Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerabilityscanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats More ❯
incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review VulnerabilityScanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, VulnerabilityScanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusion detection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies and integrate them with other systems. More ❯
flow, system administration, OSI model, defense-in-depth, and security elements Experience analyzing logs, network data, and attack artifacts for incident investigations Experience with vulnerabilityscanning solutions Knowledge of enterprise SIEM platforms (e.g., Sentinel, Nitro, ArcSight, QRadar, Splunk) Understanding of mobile technology, OS (Android, iOS, Windows), and Cloud More ❯
Hands-on experience analysing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations Experience with vulnerabilityscanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and affected business units. Maintain compliance with frameworks such as Secure by Design, NIST-800-53, STRAP. Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities to ensure effectiveness of security controls. Design and Architecture Review - Assess the Information Security of IT architecture More ❯
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerabilityscanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hunter Bond
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
london, south east england, united kingdom Hybrid / WFH Options
Digital Republic Talent
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience with Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
of a team responsible for protecting IT infrastructure through technical expertise and strategic planning, ensuring security controls are properly implemented and maintained. Responsibilities include: VulnerabilityScanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Qualifications and skills required include experience with … security frameworks such as Government Functional Standard 007, vulnerability management, endpoint protection, incident response, system hardening, and compliance auditing. Clearance Requirements: Security Clearance to Start SC Security Clearance for Role DV What we offer: Contributory Pension Scheme Private Medical Insurance 33 days Annual Leave Flexible benefits including health schemes More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using SIEM … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure and … or regulated environment. Strong understanding of security incident handling, log analysis, and common attack vectors. Hands-on experience with SIEM tools, antivirus platforms, and vulnerability scanners. Good understanding of basic networking, firewalls, and endpoint security principles. Strong written and verbal communication skills. Ability to prioritize and manage multiple operational More ❯
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯
Portsmouth, Hampshire, Portchester, United Kingdom
ARM
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯