Cyber Security Apprentice
CLARANET LIMITED
Leeds (LS1 2AD)
Closes in 25 days (Wednesday 12 November 2025)
Posted on 15 October 2025
Contents
Summary
Your mission is to ensure customer requirements are translated into clear, accurate, and deliverable solutions. Over time, you will develop the confidence and capability to lead scoping calls directly with customers, understanding their needs and shaping tailored solutions in collaboration with our delivery teams.
- Wage
-
£28,000 a year
- Training course
- Cyber security technologist (2021) (level 4)
- Hours
-
Days and shifts to be confirmed.
37 hours 30 minutes a week
- Start date
-
Wednesday 19 November 2025
- Duration
-
1 year 8 months
- Positions available
-
1
Work
Most of your apprenticeship is spent working. You’ll learn on the job by getting hands-on experience.
What you'll do at work
- Follow prescribed scoping methodologies to create accurate and detailed Statements of Work (SOWs) across cyber security services.
- Participate in scoping calls with customers, initially shadowing senior consultants and gradually developing to independently lead discussions.
- Collaborate with technical delivery teams to validate scoping accuracy and ensure client expectations are aligned with service capabilities.
- Work closely with the Sales Team to provide structured technical input during the pre-sales process, ensuring opportunities are scoped correctly from the outset.
- Support the continuous improvement of scoping frameworks and templates, providing feedback to enhance efficiency and accuracy.
- Develop technical product and service knowledge to a level that enables clear, confident conversations with both technical and non-technical stakeholders.
- Contribute to the handover process to PMO and Delivery teams, ensuring smooth transition from scoped engagement to delivery.
Where you'll work
6 East Parade
Leeds
LS1 2AD
Training
Apprenticeships include time away from working for specialist training. You’ll study to gain professional knowledge and skills.
Training provider
QA LIMITED
Training course
Cyber security technologist (2021) (level 4)
Understanding apprenticeship levels (opens in new tab)
What you'll learn
Course contents
- Discover vulnerabilities in a system by using a mix of research and practical exploration.
- Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards.
- Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source).
- Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
- Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
- Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification.
- Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
- Configure, deploy and use computer, digital network and cyber security technology.
- Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
- Write program code or scripts to meet a given design requirement in accordance with employers' coding standards.
- Identify cyber security threats relevant to a defined context.
- Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
- Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
- Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
- Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case.
- Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
- Use tools, techniques and processes to actively prevent breaches to digital system security.
- Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
- Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
- Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
- Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
- Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation.
- Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
- Assess security culture using a recognised approach.
- Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
- Develop plans for incident response for approval within defined governance arrangements for incident response.
- Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach.
- Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
- Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
- Manage local response to non-major incidents in accordance with a defined procedure.
- Discover vulnerabilities in a system by using a mix of research and practical exploration.
- Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards.
- Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source).
- Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
- Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
- Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification.
- Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
- Configure, deploy and use computer, digital network and cyber security technology.
- Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
- Write program code or scripts to meet a given design requirement in accordance with employers' coding standards.
- Identify cyber security threats relevant to a defined context.
- Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
Training schedule
Why choose our Cyber Security Engineer Level 4 apprenticeship?
The Cyber Security Engineer apprentice can help to design, build and test secure networks, security products or systems to help protect your organisation against cyber threats.
QA is a market leader in cyber security training, with a state-of-the-art immersive cyber gamified learning, giving apprentices a hands-on learning experience in simulating a real cyber threat.
QA's exclusive partnership with Circadence Corporation, the pioneer of the hands-on gamified learning platform Project Ares®, allows us to uniquely incorporate hands-on scenario training into our cyber security apprenticeships. The Project Ares platform offers a totally immersive experience, using automated features to support skills adoption with an in-game advisor, Athena, who advises our players through scenario-based challenges. The platform scenarios replicate the unpredictability and escalating levels of complexity that cyberattacks can present. It drives high levels of engagement through leaderboards and badges, elements used widely in the gaming world.
QA’s Cyber Security Engineer Level 4 apprenticeship programme enables the apprentice to:
- Develop problem-solving and critical thinking skills in a safe, but realistic environment
- Apply all of the acquired skills throughout the programme, with added scoring of players and opponent actions with replay for object assessment
- Take part in hands-on training and active-learning models that increase retention rates by 75% so that cyber apprentices can prepare for real-world challenges
Tools and technologies learned:
Apprentices will learn to use Project Ares, Python, Microsoft Azure, Microsoft PowerShell, Linux and AWS.
Requirements
Share if you have other relevant qualifications and industry experience. The apprenticeship can be adjusted to reflect what you already know.
Skills
- Communication skills
- Customer care skills
- Analytical skills
Other requirements
FOR THE FULL LIST OF ENTRY REQUIREMENTS PLEASE CLICK TO APPLY TO SEE THE FULL LIST OF ENTRY REQUIREMENTS ON QA'S WEBSITE.
About this employer
Founded at the beginning of the dot.com bubble in 1996, our CEO Charles Nasser had a light bulb moment to develop a truly customer-focused IT business. Since then, Claranet has grown from an Internet Service Provider (ISP) in the UK to being one of the leading business modernisation experts, who deliver solutions across 11+ countries. At Claranet, we’re experienced in implementing progressive technology solutions which help our customers solve their epic business challenges. We’re committed to understanding their problems, delivering answers quickly, and making a lasting impact to their business. We are agile, focused and experienced in business modernisation. Our approach helps customers make genuine, significant shifts in their business strategy, to deliver financial savings, boost innovation, and create a resilient business. We continually invest in our people and the latest technologies, so our customers get peace of mind knowing that they have access to the best talent and services. In the UK we have over 500 staff working in London, Gloucester, Warrington, Bristol, and Leeds, or as homeworkers.
Company benefits
Please click to apply to see the full list of benefits on QA's website!
After this apprenticeship
90% of QA apprentices secure permanent employment after completing: this is 20% higher than the national average.
Ask a question
The contact for this apprenticeship is:
QA LIMITED
The reference code for this apprenticeship is VAC1000346741.
Apply now
Closes in 25 days (Wednesday 12 November 2025)
Sign in with your GOV.UK One Login to apply.
After signing in, you’ll apply for this apprenticeship on the company's website.