Cyber Superstars

Raytheon has emerged as the industry leader in developing Cyber resilience, and our expert cyber engineers help other organisations in government and industry do the same.

If you’re an innovative cyber professional then Raytheon want to hire you
 
Exciting opportunities at a variety of levels within our new Cyber Innovation Centre! Including Cyber Research, Software Development, Systems Engineering and many other roles.
The benefits of the digital era come with a steep price; cyber attacks and cyber crime have quadrupled in recent years, and estimates of the losses exceed US$1 trillion.
With this type of crime and terror escalating, today’s organisations require a new generation of digital defence warriors ready to face these global threats in this rapidly changing environment .
Trying to prevent all manner of Cyber threats is no longer considered realistic. Instead, governments and businesses now seek ways to withstand attacks while continuing to operate effectively.
Raytheon has emerged as the industry leader in developing Cyber resilience, and we offer that expertise and experience to help other organisations in government and industry do the same.
Experts predict 75 billion devices will hook into the Internet by 2020. That's a lot of open doors for hackers to exploit, and Raytheon Cyber engineers are working to stop them.
So, if code breaking excites you, reverse-engineering seems pretty straightforward and you like to break down information security systems just to build them back, stronger and better, then you are the kind of person we are actively seeking to recruit at Raytheon: a Cyber defence warrior who can help us protect the world's most critical data from breach, fraud, theft and sabotage.
With opportunities at our new Gloucester-based Cyber Innovation Centre, as well as other customer and partner sites, we are recruiting across a range of disciplines and welcome applications from individuals at all levels.
Working in a dynamic environment, we seek enthusiastic and driven individuals to work on truly challenging projects – stepping away from the typical dull beige environment and projects.
Click below to search our current Cyber roles based in Gloucester or email your CV to our Raytheon UK recruitment team 'recruitment@raytheon.co.uk' and one of our Recruitment team will be in touch.
Raytheon UK : http://bit.ly/1JbLnka

 

« Cybersecurity: Don’t Bank On It With 3rd Parties
Will Open Source Save the Internet of Things? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Melius CyberSafe

Melius CyberSafe

Melius CyberSafe has developed a world-leading SaaS platform built around continuous assessment and improvement through vulnerability scanning and penetration testing.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

Wirespeed

Wirespeed

Managed Detection & Response (MDR) has never been faster or easier: Onboard in minutes, Respond in seconds, Secure instantly.