VICE PRESIDENT SOFTWARE ENGINEERING: AEROSPACE AND DEFENSE

Posted 13 days ago by Gentrian

Permanent
Not Specified
Academic Jobs
London, United Kingdom
Job Description
VICE PRESIDENT SOFTWARE ENGINEERING: AEROSPACE AND DEFENSE

Bullisher is a data-centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility.

JOB DESCRIPTION:

This role may suit an individual who is truly specialist in END-TO-END CONTENT INFRASTRUCTURE. A set of software focused applications designed to optimize powerful hidden patterns powered by AI and machine learning to configurable workflows. These incoming workloads get to the decision makers in real-time, intelligently processing data based on size, types, and AI's confidence score. The overarching objective for the oversight is a chance to become the BIG BIRD EYE-VIEW of the organization's regulatory engineering division foundation building-blocks. Areas to cover will include: ingest syndication of data integrated into traditional DAM infrastructure, designing models and conducting simulations and analysis of systems and components, and defining the specification of test plans to validate the model and performance.

Responsibilities will include:

  • Campaign planning and execution, where decisions and executions have their immediate impact on the outcome of engagement in real-time.
  • Operational strategy, written process, control policies, and guidelines.
  • Deriving standard Alpha states from standard control frameworks in conformity to NIST SP 800-171 and NIST SP 800-160.
  • Creating an ecosystem of practices and preparing incremental improvements.
  • Creating information security requirements, classifying information sensitivity, and implementing information security architecture requirements.

WHAT ARE WE LOOKING FOR:

  • Executive level experience in the spectrum of (IOMT) internet of military things and CND.
  • Academic level training record in building mathematical systems and control theory.
  • A proven leader with experience in edge protection strategies.
  • Extensive experience in threat categories.

PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing necessary equipment to perform the job.

ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division: MULTIDOMAIN DEFENCE DOCK.

INTERVIEW PROCESS:

  • STAGE 1: COGNITIVE ABILITY TEST
  • STAGE 2: COGNITIVE ASSESSMENT SCREENING WITH A 30+ YEAR EXPERIENCE PSYCHOLOGIST
  • STAGE 3: PRE-SCREENING (verification checks & DV security clearance)
  • STAGE 4: INTERVIEW WITH THE CEO, CTO & GC

QUALIFICATION, SKILLS SET AND KEY REQUIREMENT:

  • A proven record in building mathematical systems and control theory, edge computing/edge processing, multi-physics, Masters in computer science, custom Artificial Intelligence, data engineering, Bachelors in computer science. Certified Secure Software Lifecycle Professional (CSSLP) is essential.
  • Critical modeling experience with a focused processing of converting pieces of unstructured data into structured data.
  • Extensive experience in AI powered software development management and advanced analytics.
  • In-depth working knowledge of modeling chaotic dynamics software is essential.
  • Strong programming skills in JAVA, SQL, C++, RUS and experience with handling large data sets.
  • Highly analytical individual with strong problem-solving skills and keen attention to details.
  • Certified Authorization Professional (CAP)
  • Certified Network Defender (CND)
  • Information Systems Security Architecture Professional (ISSAP)
  • Certified Information Security Manager (CISM)
  • Information Systems Security Engineering Professional (ISSEP)
  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensics Investigator (CHFI)
  • Information assurance system architecture and engineer (IASAE)
  • It is prerequisite to be certified in one of the listed DoD 8570 Certifications.