City of London, London, United Kingdom Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million active customers in over 700 business locations is the oldest … African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors More ❯
South East London, England, United Kingdom Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million active customers in over 700 business locations is the oldest … African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors More ❯
with business goals—without compromising operational performance. Duties and Responsibilities Support LivaNova’s cybersecurity tools and platforms. Investigate potential threats and incidents; conduct triage and escalate as needed. Support vulnerability management efforts by scanning, reporting, and tracking remediation. Assist in the implementation of security controls across infrastructure, endpoints, and cloud environments. Respond to phishing, malware, and unauthorized access … Familiarity with security and compliance frameworks (ISO 27001, NIST CSF/800-53/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerabilityscanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of potential … system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security risk assessments and develop action More ❯
assess, and conduct in-depth investigations on areas of interest highlighted through our various reporting mechanisms such as XDR, SIEM, Proxy solutions, Email Threat platform, Application Delivery Controllers (ADCs), VulnerabilityScanning Solutions and Security Bulletins. Monitor and investigate security events and alerts, prioritising risk and taking necessary actions to promptly remediate operational security risks. Support investigations and incident … Static/Dynamic Malware Analysis skills (using tools such as: Sysinternals, PEStudio, CyberChef, API Monitor, NodeJS, Powershell IDE, UPX, Wireshark and BurpSuite) Trend Micro suite of applications Nessus/Vulnerabilityscanning software Managing a PAM solution Understanding of ITIL framework, CE+ and UK government cyber security guidance is desirable Previous experience in a Security Operations Centre (SOC) or More ❯
London, England, United Kingdom Hybrid / WFH Options
Deloitte LLP
infrastructure-as-code. Designing and building secure CI/CD pipelines, integrating the latest security technologies and checks. Designing and building a range of security tooling, across endpoint protection, vulnerabilityscanning, network security, cloud security posture management, and security information event management (SIEM). Leading security assessments and providing technical recommendations on required configurations for client platforms and … security architectures and solution designs. Designing security controls and suggesting improvements on configurations of critical control such as WAF, firewalls, compliance monitoring, and alerting. Conducting risk assessments and scoping vulnerability assessments to identify potential security threats and vulnerabilities. Helping clients create security technology roadmaps, which provide realistic efforts estimates for engineering tasks. Staying up to date with emerging security … programming/scripting languages (e.g. Python, Bash, PowerShell). Experience building and deploying micro services-based applications. Experience with security technologies, for example Firewalls, Intrusion Detection/Prevention Systems, VulnerabilityScanning, WAFs, CASBs, SIEMs, and CSPMs. Experience inputting into and/or creating security architectures and designs. Understanding of security principles and the ability to assess alignment of More ❯
Software Development Lifecycle (SDLC). Stay Ahead of the Curve : Stay current on emerging security standards and technologies, ensuring Precisely leverages the latest advancements. Risk Management : Conduct security assessments, vulnerability management, and risk assessments to identify and mitigate potential threats. Cloud Expertise : Perform security architecture reviews across cloud, hybrid, and multi-cloud platforms (AWS, Azure & GCP). Collaboration : Work … cloud security goals. Cloud Cost Optimization with Security : Balancing security with cost-effectiveness in the cloud environment. Security Tools and Technologies: CSPM, CWPP, ASPM, Cloud Native Security, Cloud-based vulnerabilityscanning tools like Falcon Spotlight or Amazon Inspector, Container Security, Cloud WAFs, Endpoint Protection such as CrowdStrike Falcon or Microsoft Defender, GitHub, Infrastructure as a code, Secrets Management More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
preventive measures. Incident Response & Mitigation: Assess and maintain the Incident Response Plan, lead the response to security incidents and breaches, providing expertise in root cause analysis, containment, and remediation. Vulnerability Management: Conduct regular security assessments, including vulnerabilityscanning and writing penetration testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusion detection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerabilityscanning and penetration testing Cloud security Identity and access management (IAM) Data loss prevention (DLP) Endpoint protection Security operations and incident response Experience in developing and implementing security More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
Proven experience in performing security reviews, threat modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Strong problem More ❯
and cloud security standard frameworks, architecture, design, operations, controls, technology, solutions, and service orchestration, e.g., CIS, CSF; Skills in: Security Tooling: Proficiency in common security tools, such as SIEMs, vulnerability scanners, firewalls, and EDR products; Scripting: Proficiency in scripting languages like Python, BASH, or PowerShell; Security Incident Management: Ability to assist with the detection, response, and recovery of escalated More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent … a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 VulnerabilityScanning Disaster Recovery Work Experience: Cyber Security Specialist Security More ❯
London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
firms cyber security strategy! Role: Threat Detection and Response: Managing and monitoring systems Security Engineering and Architecture: Design and implement solutions to improve security structure Security Assessments and Compliance: Vulnerability assessments Incident Response: Develop and maintain incident response plans Requirements: Working knowledge over Linux and Windows systems MUST HAVE: Experience with Palo Alto Firewalls Experience with vulnerability management … scanning platforms Strong understanding and experience working with data security solutions and Cloud Security (AWS, GCP) Ability to script/automate using PowerShell/Python Experience in OSINT, Threat hunting and analysing malicious emails Demonstrate understanding of DLP, IPS, Endpoint, anti-malware, Sandbox, Vulnerability scanners If you think that this could be a good fit for you, then More ❯
more advanced security and data protection tasks with a higher level of autonomy. In this role, you will be responsible for conducting comprehensive security and data protection assessments, overseeing vulnerability management, developing and updating security and data protection policies, reviewing configurations, and providing expert guidance to the organization. You will be expected to operate with minimal supervision and mentor … to identify trends, areas of improvement, and potential security and data protection risks. Prepare detailed reports for management and advise on mitigation strategies. Lead Security Assessments: Perform risk assessments, vulnerability assessments, and commission penetration tests with minimal supervision. Prioritize and manage findings, providing actionable recommendations for remediation. Conduct security and data protection audits and collaborate with IT and development … Data Protection Impact Assessments). Configuration Reviews: Conduct detailed configuration reviews of systems, networks, and applications. Work with cross-functional teams to ensure that security configurations meet established standards. Vulnerability Management: Oversee the identification and remediation of vulnerabilities across systems. Coordinate vulnerabilityscanning, patching, and remediation efforts with internal teams. Provide leadership in addressing critical vulnerabilities and More ❯
of SIEM preferred. Should have expertise on TCP/IP network traffic and event log analysis. Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerabilityscanning, security tools like Tenable Nessus, Kali Linux. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Experience of infrastructure design and management in mission critical … accountability and ownership. Knowledge of ISO27001, CE, CE+. Key Tasks Security assessments: Create and perform security assessments and threat models. Security standards: Develop, implement & maintain security standards and plans. Vulnerability Management: Research weaknesses and find ways to counter them. Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams. Security software testing: Test More ❯
threats. This hands-on role involves working closely with the IT Service Desk and other internal stakeholders to monitor, investigate, and respond to security events, while also supporting ongoing vulnerability management and compliance activities. Key Responsibilities Monitor and respond to security alerts and incidents using Microsoft Defender XDR and Microsoft Sentinel. Assist with incident response activities, including triage, containment … and root cause analysis. Conduct regular vulnerability assessments, track remediation progress, and support patch management efforts. Collaborate with the IT Service Desk and Infrastructure teams to ensure secure configurations and timely resolution of security issues. Assist with the management and configuration of our e-mail protection, web control and device monitoring platforms. Contribute to threat intelligence analysis and recommend … security role (Service Desk, Infrastructure, or Security Operations). Good knowledge of Microsoft 365 security features, particularly Microsoft Defender and Microsoft Sentinel. Understanding of core cyber security concepts, including vulnerability management, phishing, endpoint protection, and incident response. Familiarity with Windows and macOS operating systems in a business context. Ability to analyse logs, alerts, and events to identify potential threats More ❯
Ipswich, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Bournemouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯