Cyber Threat Specialist (Penetration Tester) in London

Cyber Threat Specialist (Penetration Tester) in London

London Full-Time 28800 - 48000 ÂŁ / year (est.) No home office possible
H

At a Glance

  • Tasks: Join our team to conduct penetration testing and enhance security for LME systems.
  • Company: Be part of Hong Kong Exchanges and Clearing Limited, a leader in financial markets.
  • Benefits: Enjoy a competitive salary, professional development, and a supportive work environment.
  • Why this job: Kickstart your career in cybersecurity and make a real impact on system security.
  • Qualifications: Ideal for recent grads with a passion for ethical hacking and security engineering.
  • Other info: Diverse workplace committed to continuous learning and growth opportunities.

The predicted salary is between 28800 - 48000 ÂŁ per year.

Overall Purpose of Role: This role is an entry-level position within the Information Security team at the London Metal Exchange (LME). This role will be a junior member of the penetration testing team to conduct penetration testing of LME systems and applications. Penetration testing will include scoping, performing assessments, identifying vulnerabilities, documenting technical exploitation steps, and providing recommendations and remediations. The successful candidate will work closely with IT Engineering, Security Operations, and Infrastructure teams to ensure that security controls are effectively implemented and maintained across LME’s platforms.

Shift Pattern: Standard 40 Hour Week (United Kingdom)

Scheduled Weekly Hours: 40

Corporate Grade: E - Associate

Reporting Line: (UK Division) Information Technology

Location: UK-London

Worker Type: Permanent

Key Responsibilities

  • Participate in offensive assessments (red team, penetration testing, breach and attack simulation, bug bounty) and defensive security operations (threat hunting, incident handling, investigation and forensics, detection engineering) for LME systems and infrastructure;
  • Support security incidents and act as stretch capacity for incident response and threat handling;
  • Participate with on‑call duties and after‑hours support of incident management for incident escalations;
  • Participate in Red/Blue Team testing, identify gaps/weaknesses in monitoring capabilities and recommend/implement changes;
  • Review intelligence feeds and generate advisories as needed. Stay up‑to‑date with current and emerging trends that represent a threat to LME;
  • Support threat hunting based on the defined threat model and specific attack scenarios. Perform analysis of existing data to discover patterns, and build use cases to detect malicious activity;
  • Optimise detection and response rules; Support the testing and recertify SIEM rules against threat models and detection frameworks;
  • Assist in the deployment and maintenance of security tools and platforms (e.g., E‑Mail Security, DLP, SIEM, Endpoint Protection).
  • Develop and support the automation of security tools, configuration, and updates using scripting (e.g. Python, PowerShell, Bash, NPM).
  • Contribute to Infrastructure as Code (IaC) efforts using Terraform or Ansible.
  • Help monitor and maintain secure configurations across Windows, Linux, and Kubernetes environments.
  • Provide support for incident response and troubleshooting related to security tooling and access controls.
  • Provide support for Red/Blue team testing and penetration testing.
  • Help maintain documentation, standards, and procedures related to security engineering and platform protection.
  • Participate in on‑call and weekend support rotations as needed.

Qualifications / Skills Required

  • Desirable: A University degree or equivalent qualifications in a STEM subject such as Computer Science, or Engineering and/or Information Systems.
  • Desirable: Entry‑level certifications such as CompTIA Security+, Microsoft SC‑900, or AWS Cloud Practitioner.
  • Activity on TryHackMe, HackTheBox, and OSCP‑related / Red Team training (or some equivalent the named platforms).
  • Demonstrable activity on Github showing code, tools development, and/or contributing to projects and repos in the offensive security space.
  • Up to 2 years of experience in IT, security engineering, or DevOps (internships or academic projects included).
  • Basic understanding of Ethical Hacking & Penetration Testing.
  • Networking and security protocols (TCP/IP, HTTPS, DNS, Firewalls, Proxy).
  • Operating systems (Windows, Linux/Unix, Kubernetes).
  • Scripting or programming (Python, Bash, PowerShell).
  • CI/CD tools and cloud platforms (e.g., Ansible Tower, Bitbucket, Hashicorp Vault, Pipelines, AWS, Azure).
  • Working knowledge of SDLC.
  • Security Tooling (e.g. EDR, SIEM, Antivirus).

Personal Qualities

  • Curiosity about emerging threats and technologies.
  • Ability to assess and prioritize tasks/risks.
  • Attention to detail.
  • Enthusiastic about security engineering and automation.
  • Strong analytical and problem‑solving skills.
  • Effective communicator with good documentation habits.
  • Team‑oriented, proactive, and adaptable in a fast‑paced environment.
  • Willingness to learn and grow within a critical infrastructure environment.
  • Commitment to continuous learning.

The LME is committed to creating a diverse environment and is proud to be an equal opportunity employer. In recruiting for our teams, we welcome the unique contributions that you can bring in terms of education, ethnicity, race, sex, gender identity, expression and reassignment, nation of origin, age, languages spoken, colour, religion, disability, sexual orientation and beliefs. In doing so, we want every LME employee to feel our commitment to showing respect for all and encouraging open collaboration and communication.

Seniority level: Entry level

Employment type: Full‑time

Job function: Information Technology

Cyber Threat Specialist (Penetration Tester) in London employer: Hong Kong Exchanges and Clearing Limited (HKEX)

At Hong Kong Exchanges and Clearing Limited (HKEX), we pride ourselves on fostering a dynamic and inclusive work culture that empowers our employees to thrive. As a Cyber Threat Specialist (Penetration Tester) in London, you will benefit from comprehensive training and development opportunities, ensuring your growth in the fast-evolving field of cybersecurity. Our commitment to diversity and collaboration creates a supportive environment where every team member's unique contributions are valued, making HKEX an exceptional place to build a meaningful career.
H

Contact Detail:

Hong Kong Exchanges and Clearing Limited (HKEX) Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Threat Specialist (Penetration Tester) in London

✨Tip Number 1

Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your penetration testing projects, whether they're from internships, personal projects, or even challenges from platforms like TryHackMe or HackTheBox. This will give potential employers a taste of what you can do.

✨Tip Number 3

Prepare for interviews by brushing up on common penetration testing scenarios and tools. Practice explaining your thought process when tackling security challenges, as this will demonstrate your analytical skills and problem-solving abilities.

✨Tip Number 4

Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it makes it easier for us to keep track of your application and get back to you quickly.

We think you need these skills to ace Cyber Threat Specialist (Penetration Tester) in London

Penetration Testing
Vulnerability Assessment
Incident Response
Threat Hunting
Scripting (Python, PowerShell, Bash)
Security Tooling (EDR, SIEM, Antivirus)
Networking and Security Protocols (TCP/IP, HTTPS, DNS)
Operating Systems (Windows, Linux/Unix, Kubernetes)
Infrastructure as Code (Terraform, Ansible)
CI/CD Tools (Ansible Tower, Bitbucket, AWS, Azure)
Analytical Skills
Attention to Detail
Effective Communication
Team Collaboration
Curiosity about Emerging Threats

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Specialist role. Highlight any relevant experience, skills, and projects that align with penetration testing and security assessments. We want to see how you fit into our team!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your enthusiasm for the role and the company. Share why you're passionate about cybersecurity and how your background makes you a great fit for us.

Show Off Your Skills: Don’t forget to mention any hands-on experience you have with tools like Python, Bash, or any penetration testing platforms. If you've done any projects on GitHub, let us know! We love seeing practical applications of your skills.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets to the right people. Plus, it shows us you’re serious about joining our team!

How to prepare for a job interview at Hong Kong Exchanges and Clearing Limited (HKEX)

✨Know Your Stuff

Make sure you brush up on your knowledge of penetration testing and ethical hacking. Familiarise yourself with common tools and techniques used in the field, like those from TryHackMe or HackTheBox. Being able to discuss specific examples from your experience will show that you're not just a theory buff but someone who can apply their knowledge practically.

✨Show Off Your Projects

If you've got any projects on GitHub or similar platforms, be ready to talk about them! Highlight your contributions to security tools or any coding you've done in Python or PowerShell. This is a great way to demonstrate your hands-on skills and passion for the field.

✨Ask Smart Questions

Prepare some insightful questions about the company's security practices or the technologies they use. This shows that you're genuinely interested in the role and have done your homework. Plus, it gives you a chance to assess if the company is the right fit for you!

✨Be Ready for Scenario-Based Questions

Expect to face scenario-based questions where you'll need to demonstrate your problem-solving skills. Think about how you would handle specific security incidents or vulnerabilities. Practising these types of questions can help you articulate your thought process clearly during the interview.

Cyber Threat Specialist (Penetration Tester) in London
Hong Kong Exchanges and Clearing Limited (HKEX)
Location: London

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

H
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>