Feeds

GCHQ in new challenge for cyber security wannabes

So me lad, ye think ye can repel boarders, eh?

Intelligent flash storage arrays

GCHQ, the nerve centre for UK eavesdropping spooks, has launched a new attempt to persuade tech-savvy Brits to defend their nation rather than seek lucrative employment in private companies.

Officials at the Government Communications Headquarters are after potential cyber spooks aged 16 and over who are not already working in computer security and could possibly guard the country's networks against the hacking ambitions of hostile states, crooks and script kiddies.

But the spook hopefuls must first triumph in a Balancing the Defence game. The participants will analyse a fake government's networks for possible paths of intrusion, figure out the threats they face and suggest ways to defend them - while taking into account the increasingly tight purse-strings of the UK. The Q-Branch wannabes will have just one week, starting on 1 October, to be briefed on the scenario and submit their report.

"We hope this competition will uncover those who have the vital mix of technical ability and business awareness to make tough decisions in the best interest of an organisation," said Karl, the "architect" of the competition and such a secret spy his surname wasn't given.

"At GCHQ we are committed to finding and developing the new cyber security skills in the UK and these are the skills sets employers including ourselves are most interested in," he added in a tinned statement.

This latest test is part of the Cyber Security Challenge UK programme, which was started in 2010. Winners of Balancing the Defence will be invited onto the next stage of the programme, a face-to-face competition that will further whittle down the candidates. Another virtual competition will follow, after which the remaining contenders will get a real-life challenge with an Aston Martin Racing team and the IT infrastructure the crew relies on.

The final few will reach a Masterclass and Awards weekend in March, where a "range of career enhancing prizes" will be on offer. GCHQ bods didn't specifically say that a spook spot was waiting for anyone, mentioning bursaries, university courses and internships instead, but then, secrecy is in their nature.

The eavesdropping collective may a bit embarrassed to admit how much one of their crack specialists would earn, since another of its competitions, Can You Crack It?, yielded a job with a starting salary of just £25k.

Then again, a number of GCHQ's code-cracking conundrums have had hidden solutions within the main puzzle for top-notch spy wannabes to crack and stand out from the humdrum candidates. The masters of misdirection may well be diverting attention from the Bond-esque lifestyle they reallyoffers. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.