At a Glance
- Tasks: Join our team to conduct penetration testing and enhance security for our systems.
- Company: Be part of the London Metal Exchange, a leader in global financial markets.
- Benefits: Enjoy a competitive salary, health benefits, and opportunities for professional growth.
- Why this job: Kickstart your career in cybersecurity and make a real impact on protecting vital systems.
- Qualifications: Ideal for recent grads or those with entry-level experience in IT or security.
- Other info: Dynamic work environment with a commitment to diversity and continuous learning.
The predicted salary is between 28800 - 43200 Β£ per year.
This role is an entry-level position within the Information Security team at the London Metal Exchange (LME). This role will be a junior member of the penetration testing team to conduct penetration testing of LME systems and applications. Penetration testing will include scoping, performing assessments, identifying vulnerabilities, documenting technical exploitation steps, and providing recommendations and remediations.
The successful candidate will work closely with IT Engineering, Security Operations, and Infrastructure teams to ensure that security controls are effectively implemented and maintained across LMEβs platforms.
Key Responsibilities:- Participate in offensive assessments (red team, penetration testing, breach and attack simulation, bug bounty) and defensive security operations (threat hunting, incident handling, investigation and forensics, detection engineering) for LME systems and infrastructure;
- Support security incidents and act as stretch capacity for incident response and threat handling; Participate with on-call duties and after-hours support of incident management for incident escalations;
- Participate in Red/Blue Team testing, identify gaps/weaknesses in monitoring capabilities and recommend/implement changes;
- Review intelligence feeds and generate advisories as needed. Stay up-to-date with current and emerging trends that represent a threat to LME;
- Support threat hunting based on the defined threat model and specific attack scenarios. Perform analysis of existing data to discover patterns, and build use cases to detect malicious activity;
- Optimise detection and response rules; Support the testing and recertify SIEM rules against threat models and detection frameworks;
- Assist in the deployment and maintenance of security tools and platforms (e.g., E-Mail Security, DLP, SIEM, Endpoint Protection).
- Develop and support the automation of security tools, configuration, and updates using scripting (e.g. Python, PowerShell, Bash, NPM).
- Contribute to Infrastructure as Code (IaC) efforts using Terraform or Ansible.
- Help monitor and maintain secure configurations across Windows, Linux, and Kubernetes environments.
- Provide support for incident response and troubleshooting related to security tooling and access controls.
- Provide support for Red/Blue team testing and penetration testing.
- Help maintain documentation, standards, and procedures related to security engineering and platform protection.
- Participate in on-call and weekend support rotations as needed.
- Desirable: A University degree or equivalent qualifications in a STEM subject such as Computer Science, or Engineering and/or Information Systems.
- Desirable: Entry-level certifications such as CompTIA Security+, Microsoft SC-900, or AWS Cloud Practitioner.
- Activity on TryHackMe, HackTheBox, and OSCP-related / Red Team training (or some equivalent the named platforms).
- Demonstrable activity on Github showing code, tools development, and/or contributing to projects and repos in the offensive security space.
- Up to 2 years of experience in IT, security engineering, or DevOps (internships or academic projects included).
- Basic understanding of: Ethical Hacking & Penetration Testing, Networking and security protocols (TCP/IP, HTTPS, DNS, Firewalls, Proxy), Operating systems (Windows, Linux/Unix, Kubernetes), Scripting or programming (Python, Bash, PowerShell), CI/CD tools and cloud platforms (e.g., Ansible Tower, Bitbucket, Hashicorp Vault, Pipelines, AWS, Azure), Working knowledge of SDLC, Security Tooling (e.g. EDR, SIEM, Antivirus).
- Curiosity about emerging threats and technologies.
- Ability to assess and prioritize tasks/risks.
- Attention to detail.
- Enthusiastic about security engineering and automation.
- Strong analytical and problem-solving skills.
- Effective communicator with good documentation habits.
- Team-oriented, proactive, and adaptable in a fast-paced environment.
- Willingness to learn and grow within a critical infrastructure environment.
- Commitment to continuous learning.
The LME is committed to creating a diverse environment and is proud to be an equal opportunity employer. In recruiting for our teams, we welcome the unique contributions that you can bring in terms of education, ethnicity, race, sex, gender identity, expression and reassignment, nation of origin, age, languages spoken, colour, religion, disability, sexual orientation and beliefs. In doing so, we want every LME employee to feel our commitment to showing respect for all and encouraging open collaboration and communication.
Cyber Threat Specialist (Penetration Tester) in London employer: Hong Kong Exchanges
Contact Detail:
Hong Kong Exchanges Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Cyber Threat Specialist (Penetration Tester) in London
β¨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.
β¨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects, whether they're from internships, personal projects, or even challenges from platforms like TryHackMe or HackTheBox. This will give potential employers a taste of what you can do.
β¨Tip Number 3
Prepare for interviews by brushing up on common penetration testing scenarios and tools. Practice explaining your thought process during assessments, as interviewers love to see how you tackle problems and think critically.
β¨Tip Number 4
Don't forget to apply through our website! We make it easy for you to find roles that match your skills and interests. Plus, it shows you're genuinely interested in joining our team!
We think you need these skills to ace Cyber Threat Specialist (Penetration Tester) in London
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Specialist role. Highlight any relevant experience, skills, and projects that align with penetration testing and security assessments. We want to see how you fit into our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for the role. Donβt forget to mention any hands-on experience with tools like Python or Bash.
Show Off Your Projects: If you've got any projects on GitHub or have participated in platforms like TryHackMe or HackTheBox, make sure to include them! We love seeing practical examples of your skills and your enthusiasm for learning.
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way to ensure your application gets into the right hands. Plus, it shows us youβre serious about joining our team at StudySmarter!
How to prepare for a job interview at Hong Kong Exchanges
β¨Know Your Stuff
Make sure you brush up on your knowledge of penetration testing and ethical hacking. Familiarise yourself with common tools and techniques used in the field, as well as the latest trends in cybersecurity. Being able to discuss these topics confidently will show that you're genuinely interested and knowledgeable.
β¨Show Off Your Projects
If you've done any relevant projects, whether through internships or personal initiatives, be ready to talk about them. Highlight your contributions, the challenges you faced, and how you overcame them. If you have a GitHub profile, mention it! This is a great way to demonstrate your skills and passion for security engineering.
β¨Ask Smart Questions
Prepare some insightful questions to ask during the interview. This could be about the teamβs current projects, the tools they use, or their approach to threat hunting. Asking thoughtful questions not only shows your interest but also helps you gauge if the company is the right fit for you.
β¨Be Ready for Technical Challenges
Expect some technical questions or even practical tests related to penetration testing. Brush up on your scripting skills and be prepared to solve problems on the spot. Practising on platforms like TryHackMe or HackTheBox can help you get into the right mindset and improve your problem-solving abilities.