Hippo Digital s a digital service design consultancy for the public and private sectors in the UK, providing digital leaders, service design teams and delivery expertise to support large-scale digital transformation programmes.
Hippo Digital is a digital service design consultancy for the public and private sectors in the UK, providing digital leaders, service design teams and delivery expertise to support large-scale digital transformation programmes.
Skills and experience needed: Have experience of delivering end-user facing digital services for a wide range of user groups : Be able to articulate complex technical problems and approaches to a wider audience : Previous exposure to user centred product development : Enjoy working collaboratively with your team and experts : Be comfortable working in rapid sprint cycles : Minimum of two years of experience : Have great consultancy skills, caring about your client’s needs and motivations Enjoy sharing your skills and experience with your client to enable them to continue to iterate and improve their product or service after you leave.
You will have the following qualities: A growth mindset - you approach every as a school day, no matter how experienced you are : Strong ability to recognise and predict use-cases and user interaction, including happy path, edge and corner cases, and incorporate them into designs The knowledge and desire to investigate, innovate and develop emerging design, UX and technology trends : Experience in rapid prototyping tools, for example Sketch / Figma / Adobe XD : Excellent understanding of user-experience design for mobile and the web, technology trends and more.....
The essentials: Extensive experience of working in Cyber Security, or IT Operations, ideally with some of the following: Experience working with security technologies such as SIEM, IDS/IPS, and Endpoint protection, ideally within a network security, or a security operations environment Broad knowledge of Security tools, programs and methodologies Experience deploying, integrating and supporting critical solutions in a complex environment Ability to profile and interpret security event logs, network traffic, system logs, and application logs and to identify developing patterns and trends An understanding of the correlation of events which are symptomatic of known types of attack such as DDoS, Insider Threat and Phishing