Vulnerability Analyst

All The Top Bananas
London
10 months ago
Applications closed

Related Jobs

View all jobs

Vulnerability Analyst

Vulnerability Analyst

Vulnerability Analyst

Vulnerability Analyst

Network Engineer

Information Security Analyst (Hybrid / Hatfield)

Location(s): UK, Europe & Africa : UK : LondonBAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.Job Title: Vulnerability AnalystLocation: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role.Grade: GG11Referral Bonus: £5000What You'll Be DoingThe Vulnerability Analyst is to manage the identification and analysis of security vulnerabilities and support required remediation across National Highways infrastructure (IT and OT). The Vulnerability Analyst will co-ordinate with various digital teams across NH to ensure all vulnerability are addressed in a timely manner. The Analyst will continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Planning, execution and management of vulnerability assessment and scanning activities across the National Highway's networks, systems, and applications.Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure.Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to guide remediation efforts effectively.Collaborate with 3rd party services suppliers and internal stakeholders to ensure that identified vulnerabilities are patched and remediated in a timely manner.Help establish and improve patch management processes and coordinate with system owners and vendors to ensure patch deployment and validation.Generate comprehensive vulnerability assessment reports and communicate findings to relevant stakeholders, including IT management, System owners and CSO. Clearly articulate the risks associated with identified vulnerabilities and provide recommendations for remediations.Monitor Threat Intel feeds, vulnerabilities databases to proactively identify and respond to new vulnerabilities and attack vector.Support integration of personnel and physical security with the SOC TeamTransition work to SOC Operations teamSkills & Experience Digital vulnerability subject matter expertise and technical knowledge within cyber security.Ability to manage various stakeholders within and outside the company.Ability to make rational, realistic and sound decisions based on good analysis of the full facts and consideration of the different options and outcomes.Ability to communicate effectively and constructively, in a clear and concise manner with key stakeholders.The TeamThe SOC (Security Operation Centre) function exists to facilitate a holistic approach to detecting, responding, and coordinating security events at National Highways. This work is to deliver the SOC Capability Programme which has a primary objective to uplift current capabilities, deliver new capabilities and optimise current services.BenefitsAs well as a competitive pension scheme, BAE Systems also offer employee share plan, an extensive range of flexible discounted health, wellbeing and lifestyle benefits including a green care scheme, private health plans and shopping discounts - you may also be eligible for an annual incentive.Why BAE Systems?This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture which values diversity, rewards integrity and merit, and where you'll be empowered to fulfil your potential. We welcome candidates from all backgrounds and particularly from sections of the community who are currently under-represented within our industry including women, ethnic minorities, people with disabilities and LGBTQ+ individualsWe also want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These restrictions such as your nationality, any nationalities which you previously may have held and your place of birth can restrict the roles you are able to perform within the organisation.All applicants must as a minimum achieve Baseline Personnel Security Standard. Many roles also require higher levels of National Security Vetting where applicants must typically have 5 to 10 years of continuous residency in the UK depending on the vetting level required for the role, to allow for meaningful security vetting checks.Life at BAE Systems Digital IntelligenceWe are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day.By embracing technology, we can interact, collaborate and create together, even when we're working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential.Division overview: GovernmentAt BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Government contracts are an area we have many decades of experience in. Government and key infrastructure networks are critical targets to defend as the effects of these networks being breached can be devastating.As a member of the Government business unit, you will defend the connected world and ensure the protection of nations. We all have a role to play in defending our clients, and this is yours.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.