Public Services > Central Government

Home Office explores using data analytics platform to identify cyber threats

David Bicknell Published 07 December 2017

Digital Outcomes and Specialists opportunity discusses “innovative, exploratory project” using analytics platform to identity threats from AWS protective monitoring logs

 

The Home Office is developing a project to create a data analytics platform which it believes could be used to identify cyber threats from AWS protective monitoring logs.

Details of the "innovative, exploratory" project were published today on the Digital Outcomes and Specialists Marketplace as a supplier opportunity, looking for an AWS Solution Architect working for three months at a rate of £850 a day. 

The work will comprise developing a prototype using open source tools to collate logs from multiple AWS accounts, and work with threat analysts to perform data analytics on the logs.

The AWS solution architect will mainly work independently and will be responsible for delivering the prototype and the required outcomes. He or she will be supported by a part time project manager and security architect. The role will involve working with cyber threat experts who will provide support in the development of the threat scenarios to be explored.

The solution architect will work on a sand box environment on AWS to prove security capability and controls could be achieved for transferred to production environments.

The deadline for asking questions about the opportunity will be Monday December 1, with a closing date for applications of Thursday December 14. The latest start date for the work is expected to be Monday February 12.

The essential skills and experience required includes knowledge of designing or implementing brand new AWS solutions, with the ability to rapidly provision AWS environments with VPC, IAM and EC2.The successful candidate will also be expected to have experience with AWS security and com0liance offerings , including CloudTrail, IAM cross account roles, CloudWatch, AWS Config and TrustAdvisor.

Nice-to-have skills, the opportunity states, will include having experience of open source security audit tools such as SecurityMonkey and traffic generation tools, as well as having knowledge of Protective Monitoring best practice and SIEM solutions such as AlienVault.








We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.