancy skills to build good relationships with our partners to ensure that our technical solutions truly meet their business needs.

Software Developers specialise in developing robust ‘unbreakable’ or high integrity systems that can have their lifetime’s measure in years not months. Integration and performance constraints can be a real challenge and it is not always clear at the start whether the problem can even be solved. The languages that are primarily used are Java, J2EE, C, C++, C#, .net, Perl and use object orientated development. We’re increasingly using cloud technologies and distributed programming such as Hadoop, NoSQL and other big data technologies, we also develop for embedded devices and tiny amounts of RAM.

Systems Engineer & Designers at GCHQ are industry-leading experts, working across communications, electronics and information technology. They deliver complex assignments, supporting major programmes and mobilise projects that are vital to the success of the mission. Embedded in our Engineering department, which is home to one of the world’s largest communities of Systems Engineers, the main focus of our Systems Engineers is on applying proven systems engineering techniques to the most complex world-class problems. Our large community of Systems Engineers and Designers work on both our information assurance (IA) mission and more broadly across the full scope of GCHQ’s work. In Information Assurance teams the focus is on understanding IA business requirements and translating them into technical solutions, ensuring that technical system architectures are aligned with information assurance principles and strong protections are built in.

Infrastructure Engineers build, maintain and support some of the country’s most complex and powerful computing and processing estates, deploying the most cutting-edge technologies available to keep Britain safe and secure in the face of wide-ranging threats from Cyberspace and emerging technologies. The roles are varied and will involve technical second and third-level support, network design and implementation, or IT solution architecture and design.  Most of these roles also involve providing technical consultancy and advice, so you could be working closely with other teams and solution providers to define IT requirements and assure solutions for a range of projects.

Communications Technology Analysts work in our Intelligence Operations teams and enjoy using data, technology and scientific approaches to solve problems. They analyse the communications behaviours of our adversaries and the technologies they use to communicate. That can mean developing and using analytic tools and techniques to discover and locate terrorists or analyse secure systems overseas. Some of the spheres of work involve gaining a deep understanding of networks and protocols or analysing weapons systems. In others, our data scientists analyse operational problems and use big data technologies and data mining skills to influence operational decision making.



REQUIREMENTS for these roles

Candidates must be graduating in either 2015 or 2016. You will have or expect to achieve a minimum 2:2 degree in a relevant STEM subject , for example physics, science, computer science technology, engineering, mathematics, statistics, electronics or computer linguists.

SALARY

Competitive package based on qualifications and experience

LOCATION

Cheltenham and Manchester

INTERVIEW and SELECTION PROCESS

As part of this campaign you will be required to undergo a staged selection process including:

•    A minimum eligibility sift
•    Interview
•    Assessment tests

Interviews to be held regularly throughout the year.

LOCATION

The majority of our roles are based in Cheltenham, we do however have some Software Developer roles in Manchester.

Key Dates:

Closing date for applications: Monday 21st December @ 23:00

This Program / Vacancy is closed to applications.