Vulnerability Analyst

Cyber Security training courses
London
1 month ago
Applications closed

Related Jobs

View all jobs

Vulnerability Analyst

Vulnerability Analyst

Vulnerability Analyst

Vulnerability Analyst

Network Engineer

Cybersecurity Analyst


Location(s): UK, Europe & Africa: UK: London || UK, Europe & Africa: UK: Leeds


BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.


Job Title: Vulnerability Analyst


Requisition ID: 122575


Location: London—We offer a range of hybrid and flexible working arrangements—please speak to your recruiter about the options for this particular role.


Grade: GG10


Referral Bonus: £5,000


SOC Vulnerability Analyst


Role description

To undertake the day‑to‑day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK CNI organisation. The networks protected are predominantly hosted in Azure cloud platforms, with many systems within these environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to.


These roles require a minimum of SC clearance. Due to timelines for the start of operations, it will not be possible to sponsor new clearances so candidates must have existing clearances.


Responsibilities

  • Own and manage the Vulnerability Assessment platforms, configuring the toolset for appropriate analysis schedule (with assistance from the SOC Engineering team for underlying hosting/operational support), triage and management of output vulnerability data from both internal scanning and external attack surface management.
  • Gather and maintain a set of VA requirements that define the threats that will be monitored and tracked.
  • Undertake Vulnerability Management, managing the priorities related to the data from Vulnerability Assessment as well as collation and management of wider vulnerability exposure (zero days, environmental (business, operation etc) threats, architectural and legacy threats, etc) to advocate for responsible short and long‑term mitigations that may include patching, IT change and SIEM detection content requirements.
  • Ensure the business is responsive to changing threat profiles and be the voice of operational vulnerability risk mitigation in the prioritisation of SOC resource effort, including reporting/dashboarding as necessary.

Requirements

  • Working in a SOC team developing vulnerability insight for technical and non‑technical audiences.
  • Experience of Microsoft Defender Vulnerability Management and Microsoft Defender External Attack Surface Management highly beneficial.
  • Conducting threat assessments and defining threat intelligence requirements beneficial.
  • Good knowledge of Windows and Linux operating systems and use of the command line.
  • Good knowledge of core networking concepts and technologies e.g. TCP/IP.
  • Some knowledge of malware behaviour and techniques employed by attackers to evade security controls.
  • Client side consulting, including stakeholder engagement and the ability to communicate insights and concepts to others (including briefing skills and report writing).
  • Able to understand and adapt to different cultures and hierarchical structures.
  • Team player and adept at working in multi‑disciplinary and diverse teams.
  • Proven analytical skills capable of solving new and complex technical problems.
  • Excellent written and verbal communication skills with the ability to communicate the impact and importance of detailed technical information to non‑technical and senior audiences.
  • Leading and managing small teams of highly skilled technical people.
  • Managing and building relationships with customer and internal stakeholders.
  • Self‑motivated and motivates others keeping morale and performance high.

Why BAE Systems

This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture that values diversity, rewards integrity and merit, and where you'll be empowered to fulfil your potential. We welcome candidates from all backgrounds and particularly from sections of the community who are currently underrepresented within our industry, including women, ethnic minorities, people with disabilities and LGBTQ+ individuals.


We also want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.


PLEASE NOTE: You're expected to have completed 12 months in role prior to applying for an advertised vacancy and you should also discuss the internal opportunity with your line manager to ensure sustained business continuity and to further support your career development. We know there may be individual circumstances that impact this, so please discuss this with your line manager or HR Business Partner (HRBP). If you don't feel you can talk to your line manager, you can contact your HRBP.


Should you be invited for interview, you will be giving consent for the Recruitment team to contact you and your line manager regarding your application for this opportunity.


This vacancy is eligible for the UK Employee Referral Scheme. Amount: £5,000.


Life at BAE Systems Digital Intelligence

We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day.


By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well‑being.


Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds – the best and brightest minds – can work together to achieve excellence and realise individual and organisational potential.


Division overview: Government

At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Government contracts are an area we have many decades of experience in. Government and key infrastructure networks are critical targets to defend as the effects of these networks being breached can be devastating.


As a member of the Government business unit, you will defend the connected world and ensure the protection of nations. We all have a role to play in defending our clients, and this is yours.



#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.