Who we are looking for State Street seeks to recruit a Cyber Incident Management (CIM) and Threat and VulnerabilityManagement (TVM) Governance Analyst responsible for a variety of functions within the Fusion & Security Operations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching … State Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a CIM and TVM Governance Analyst you will: Produce … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, Cyber Incident Management, and Threat and VulnerabilityManagementMore ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to help protect it. As a Vulnerability Analyst, you … in a regulated critical infrastructure environment where your insights will directly impact the company — from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with … and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of emerging OT threats, vulnerabilities, and attack vectors. Assist in developing and enhancing vulnerabilitymanagement processes and tooling tailored for OT environments. Qualifications: Experience performing vulnerability assessments in Operational Technology or industrial environments. Familiarity with OT More ❯
early as possible Making sure that decisions are based on robust data, return on investment and value measures that demonstrate thoughtful and intelligent cost management Encouraging the identification of ideas and driving the delivery of initiatives that will reduce cost and simplify the bank Building and leveraging relationships with … architecture principles and practices, including secure design and implementation. Hands-on experience with security tools and technologies, such as SIEM, IDS/IPS, and vulnerabilitymanagement systems. The ability to communicate technical issues in a clear and concise manner to senior stakeholders More ❯
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯