Who we are looking for State Street seeks to recruit a Cyber Incident Management (CIM) and Threat and VulnerabilityManagement (TVM) Governance Analyst responsible for a variety of functions within the Fusion & Security Operations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching … State Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a CIM and TVM Governance Analyst you will: Produce … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, Cyber Incident Management, and Threat and VulnerabilityManagementMore ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA VulnerabilityManagement (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of VulnerabilityManagement solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA VulnerabilityManagement (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of VulnerabilityManagement solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threat intelligence, and vulnerabilitymanagement for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and effective response to … cyber incidents while driving improvements in incident management processes. Key Responsibilities Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution. Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies. Develop and implement cyber incident containment plans and remediation … reporting, and documentation to drive continuous improvement. Collaborate with Threat Intelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerabilitymanagement, prioritizing risks and coordinating remediation efforts. Provide regular technical and management reports demonstrating the effectiveness of security operations. Develop and maintain More ❯
implementing ServiceNow solutions such as: GRC solutions aligned with clients' regulatory frameworks, risk assessments, and compliance goals. Security Operations (SecOps) solutions including incident response, vulnerabilitymanagement, and security automation. Your skills and experience We seek a ServiceNow Developer with experience in GRC and/or SecOps who wants … grow and delight customers. You will have: Experience with ServiceNow GRC: IRM Implementation Experience with ServiceNow SecOps and related products Knowledge in Identity & Access Management, VulnerabilityManagement, Security Monitoring, Incident Management, Platform, Network, and Application Security Broad experience across the Now Platform Good communication skills (written … Apr 2025 Experience level: Experienced Professionals Contract: Permanent Locations: Woking, Birmingham, Manchester, London Business unit: Cloud Infrastructure Services Brand: Capgemini Community: Cloud Infrastructure Management Joining Capgemini means becoming part of something bigger. Learn about our recruitment process, how to apply, and get interview tips to prepare for your application. More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
background required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
a challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight and management to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service and … develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident ManagementVulnerabilityManagement Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. More ❯
IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
Senior Project Manager – Security & Asset Management We are looking for a dynamic and experienced Senior Project Manager to lead projects in asset management, vulnerabilitymanagement, and risk management . The ideal candidate will have a strong background in IT and OT environments , with a preference … for those with utilities sector experience . Key Responsibilities: Oversee asset management , ensuring efficient tracking and security of IT and OT assets. Lead vulnerability and risk management initiatives, mitigating security threats. Manage end-to-end software and security projects, ensuring timely delivery. Collaborate with cross-functional teams … to enhance security and compliance. Drive innovation and best practices in project execution. Requirements: Proven experience in asset and risk management within IT/OT environments. Utilities sector experience is highly desirable. Strong background in software project management and security best practices. Ability to lead complex projects and More ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be instrumental … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … significant IS risks and their appropriate Risk Treatment Plans. Risk & Compliance Management Define and enforce IT security policies, standards, and procedures. Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerabilitymanagement, and More ❯
role offers excellent opportunities for growth and career development in the ever-evolving field of cybersecurity. Your primary areas of focus will include: Event Management Incident Response and Management Endpoint Security Network Security VulnerabilityManagement Responsibilities As an Operational Security Analyst, you will: Investigate security events … Security (Azure/AWS) Windows Security Linux Security Active Directory/LDAP Authentication Mechanisms (Kerberos, NTLM, etc.) Basic programming/scripting (e.g., PowerShell, Bash) VulnerabilityManagement and associated tools (e.g., Rapid7) SIEM and associated tools (e.g., Splunk) Endpoint Security Controls (e.g., EDR/Anti-virus) Networking Fundamentals (OSI … Computer Science, Computer Security) Knowledge of ISO/IEC 27000 Information Security standards and experience working with a compliant ISMS Experience in IT problem management and root cause analysis At Trayport, we encourage applications from all backgrounds and walks of life, and we are committed to building a team More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
security measures. Incident Response - Proficiency in detecting, analysing, and responding to security incidents. Threat Analysis - Ability to identify and assess cyber threats and vulnerabilities. VulnerabilityManagement - Experience with vulnerabilitymanagement and reporting solutions, assessing customer vulnerabilities, creating regular reporting packs, devising mitigation strategies and working with … customers to support their implementation of these plans. Security Information and Event Management (SIEM) - In-depth experience with SIEM tools for monitoring and analysing security events. Malware Analysis - Skills in identifying, dissecting and mitigating malware threats. Forensic Analysis - Knowledge of digital forensics to investigate and remediate security breaches. The More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerabilityManagement, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerabilitymanagement and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerabilitymanagement support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & VulnerabilityManagement Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯