Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE:

Gentrian
London
7 months ago
Applications closed

Related Jobs

View all jobs

Technical Data Engineer

Data Analyst - Asset Management

Head of data engineering - remote

Resilience Data Analyst

Lead Full-stack Data Scientist

Senior Machine Learning Engineer

HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE:

Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation.

JOB DESCRIPTION:

The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench’s of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military thingsIOMT.(Areas to cover will include):edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include:(scenario’s dependent upon protocol’s status).Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data inML METHODS.MANDATE TO IMPROVE:Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include:(Imposedeadlines on real-time information systemsproducing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task).Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to theNIST SP 800-160.We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you’ll implement the processof the Eleven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification.(Implement a policyfunction best practices the risk associated with the type of data and sensitivity and how data is stored and the way it’s sent)will undergo a formal approval, review and voted by representatives for Security impact analysis,THEC.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS.

METHODS TO IMPROVE:

ABOUT US-Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance, and Security teams.Automate discovery and actions-Areas to cover willinclude:(Automate policies in place and decide what should happen to data base on the sensitivity).(Deploy discovery tools to highly sensitive data source):Policy kicks-inautomatically encrypted base on the sensitivity.Embed different layers of encryption for different types of data.AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL):EmbedHSMand secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge.INCIDENTS RESPONSE- (Establish a incident reporting linesand Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation Supplement. (Areas to cover will include):Conduct annual incident response exercises,(Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time’s disclosure).

ENVIRONMENT:This position will operate in the following areas of the organization regulatory engineering divisionMULTIDOMAIN DEFENCE DOCK:

MULTIDOMAIN DEFENCE DOCK“Standard engineering lab environment ”

Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.

QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET:

  • PHDin Mathematical cryptography is essential.
  • 10yrs+ In-depth working knowledge in Cognitive systems modelings andAI
  • A strong programming skills in C++ and Rust,OOP (Object orient programming), SQL
  • INTERVIEW PROCESS:
    • STAGE 1: COGNITIVE ABILITYTEST
    • STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST:
    • STAGE3: PRE-SCREENING (verification-checks & security clearance)
    • STAGE4: INTERVIEW WITH THE: CEO, CTO & GC

#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Why the UK Could Be the World’s Next Machine Learning Jobs Hub

Machine learning (ML) is becoming essential to industries across the globe—from finance and healthcare to retail, logistics, defence, and the public sector. Its ability to uncover patterns in data, make predictions, drive automation, and increase operational efficiency has made it one of the most in-demand skill sets in the technology world. In the UK, machine learning roles—from engineers to researchers, product managers to analysts—are increasingly central to innovation. Universities are expanding ML programmes, enterprises are scaling ML deployments, and startups are offering applied ML solutions. All signs point toward a surging need for professionals skilled in modelling, algorithms, data pipelines, and AI systems. This article explores why the United Kingdom is exceptionally well positioned to become a global machine learning jobs hub. It examines the current landscape, strengths, career paths, sector-specific demand, challenges, and what must happen for this vision to become reality.

The Best Free Tools & Platforms to Practise Machine Learning Skills in 2025/26

Machine learning (ML) has become one of the most in-demand career paths in technology. From predicting customer behaviour in retail to detecting fraud in banking and enabling medical breakthroughs in healthcare, ML is transforming industries across the UK and beyond. But here’s the truth: employers don’t just want candidates who have read about machine learning in textbooks. They want evidence that you can actually build, train, and deploy models. That means practising with real tools, working with real datasets, and solving real problems. The good news is that you don’t need to pay for expensive software or courses to get started. A wide range of free, open-source tools and platforms allow you to learn machine learning skills hands-on. Whether you’re a beginner or preparing for advanced roles, you can practise everything from simple linear regression to deploying deep learning models — at no cost. In this guide, we’ll explore the best free tools and platforms to practise machine learning skills in 2025, and how to use them effectively to build a portfolio that UK employers will notice.

Top 10 Skills in Machine Learning According to LinkedIn & Indeed Job Postings

Machine learning (ML) is at the forefront of innovation, powering systems in finance, healthcare, retail, logistics, and beyond in the UK. As organisations leverage ML for predictive analytics, automation, and intelligent systems, demand for skilled practitioners continues to grow. So, which skills are most in demand? Drawing on insights from LinkedIn and Indeed, this article outlines the Top 10 machine learning skills UK employers are looking for in 2025. You'll learn how to demonstrate these capabilities through your CV, interviews, and real-world projects.