CGI Cyber Escape
Our Cyber Escape provides security awareness training in a fun and memorable way for your employees to learn the basics of cyber security and help control risks within their organisation.Learn more CGI Cyber Escape
The Cyber Security team is at the centre of everything CGI does, helping clients protect what is most valuable to them. Our practice is defined by its complete cycle approach, bringing together a team with diverse skill sets to cover every angle of risk management, from governance and design to ongoing threat assessments.
Work on wide-ranging projects across public and private sectors, and enjoy wide-reaching career pathways. Our multi-disciplined, agile approach helps you to use your experience and knowledge across business, technology, operations and compliance. Whether you’re securing critical infrastructure systems or working on cutting-edge transformation, our full life cycle support means you’ll get to see how your work makes a difference.
We’re looking for critical thinkers with curious minds to strengthen our team in the following roles:
As part of the largest consultancies in the UK, our Cyber Security Consultants are trusted to work closely with a wide range of clients on exciting projects with real-world purpose and impact.
Our Security Architects are design authorities, helping to secure innovation business systems. Collaborating across enterprise architectures to produce end-to-end security designs, they work with stakeholders at all levels to deliver exceptional integrations and implementations.
Our Cyber Threat Intelligence Consultants monitor threat actors and manage our clients’ intelligence requirements, using cutting edge tooling to tailor risk alerts. Their vulnerability analysis and security engineering keeps systems safe.
Our Security Operation Analysts keep a keen eye on security alerts, investigating suspected incidents and threats, making recommendations for containment and eradication, and providing systems technical support in collaboration with our global teams.
Our Digital Forensics Analysts collect evidence following chain of custody procedures, determine attack vectors, establish activity timelines and identify the extent of compromise following cyber security breaches.
Our Penetration Testers give resilience to security systems, with rigorous testing of bespoke platforms, cloud technologies and mobile applications to ensure that we continually make our best better.