Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
watford, hertfordshire, east anglia, united kingdom
Taylor Hall recruitment
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
a wide variety of challenging projects across multiple industries – from financial services to government and critical national infrastructure. What you’ll be doing: Conducting vulnerability assessments and penetration tests across web applications, networks, and infrastructure Preparing detailed reports and debriefs for clients, including remediation advice Collaborating with internal teams More ❯
through monitoring activities. Coordinate with Infrastructure, Support, and Security teams to implement technical controls and ensure security considerations are integrated into IT projects. Perform vulnerability assessments and recommend remedial actions. Qualifications and Experience Minimum of 4 years' experience in IT and security roles, with broad exposure to systems analysis More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with cloud security More ❯
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
documentation, collaborate on IT projects to ensure that security issues are addressed throughout the project life cycle and work with the team to perform vulnerability assessments to identify weaknesses and recommend remedial action As the Information Security Technical Lead you are required so show demonstrable knowledge and appreciation of More ❯
City of London, London, Canary Wharf, United Kingdom
Fusion People Ltd
documentation, collaborate on IT projects to ensure that security issues are addressed throughout the project life cycle and work with the team to perform vulnerability assessments to identify weaknesses and recommend remedial action As the Information Security Technical Lead you are required so show demonstrable knowledge and appreciation of More ❯
Employment Type: Permanent
Salary: £80000 - £88000/annum hybrid, great benefits
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp … firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience More ❯
qualifications required for this role include proven experience in cybersecurity and compliance management, strong understanding of NIST CFS 2.0, ISO 27001 standards, excellent risk assessment and management skills, ability to develop and maintain security protocols and documentation, and effective communication and collaboration skills. This is a full-time role … knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions More ❯
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerabilityassessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research More ❯
on technical security roadmap, including anti- malware , DLP , SIEM , as well as intruder protection and detection systems ( IPS/DPS/XDR ). Manage vulnerability assessments including regular penetration testing and making recommendations for risk mitigation and implementation of approved changes Provide full support for security incidents You will More ❯
systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce More ❯
systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce More ❯
Assess and manage information risks across projects, supply chains, and stakeholders. Stay ahead of evolving security threats, leveraging industry standards and best practices. Oversee vulnerability assessments and ensure security compliance across IT systems. Provide technical risk assessments and contribute to the professional development of information security standards. What We More ❯
and staying up to date with HMG, MoD, and industry best practices. Supporting solution architects in applying secure design principles and ensuring compliance. Overseeing vulnerability assessments and coordinating formal system accreditations. Acting as a key interface with government technical authorities. What We're Looking For: Essential: Certified Information Systems More ❯
with internal teams and clients to deliver exceptional IT services. - Bootstrap the new IT arm, actively engaging in hands-on tasks as needed. - Conduct vulnerability assessments and manage incident response and monitoring. - Set up and configure consoles and development kits (Sony, Microsoft, Nintendo) with multiple network connections. - Negotiate SLAs More ❯
with internal teams and clients to deliver exceptional IT services. - Bootstrap the new IT arm, actively engaging in hands-on tasks as needed. - Conduct vulnerability assessments and manage incident response and monitoring. - Set up and configure consoles and development kits (Sony, Microsoft, Nintendo) with multiple network connections. - Negotiate SLAs More ❯
with internal teams and clients to deliver exceptional IT services. - Bootstrap the new IT arm, actively engaging in hands-on tasks as needed. - Conduct vulnerability assessments and manage incident response and monitoring. - Set up and configure consoles and development kits (Sony, Microsoft, Nintendo) with multiple network connections. - Negotiate SLAs More ❯