Covert Online Developers and Technologists Ref. 2317

Black History MonthMind Silver AwardThe Times Top 100Disability confident leaderThe Prince's Responsible BusinessStonewall Diversity Champion 2021The Guardian UK 300 logoSocial Mobility Foundation Award

Technology Roles
Cheltenham, Scarborough
Full Time
Starting salary of £28,642 plus the opportunity to qualify for specialist skills payments ranging from £5,000 to £23,000+ per annum in the role.

At GCHQ, we are proud of our inclusive and supportive working environment that’s designed to encourage open minds and attitudes.  As an organisation that values and nurtures talent, we are committed to helping you fulfil your potential.  With comprehensive training and development opportunities, tailored to your needs and the requirements of your work, we will enable you to flourish in your role and perform to the very best of your abilities.

•    Access to learning and development tailored to your role and support to gain professional qualifications and certifications.
•    An environment that supports a range of flexible working options (including a flexible working hours scheme)
•    A culture which encourages inclusion and diversity.
•    Support to gain professional qualifications and certifications
•    A civil service pension
•    25 days annual leave, rising to 30 days based on length of service

GCHQ are looking to recruit a number of Covert Online Developers and Technologists to be part of our online operations teams. We use bespoke technological solutions to develop solutions to gather intelligence and disrupt those that seek to do harm to the UK and our citizens – delivering real world impactful outcomes with partners right across the national security community. This will likely include a number of roles working for, and in, the new National Cyber Force – a partnership between Defence and the UK Intelligence Community, helping to transform the UK’s cyber capabilities to disrupt adversaries and keep the UK safe. Used alongside diplomatic, economic, political and military capabilities, examples of cyber operations could include interfering with a mobile phone to prevent a terrorist from being able to communicate with their contacts, or helping to prevent the internet from being used as a global platform for serious crimes, including sexual abuse of children and fraud.


We’re looking to recruit individuals who have a strong desire to understand and develop technologies. All roles require clear communication skills and initiative to drive mission outcomes. The ability to work to tight time-scales and formulate tactical solutions that may then be developed in to strategic capability is a necessity. Relevant training pathways will be provided to any successful applicants but, individuals must have an affinity for learning.

Each role encompasses differing responsibilities please review the roles below, and specify the role you are interested in in the relevant part of the application. These are the things we’ll be looking for you to do with appropriate training – we aren’t expecting you to be able to do everything below at the point of application, but you must be able to demonstrate an affinity for learning.

1)    Web Services Technologist
Providing advice and guidance on web-based technology solutions, forming new tools to enable mission outcomes, and working in a diverse set of language (e.g. PHP, NodeJS, Python)
The ability to manage a broad portfolio of differing web technologies.

2)    Vulnerability Analysis Specialist
The ability to undertake technical assessments of technologies (typically web or mobile).
Responsible for operational delivery and / or capability development.
Responsible for liaising with stakeholders and maintaining governance.

3)    Multi-media Experts
Ability to develop a strong understanding of open source, commercial and in-house media tools, technologies and techniques.
Teaching basic media tooling to a wider community and evolve the trade to enable the local team.

4)    Infrastructure Engineer
a)    IT infrastructure: The ability to build, configure, administer and support infrastructure technologies and solutions such as: computing, storage, networking, physical infrastructure, software, COTS and open source packages and solutions, and virtual and cloud computing, including IaaS, PaaS, SaaS.
b)    Coding: You can demonstrate a knowledge of how the internet works and are aware of which tools and software are available to be utilised and are currently in practice.
c)    Information security: You know about information security and the security controls that can be used to mitigate security threats within solutions and services.

5)    Software Engineer
The ability to work as part of a software development team responsible for designing, implementing and maintaining mission critical systems.
Expertise in the full development life-cycle, from concept and design to testing. Focusing on Java / Java EE as the implementation language.
Develop software through clear requirements capture, system flow, data usage and work processes.

6)    Technical Data Analyst
Understanding of network traffic.
Application / Development of techniques to determine digital footprint of differing capabilities / software.
The ability to conduct technical investigations into a variety of Internet technologies.


Working with Others - Intermediate
Managing Customer Relationship - Fundamental
Change and Innovation - Intermediate
Contribution to Delivery - Intermediate
Analysis and Decision Making - Intermediate
Corporate Vision and Efficiency - Fundamental
Communications and Knowledge Sharing - Intermediate

If you’re excited about working with us and think you have some of what we’re looking for but aren’t sure if you’re 100% there yet… Back yourself and give it a go!

To apply for this position, you must meet our nationality, residency requirements. You’ll find more details here

Be prepared to dedicate 60-90 minutes to completing your application. We’re conscious this might be more time than you expected, so our system will allow you to save your application at any time and come back to it later. But remember to submit your full application before the closing date.
Once we’ve established that you meet our eligibility criteria, the next steps of this selection process are:

- Online proficiency test
- Personal interview
- Drug test
If you successfully complete these stages, you’ll receive a job offer, conditional upon you completing our developed vetting (DV) process which enables you to obtain the level of security clearance required to perform this vital role.

As a Disability Confident employer, we will ensure that a fair and proportionate number of disabled applicants who meet the minimum criteria for this position will be offered an interview. This is known as the Offer of Interview (OOI).

To secure an interview for this role, candidates applying under this scheme must meet the minimum criteria for the Eligibility and Business sift.

This Program / Vacancy is closed to applications.