VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement/SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related … to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of SOC/VulnerabilityManagement Analyst role More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerabilitymanagement tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual … machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update ManagementMore ❯
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incident response coordination , and vulnerabilitymanagement . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as the key escalation point … Prepare and deliver weekly or monthly service review reports for stakeholders. Support the review and optimisation of service delivery processes, ensuring continuous improvement and implementation of best practices. Lead vulnerabilitymanagement initiatives: Perform risk-based vulnerability scanning across systems, applications, and networks. Prioritise vulnerabilities by risk level and asset criticality, coordinating remediation with business stakeholders. Manage and … maintain IDS and IPS signature updates for client security gateways and firewalls. What You'll Bring: The ideal candidate will bring extensive experience in security operations , incident management , and service delivery in high-stakes environments. Key qualifications and experience include: Minimum of 10 years' experience providing technical support and advisory services within a Security Operations Centre. Deep understanding of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents in collaboration with the security team, Defender for Endpoint security, Mimecast email security and vulnerabilitymanagement via Nessus, to name a few.Collaboration is key within this position, and you’ll regularly correspond with stakeholders, technical teams, non-technical teams and other businesses within … with occasional travel to the office on an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Security management, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the … business transitions – Covering SOC duties on an ad-hoc basis until the move has been completed Maintain Nessus vulnerabilitymanagement, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
and enhance the operations of a high-performing Security Operations Centre (SOC). This is a leadership role at the sharp end of service delivery - managing complex security incidents, vulnerabilitymanagement programmes, and client relationships across enterprise environments. What you'll be doing: Acting as the key liaison between the client and operational delivery teams Leading on incident … escalation and coordination with SOC and IR teams Managing post-incident investigations and reporting Supporting and driving improvements to vulnerabilitymanagement workflows Overseeing IDS/IPS updates, firewall security, and policy alignment Running regular service reviews and ensuring SLA/KPI performance Collaborating with senior delivery leadership on best practice and optimisation What we're looking for: 10+ … years of experience in a SOC or technical security operations environment Proven track record in vulnerabilitymanagement and incident response Strong understanding of IDS, IPS, and endpoint protection technologies Excellent stakeholder management and communication skills Ability to lead and coordinate teams through critical incidents UK SC clearance (or eligibility to obtain it) Relevant security certifications (e.g. CISSP More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You’ll drive incident response coordination, lead vulnerabilitymanagement efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerabilitymanagement efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerabilitymanagement experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
About The Role We are looking to appoint a highly experienced cyber and information security specialist to join our growing business. Mayden has a flat management structure and a coaching culture, with team members working together and supporting one another to make things happen. This means that job titles can look a little different, but also means our roles … public sector. You may already be operating at CISO level in a small company, or have ambitions to reach the next level in your career. Mayden's flagship patient management system, iaptus, is used by more than 200 mental health services in the UK, Australia and Canada. Theseus, our case management system for addiction and healthy lifestyle services … Compliance: Ensure the company's security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO27001:2022 and other relevant frameworks. Risk management: Lead the information security risk management program, including identification, assessment, mitigation, and monitoring of information security risks across all systems, applications, and operations. Policy and procedure development: Support More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerabilitymanagement experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerabilitymanagement - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem managementMore ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerabilitymanagement tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerabilitymanagement (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. VulnerabilityManagement: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management … policies and processes to ensure that all technology remains secure and compliant. Ensuring that all security layers align against our Internal Security Standards and Statutory and Regulatory obligations. SIEM Management: Manage, monitor, and respond to security incidents and events using the Council's Security Incident and Event Monitoring (SIEM) platform. Ensure timely detection, analysis, and response to security incidents … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, VulnerabilityManagement) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and VulnerabilityManagement: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerabilitymanagement program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
be eligible for DV clearance. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
therefore must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity for … an experienced Risk Management professional to join a successful team in a newly created position. The Third-Party Risk Management (TPRM) Lead will be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security, compliance, and operational risk … procurement, legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third-party risks. This position is part of a growing risk management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Peterborough, Cambridgeshire, England, United Kingdom
INTEC SELECT LIMITED
opportunity has arisen with a global brand for a Security Analyst/SOC Analyst on a 6-month Contract basis. You’ll play a key role in security operations, vulnerabilitymanagement, compliance auditing, and incident response, ensuring robust security for cloud services across UK data centres. Role and Responsibilities Manage vulnerability assessments using Tenable.io, including triage, exception … tracking, and remediation Handle EDR alert triage (CrowdStrike) and escalate incidents as needed Conduct system audits for ISO 27001 compliance and review pen test/vulnerability scan outputs Perform log analysis, assist with threat hunting, and escalate risks or unusual activity Develop incident reports and track system impacts for analysis and improvement Collaborate with clients on infrastructure hardening and … identify security gaps Support incident response, forensic analysis, and document findings for knowledge sharing Maintain internal guides and playbooks for security operations Skills and Experience Strong understanding of vulnerabilitymanagement (Tenable.io) and EDR platforms (CrowdStrike) Experience with ISO 27001 audits, system audits, and compliance validation Knowledge of SIEM platforms (Elastic SIEM) and log analysis Hands-on experience with More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
proposing effective controls, and ensuring adherence to security policies. Drive the selection and integration of security technologies and services within cloud ecosystems (AWS, Azure, GCP preferred). Risk & Compliance Management: Lead threat modeling, risk assessments, and security posture management across cloud environments. Ensure architectural designs meet stringent regulatory compliance requirements relevant to the financial industry in Europe (e.g. … security, including understanding of common threats, European regulatory requirements (e.g., PSD2, DORA, EBA guidelines), and data privacy mandates (GDPR). Extensive knowledge of security architecture principles for: Identity & Access Management (IAM) in cloud (e.g., AWS IAM, Azure AD, GCP IAM). Network Security (VPCs, firewalls, WAFs, micro-segmentation, private connectivity). Data Security (encryption at rest/in transit … KMS, data classification, DLP). Application Security (secure coding, API security, SAST/DAST, WAF integration). Container Security (Kubernetes, Docker, service mesh). Security Information and Event Management (SIEM) and logging strategies. Zero Trust Architecture principles. Proven experience with DevSecOps methodologies and securing CI/CD pipelines. Strong understanding of security frameworks such as NIST CSF, ISO More ❯
or contribute to cyber engagements across various sectors, adapting to different organisational cultures and regulatory contexts. Core Cyber Security Skills: Strong expertise in areas such as cyber strategy, risk management, cyber maturity assessments, security architecture, transformation programmes, and regulatory compliance. Familiarity with leading frameworks and standards including NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, and CRI2.0. Hands-on experience … and assessments in varied environments. Relevant certifications such as CISSP, CISM, CISA, M.Inst.ISP, or a postgraduate qualification (e.g. MSc in Cyber Security). Practical knowledge in domains like threat management, vulnerabilitymanagement, cyber GRC, cyber architecture, and cyber assurance. Detail-oriented with strong analytical and problem-solving capabilities. Excellent written and verbal communication skills, including stakeholder reporting More ❯