Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerabilityscanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerabilityscanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: VulnerabilityScanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: VulnerabilityScanning & Reporting Conduct regular vulnerability scans, generate reports … and ensure tools are current to identify system weaknesses. Perform code scans, vulnerability management scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review VulnerabilityScanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, VulnerabilityScanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerabilityscanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerabilityscanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerabilityscanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerabilityscanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers More ❯
Systems teams to ensure secure and efficient connectivity across the organization. Maintain and troubleshoot core security systems including firewalls, IDS/IPS, VPN gateways, vulnerability scanners, SIEM platforms, and security monitoring tools. Diagnose and resolve system and network issues, working across teams to remediate security-related disruptions or performance More ❯
and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key … Cyber Hub and business units when vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerabilityscanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business … unit stakeholders to assist with the remediation of critical-level alerts. Communicate vulnerability data to system and business owners. Establish and implement an OT vulnerability management communication and training plan. Determine necessary protective measures to address vulnerabilities on OT assets. Support patch management and vulnerability management product More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps More ❯
intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusion detection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies and integrate them with other systems. More ❯
and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key … Cyber Hub and business units when vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerabilityscanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business … unit stakeholders to assist with the remediation of critical-level alerts. Communicate vulnerability data to system and business owners. Establish and implement an OT vulnerability management communication and training plan. Determine necessary protective measures to address vulnerabilities on OT assets. Support patch management and vulnerability management product More ❯
Qualys Design and implement the Qualys infrastructure. Architect solutions for scalability and performance Implement integrations with other security tools. Develop and enhance Qualys scanning technologies. Integrate new vulnerability detection techniques. Automate vulnerabilityscanning and assessments. Develop automated workflows for remediation. Integration with orchestration and automation tools. … training on using Qualys tools and features. Create documentation for internal and external users. Monitor compliance with industry standards and regulations. Generate and analyze vulnerability reports. Provide insights for risk assessment and mitigation. Document system configurations and best practices. Identify opportunities for improvement in processes. External attack surface discovery More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯