Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerabilityscanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats More ❯
incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review VulnerabilityScanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, VulnerabilityScanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
a broad knowledge of Cyber security technologies and have excellent skills in network security, monitoring and incident response. Exposure to EDR technologies, IPS and Vulnerability Management tools would be beneficial. A good understanding of legislation and security frameworks such as the Network and Information Systems Regulations, ISO 27001 and … a Cyber Security incident. As a member of the ICT team at Hywel Dda you will work with the Cyber Security team to undertake vulnerabilityscanning, the monitoring of Cyber Security Systems utilising SIEM technologies and work with third parties to review compliance with best practice. You will … Security. Evidence of Cyber Security or other relevant work outside formal training or employment (voluntary, research, academia, social media etc.) Working with SIEM and Vulnerabilityscanning solutions. Development of training packages. Desirable Experience of ICT service provision in a health care setting Experience of working in fields other More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
protocols and ensuring employees are aware of potential threats. Key responsibilities: Take responsibility for deploying, managing and running the group security tooling (anti-malware, vulnerabilityscanning etc) Work with external security partners to facilitate and coordinate red and blue team activities Ensure sensitive data is protected and is … being effectively managed Review, monitor and track security vulnerabilities across all systems (through penetration testing, vulnerabilityscanning, and event logging) Produce reports showing security posture over time and work planned to remediate vulnerabilities Champion high security standards and support the technology teams to follow security best practice Work … and preserve evidence Contribute to continuous improvement and the ongoing group security strategy The person: Proficient in configuring and executing both internal and external vulnerability scans Strong understanding of centrally managed end-user security solutions and best practices, including antivirus, email and web security Solid knowledge of security principles More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to help protect it. As a Vulnerability Analyst, you … in a regulated critical infrastructure environment where your insights will directly impact the company — from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with … and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of emerging OT threats, vulnerabilities, and attack vectors. Assist in developing and enhancing vulnerability management processes and tooling tailored for OT environments. Qualifications: Experience performing vulnerability assessments in Operational Technology or industrial environments. Familiarity with OT/ More ❯
Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers More ❯
intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusion detection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies and integrate them with other systems. More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess … Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
flow, system administration, OSI model, defense-in-depth, and security elements Experience analyzing logs, network data, and attack artifacts for incident investigations Experience with vulnerabilityscanning solutions Knowledge of enterprise SIEM platforms (e.g., Sentinel, Nitro, ArcSight, QRadar, Splunk) Understanding of mobile technology, OS (Android, iOS, Windows), and Cloud More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerabilityscanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
Hands-on experience analysing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations Experience with vulnerabilityscanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with More ❯
fully remote role based in the UK, offering flexibility and the opportunity to work with cutting-edge security technologies. Key Responsibilities · Perform threat and vulnerability assessments to identify and mitigate risks across systems and networks. · Monitor network traffic using SIEM platforms (e.g., Splunk, ArcSight) to detect and respond to … o Minimum of 3 years of professional experience in cyber security, with a focus on technical roles such as threat analysis, incident response, or vulnerability management. · Technical Expertise: o Bachelor’s degree in computer science, Cyber Security, Information Technology, or a related field (or equivalent experience). o Proficiency … with SIEM tools (e.g., Threat Defence, Splunk, ArcSight), vulnerability scanners (e.g., Tenable/Nessus, Qualys), and firewalls. o Knowledge of cyber security frameworks such as NIST, ISO 27001, or NCSC Cyber Assessment Framework. o Experience with penetration testing, log analysis, or threat intelligence tools. · Language Skills: o Fluency in More ❯
standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security Auditing Good understanding of security testing principles, including experience of vulnerabilityscanning, identifying, resolving, and reporting risks Experience of formal More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and affected business units. Maintain compliance with frameworks such as Secure by Design, NIST-800-53, STRAP. Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities to ensure effectiveness of security controls. Design and Architecture Review - Assess the Information Security of IT architecture More ❯