Vulnerability Analyst

All The Top Bananas
London
3 weeks ago
Create job alert

Location(s): UK, Europe & Africa : UK : LondonBAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.Job Title: Vulnerability AnalystLocation: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role.Grade: GG11Referral Bonus: £5000What You'll Be DoingThe Vulnerability Analyst is to manage the identification and analysis of security vulnerabilities and support required remediation across National Highways infrastructure (IT and OT). The Vulnerability Analyst will co-ordinate with various digital teams across NH to ensure all vulnerability are addressed in a timely manner. The Analyst will continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Planning, execution and management of vulnerability assessment and scanning activities across the National Highway's networks, systems, and applications.Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure.Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to guide remediation efforts effectively.Collaborate with 3rd party services suppliers and internal stakeholders to ensure that identified vulnerabilities are patched and remediated in a timely manner.Help establish and improve patch management processes and coordinate with system owners and vendors to ensure patch deployment and validation.Generate comprehensive vulnerability assessment reports and communicate findings to relevant stakeholders, including IT management, System owners and CSO. Clearly articulate the risks associated with identified vulnerabilities and provide recommendations for remediations.Monitor Threat Intel feeds, vulnerabilities databases to proactively identify and respond to new vulnerabilities and attack vector.Support integration of personnel and physical security with the SOC TeamTransition work to SOC Operations teamSkills & Experience Digital vulnerability subject matter expertise and technical knowledge within cyber security.Ability to manage various stakeholders within and outside the company.Ability to make rational, realistic and sound decisions based on good analysis of the full facts and consideration of the different options and outcomes.Ability to communicate effectively and constructively, in a clear and concise manner with key stakeholders.The TeamThe SOC (Security Operation Centre) function exists to facilitate a holistic approach to detecting, responding, and coordinating security events at National Highways. This work is to deliver the SOC Capability Programme which has a primary objective to uplift current capabilities, deliver new capabilities and optimise current services.BenefitsAs well as a competitive pension scheme, BAE Systems also offer employee share plan, an extensive range of flexible discounted health, wellbeing and lifestyle benefits including a green care scheme, private health plans and shopping discounts - you may also be eligible for an annual incentive.Why BAE Systems?This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture which values diversity, rewards integrity and merit, and where you'll be empowered to fulfil your potential. We welcome candidates from all backgrounds and particularly from sections of the community who are currently under-represented within our industry including women, ethnic minorities, people with disabilities and LGBTQ+ individualsWe also want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These restrictions such as your nationality, any nationalities which you previously may have held and your place of birth can restrict the roles you are able to perform within the organisation.All applicants must as a minimum achieve Baseline Personnel Security Standard. Many roles also require higher levels of National Security Vetting where applicants must typically have 5 to 10 years of continuous residency in the UK depending on the vetting level required for the role, to allow for meaningful security vetting checks.Life at BAE Systems Digital IntelligenceWe are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day.By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential.Division overview: GovernmentAt BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Government contracts are an area we have many decades of experience in. Government and key infrastructure networks are critical targets to defend as the effects of these networks being breached can be devastating.As a member of the Government business unit, you will defend the connected world and ensure the protection of nations. We all have a role to play in defending our clients, and this is yours.

Related Jobs

View all jobs

Vulnerability Analyst (OT)

Vulnerability Analyst (OT)

Vulnerability Analyst (OT) (Portsmouth)

Vulnerability Analyst

Vulnerability Analyst - OT

Vulnerability Analyst (OT)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.

Cyber Security Jobs at Newly Funded UK Start-ups: Q3 2025 Investment Tracker

Cyber security is no longer just a topic for tech-savvy professionals—it’s an essential pillar of every modern organisation. From protecting sensitive customer data to thwarting state-sponsored attacks, cyber security teams play a crucial role in safeguarding digital infrastructures across all sectors. In the UK, cyber security innovation is thriving, fuelled by a fertile mix of venture capital, government backing, and an ever-growing pool of talented specialists. Now, in the third quarter of 2025, we’ve seen a fresh influx of funding for cyber security start-ups that are poised to shape the industry’s future. This Q3 2025 Investment Tracker highlights newly funded UK-based cyber security start-ups, their core offerings, and—most importantly—the wide range of job opportunities they’re creating. Whether you’re a veteran security analyst, a pen tester, or a newcomer eager to explore the defensive side of tech, these start-ups are actively seeking professionals to help drive their next phase of growth. We’ll also guide you through the essential skills in demand, strategies to secure a role, and how to leverage CyberSecurityJobs.tech to fast-track your job search.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.