Gentrian
HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE:
Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation.
JOB DESCRIPTION:
The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench’s of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military things IOMT.(Areas to cover will include): edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include: (scenario’s dependent upon protocol’s status). Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data in ML METHODS. MANDATE TO IMPROVE: Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include: (Imposedeadlines on real-time information systems producing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task). Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to the NIST SP 800-160. We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you’ll implement the processof the Elven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification. (recommend a best practices the risk associated with the type of data and sensitivity and how data is stored and the way it’s sent) will undergo a formal approval, review and voted by representatives for Security impact analysis, THEC.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS.
MANDATE TO IMPROVE:
ABOUT US- Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance teams, and Security teams. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL BASED SCHEME): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation E.g Conduct annual incident response exercises, (Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time’s disclosure, time available for computational intensive penalitics texts).
ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division MULTIDOMAIN DEFENCE DOCK:
MULTIDOMAIN DEFENCE DOCK” Standard engineering lab environment ”
Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.
QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET: