Vulnerability Analyst

Quorum Cyber Edinburgh United Kingdom Security Operations Centre (SOC)

Company Description

At Quorum Cyber we help good people win. Founded in Edinburgh in 2016, our expert team of security analysts, incident responders, forensic specialists, and threat hunters leverage the best Microsoft security technologies to defend organisations worldwide against cyber security breaches and attacks. As a Microsoft-only house we provide a unified security ecosystem, offering a collection of simple, innovative Professional and Managed Security Services, delivered through our own platform Clarity. Our key Managed Security Services include: - Azure Sentinel Security Operations Centre (SOC) and Managed Detection and Response (MDR) - Managed Microsoft Defender - CREST Vulnerability Management - Phishing Protection & Simulation Our Professional Security Services provide a wide range of advisory, risk assessment and compliance solutions, with the aim to help our clients manage exposure to cyber risk over time, increase resilience to business disruption, and achieve measurable returns on investment. We take the weight and pressure of managing security posture, internal IT security skillset and challenges faced with the increase in sophisticated cyber threats.

Our commitment to quality can be evidenced by the growing collection of certifications and accreditations we’ve secured over the years, including Microsoft Gold Partner status, Microsoft Intelligent Security Association (MISA) and CREST Accreditation: Vulnerability Assessments, Penetration Testing and Cyber Security Incident Response. We are proud winners of the Scottish Cyber Awards and Digital Technology Awards for our innovate, in-house built services

Position

what i do is:

  • Perform information system security vulnerability scanning to discover and analyse vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components
  • Be responsible for recommending appropriate remedial actions to mitigate risks and ensure information systems employ appropriate level of information security controls
  • Engage with stakeholders, to include IT professionals, management, and auditors, to facilitate vulnerability discovery and remediation
  • Perform vulnerability management system administration functions in Qualys
  • Maintain proficiency in threat and vulnerability management best practices
  • Proactively review latest scans for new high-level severities within customers environments
  • Host customer triage calls to advise customers on latest vulnerabilities and the remediation steps.
  • Focal point for technical aspects of vulnerability onboarding and offboarding to Qualys platform.
  • Maintain relationships with the customer technical staff to ensure vulnerability scanning is effective and current to their security requirements.

Requirements

i know i have done a great job if:

  • If I can help a customer increase their security posture by addressing their IT infrastructure vulnerabilities
  • I have a great relationship with our customers
  • I’m pushing the boundaries of what we do, thinking and implementing new ways of improving our service
  • I’m one step ahead with vulnerability best practices and am feeding that knowledge into the service
  • I get great feedback from colleagues and customers for the quality of my work, particularly in having designed and implemented solutions that have increased their security posture, while reducing their workload and provided a great user experience

Other information

You will get an excellent salary, with world class benefits (private health, unlimited holidays, flexible working). As leading-edge technology company you will have access to the latest technology, and an environment that will encourage and nurture your curiosity. We are passionate about your learning, and you will be empowered to advance your skills and expertise.

Apply

Already registered? Click here

Not registered? Complete the form

The operating system you are using causes the expiration of the uploaded files within one minute: we recommend you to upload the attachments as the last step before sending the application. Otherwise you will be asked to upload the files every 60 seconds.

Click here (or drag and drop) to Upload a file
doc, docx, txt, rtf, pdf, odt (Max: 2 MB)

GENERAL PRIVACY POLICY FOR THE USERS OF Quorum Cyber

Collection and use of information

Quorum Cyber collects information and data that users choose to provide; Quorum Cyber also collects information related to access of users in order to identify, solve problems and improve offered services.
The purpose of the collection and the use of information are those of the autonomous reporting by candidates towards clients and partners of Quorum Cyber, which are interested in searching and recruiting human resources, through the information of curricula vitae and profiles voluntarily entered by the candidates themselves.

The information that users choose to insert on the Portal will be consulted, used and classified by other individuals/ organizations that can have access, as holders of rights guaranteed by the partnership or customer relationship with Quorum Cyber.
Quorum Cyber performs all necessary operations to ensure that the information are placed in a safe and protected environment, trying to restrict access to the database and distributing rights to users with adequate methods, but can not guarantee that unauthorized individuals/ organizations will not have access through an irregular method.
Quorum Cyber, moreover, can not control the ways in which the authorized users catalog and transfer the information downloaded from the database, therefore it is user's responsibility to ensure that sensitive information are not inserted in Quorum Cyber Portal.
Information provided by the Users are used by Quorum Cyber to deliver offered products and services and to develop the Portal; some of our services may include the display of customized contents and advertising messages.
Quorum Cyber may use the user's information to contact him/ her about Portal updates, to conduct surveys and for informative communications (with the possibility for the user to refuse the consent) and related to its services, including updates of the software used.

Communication of collected information

Quorum Cyber may share information provided by users with third parties that support the delivery of its products and the performance of its services towards the users. These third parties may not use these information for purposes other than assistance and support in providing these products and services.

The information gathered can be shared if this is required by law. The information gathered on our web sites are cataloged in whole or in part in Italy and are subject to Italian law.

Quorum Cyber may disclose or transfer information if its business is sold or acquired.

Management of his/ her own information by the user

The user can review, correct or delete its personal information at any time; to perform these operations, user can enter in his/ her private area, click on the Profile and/ or User Settings button and make all necessary changes.
The above information about the users will be deleted, but logs and other user demographic and statistical information could be kept, maintaining an archived copy of these information anonymously.
If the personal information of the users have been consulted by other individuals/ organizations before the revisions and deletions, Quorum Cyber can not perform the deletion of previous information on their systems.i.

Other relevant information and insights

Please consult the full version of the Privacy Statement and the Privacy Policy for more information. Our sites are not suitable for persons aged under 18 years old.

Contacts

For any further information or details, clarifications and questions about our privacy policy, please contact us by writing an e-mail to  or through the forms in the contact sections of our web site. It is also possible to write us at the following address: Quorum Cyber, , ,  - .

(If you do not accept, your request cannot be processed)
(Fields marked with * are required)