Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
π€ 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

Jobs via eFinancialCareers β’ London, England, United Kingdom
Role & seniority
Stack/tools
Offensive security: penetration testing, red teaming, breach and attack simulation (BAS), bug bounty engagements
Security operations: incident response, red/blue team exercises, threat hunting, SIEM rule tuning, detection engineering
Tooling/automation: security tooling deployment and automation (email security, DLP, SIEM, endpoint protection) via scripting and Infrastructure as Code (IaC)
Tech stack: Windows/Linux/Unix, Kubernetes desirable
Scripting/programming: Python, Bash, PowerShell
CI/CD & cloud: Ansible Tower, Bitbucket, HashiCorp Vault, Pipelines; AWS, Azure
Top 3 responsibilities
Support penetration testing and offensive security activities (red teaming, BAS, bug bounty engagements)
Assist incident response and participate in on-call rota for major incidents
Contribute to red/blue team exercises, threat hunting, SIEM rule tuning, detection engineering; deploy/maintain security tooling using scripting and IaC
Must-have skills
Up to 2 years in IT, security engineering, or DevOps (internships/academic projects OK)
Basic knowledge of ethical hacking/penetration testing; networking and security protocols; Windows/Linux; Kubernetes desirable
Scripting or programming: Python, Bash, PowerShell
Familiarity with CI/CD tools and cloud platforms; SDLC principles
Security tooling: EDR, SIEM, Antivirus
Nice-to-haves
Cyber Threat Analyst (Penetration Testing) β London β Hybrid
A leading financial services client is hiring an entry-level Cyber Threat Analyst to join its Information Security team, with a focus on penetration testing and offensive security.
The Role
Support penetration testing and offensive security activities, including red teaming, breach and attack simulation (BAS), and bug bounty engagements. Assist with incident response and participate in the on-call rota for major incidents. Contribute to red/blue team exercises, threat hunting, SIEM rule tuning, and detection engineering. Help deploy, maintain, and automate security tooling (email security, DLP, SIEM, endpoint protection) using scripting and Infrastructure as Code (IaC).
Required Knowledge And Experience
Up to 2 years of experience in IT, security engineering, or DevOps (internships or academic projects welcome).
Operating systems: Windows, Linux/Unix; Kubernetes desirable
Scripting or programming languages: Python, Bash, PowerShell
CI/CD tools and cloud platforms: e.g. Ansible Tower, Bitbucket, HashiCorp Vault, Pipelines, AWS, Azure Software Development Life Cycle (SDLC) principles
Security tooling: EDR, SIEM, Antivirus
Qualifications / Skills Required
Desirable: University degree or equivalent qualification in a STEM subject (Computer Science, Engineering, or Information Systems).
Desirable: Entry-level security certifications such as CompTIA Security+, Microsoft SC-900, or AWS Cloud Practitioner.
Desirable: Demonstrated activity on TryHackMe, HackTheBox, or OSCP-related / Red Team training platforms (or equivalent).
Desirable: Evidence of contributions on GitHub, showing code samples, tool development, or participation in offensive security projects and repositories.
Personal Qualities
Inquisitive, analytical, and detail-oriented with a genuine passion for security engineering and automation. Strong communicator who thrives in a collaborative, fast-paced environment supporting critical infrastructure.
If youβre keen to kickstart your career in penetration testing and threat analysis within a leading financial services environment, please apply with your CV.