Who we are looking for State Street seeks to recruit a Cyber Incident Management (CIM) and Threat and VulnerabilityManagement (TVM) Governance Analyst responsible for a variety of functions within the Fusion & Security Operations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching … State Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a CIM and TVM Governance Analyst you will: Produce … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, Cyber Incident Management, and Threat and VulnerabilityManagementMore ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to help protect it. As a Vulnerability Analyst, you … in a regulated critical infrastructure environment where your insights will directly impact the company — from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with … and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of emerging OT threats, vulnerabilities, and attack vectors. Assist in developing and enhancing vulnerabilitymanagement processes and tooling tailored for OT environments. Qualifications: Experience performing vulnerability assessments in Operational Technology or industrial environments. Familiarity with OT More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerability remediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security objectives … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerabilitymanagement Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Hymans Robertson LLP
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) VulnerabilityManagement Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a … assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. VulnerabilityManagement: Manage the industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. … REQUIREMENTS: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a … assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. VulnerabilityManagement: Manage the industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. … REQUIREMENTS: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration … influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK More ❯
architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the More ❯
for the represented network service capability. The network delivery lead represents all DXC Network Services seamlessly and provides a conduit between our DXC account management team, network operations, project, engineering, architecture, other DXC support groups, client counterparts, and other third-party network service providers or suppliers where required. The … reporting line to the account delivery executive (ADE) directly or through the account run lead (ARL) and a hard line to the Network Delivery Management Organization. Practice 'extreme ownership' of everything DXC network services manage, to an extreme degree. Be responsible for not just those tasks which you directly … DXC GNS should be accompanied by a formal Risk Acceptance Form or similar signed by the persons who have accepted the risk. Ensure proactive management of network performance and operability. Work with ASO to ensure compliance with contractually agreed security vulnerabilitymanagement and or security report findings. More ❯