Closes in 17 days (Wednesday 20 May 2026)
Malvern Panalytical is seeking a motivated and curious Cybersecurity Apprentice to join our IT and Security team. This is an exciting opportunity to gain hands‑on experience while developing the skills needed to build a career in cybersecurity within a global, technology‑driven organisation.
Training course: Cyber Security Technologist (2021) (Level 4)
Hours: 37 hours 30 minutes a week
Duration: 1 year 8 months
Work
Most of your apprenticeship is spent working. You’ll learn on the job by getting hands‑on experience.
What you’ll do at work
* Support the monitoring of security systems, alerts, and potential threats
* Assist in identifying and responding to security incidents
* Help maintain and improve security controls, policies, and procedures
* Contribute to vulnerability assessments and risk analysis activities
* Support user awareness initiatives and promote cybersecurity best practices
* Assist with audits, compliance activities, and documentation
* Work collaboratively with IT teams to ensure secure system operations
Where you’ll work
Grovewood Road
Malvern
Worcestershire
WR14 1XZ
Training
Apprenticeships include time away from working for specialist training. You’ll study to gain professional knowledge and skills.
Training provider
QA LIMITED
Training course content
* Discover vulnerabilities in a system by using a mix of research and practical exploration.
* Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) combine different sources to create an enriched view of cyber threats and hazards.
* Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source).
* Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
* Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
* Analyse employer or customer requirements to derive security objectives and, taking account of the threats and overall context, develop a security case which sets out the proposed security measures in the context with reasoned justification.
* Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
* Configure, deploy and use computer, digital network and cyber security technology.
* Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
* Write program code or scripts to meet a given design requirement in accordance with employers' coding standards.
* Identify cyber security threats relevant to a defined context.
* Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
* Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
* Analyse security requirements given (functional and non-functional) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade‑offs.
* Design and build systems in accordance with a security case within broad but generally well‑defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case.
* Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
* Use tools, techniques and processes to actively prevent breaches to digital system security.
* Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
* Conduct cyber‑risk assessments against an externally recognised cyber security standard using a recognised risk assessment methodology.
* Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
* Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
* Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation.
* Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
* Assess security culture using a recognised approach.
* Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
* Develop plans for incident response for approval within defined governance arrangements for incident response.
* Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach.
* Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
* Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
* Manage local response to non‑major incidents in accordance with a defined procedure.
Why choose our Cyber Defender & Responder Level 4 apprenticeship?
The Cyber Defender & Responder apprentice will use investigation techniques and analytics skills to defend against and respond to cyber incidents within the network environment.
* Develop problem‑solving and critical thinking skills in a safe but realistic environment
* Apply all the acquired skills throughout the programme, with added scoring of players and opponent actions with replay for objective assessment
* Take part in hands‑on training and active‑learning models that increase retention rates by 75% so that cyber apprentices can prepare for real‑world challenges
Requirements
Share if you have other relevant qualifications and industry experience. The apprenticeship can be adjusted to reflect what you already know.
Skills
* Analytical skills
Other requirements
Entry requirements:
* An A‑Level in ICT
* OR an International Baccalaureate at Level 3 ICT
* OR an A‑Level 3 apprenticeship in a similar subject
* OR a BTEC Extended Diploma in IT (180 credits)
You may also have a combination of qualifications and experience which demonstrate the minimum foundation needed for the programme. In this instance, you could still be considered for the programme.
If you hold international equivalents of the above qualifications, at the time of your application you must be able to provide an official document that states how your international qualifications compare to the UK qualifications.
For more information please visit the UK ENIC website.
About this employer
At Malvern Panalytical, you’ll be part of a team that uses advanced technologies to solve complex challenges across industries including pharmaceuticals, materials science, and academia. We are committed to developing talent and providing a supportive environment where you can grow and succeed.
Company benefits
* Structured apprenticeship programme with formal training and qualifications
* Hands‑on experience in a global organisation
* Mentorship from experienced cyber security professionals
#J-18808-Ljbffr