Vulnerability Manager in Birmingham

Vulnerability Manager in Birmingham

Birmingham Full-Time 55000 - 65000 ÂŁ / year (est.) No home office possible
A

At a Glance

  • Tasks: Lead vulnerability management lifecycle and ensure security across enterprise technology.
  • Company: Dynamic tech company focused on business change and technology.
  • Benefits: Competitive salary, hybrid work model, and professional development opportunities.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
  • Qualifications: Experience in vulnerability management and strong analytical skills required.
  • Other info: Join a high-performing team with excellent career growth potential.

The predicted salary is between 55000 - 65000 ÂŁ per year.

The following information provides an overview of the skills, qualities, and qualifications needed for this role.

Hybrid role – Birmingham on site 2–3 days per week

£65,000 – £75,000 per annum (DOE)

12‑Month Fixed Term Contract

We have an exciting opportunity for a Vulnerability Manager to join a high‑performing Business Change and Technology function on a 12‑month fixed term salaried contract. Reporting into the Information Security Manager, you will be responsible for managing, maintaining, and continuously improving the vulnerability management programme across a complex enterprise technology estate. This includes the identification, assessment, prioritisation, and remediation tracking of security vulnerabilities across on‑premises systems, cloud environments, networks, applications, and endpoint devices. This role plays a critical part in ensuring the organisation’s technology environment remains secure, resilient, and aligned with internal security policies, legal and regulatory requirements, and industry best practice.

The Opportunity – Vulnerability Manager

  • Vulnerability Management & Analysis
    • Lead the end‑to‑end vulnerability management lifecycle, including discovery, scanning, validation, prioritisation, reporting, and remediation tracking.
    • Operate and optimise vulnerability scanning platforms (e.g. Microsoft Defender Vulnerability Management, Edgescan, or equivalent).
    • Conduct regular internal and external vulnerability assessments across infrastructure, applications, and cloud environments.
    • Validate and analyse vulnerability data to ensure findings are accurate, contextualised, and relevant to the organisation’s operational environment.
    • Identify and assess critical vulnerabilities and zero‑day threats, determining when expedited remediation is required.
    • Assess vulnerability severity based on real‑world exploitability, considering threat intelligence, exposure, asset criticality, and compensating controls.
    • Maintain a defensible position on exploitable vs non‑exploitable vulnerabilities, clearly documenting risk decisions and rationale.
    • Assess and articulate business risk based on exploitability, asset value, and threat intelligence.
  • Remediation Coordination
    • Work closely with internal technical teams and third‑party partners to ensure vulnerabilities are remediated within agreed SLAs and risk tolerances.
    • Develop remediation plans, monitor progress, and escalate high‑risk issues where necessary.
    • Support patch governance activities, ensuring both routine and emergency patching meets security requirements.
  • Security Governance & Compliance
    • Ensure vulnerability management activities align with internal information security policies, standards, and procedures.
    • Support compliance with relevant regulatory and security frameworks (e.g. GDPR, PCI DSS).
    • Produce regular vulnerability risk reports, dashboards, and KPIs for senior stakeholders.
    • Provide evidence and reporting to support audits, penetration tests, and regulatory reviews.
  • Threat Intelligence & Continuous Improvement
    • Integrate threat intelligence to prioritise remediation of actively exploited or high‑risk vulnerabilities.
    • Recommend and drive improvements to tools, processes, automation, and reporting to enhance programme maturity.
    • Stay current with emerging vulnerabilities, zero‑day threats, and vendor advisories.
    • Support incident response activities where vulnerabilities are linked to potential security events.

What You’ll Bring

  • Proven experience in vulnerability management, cyber security operations, or a related technical security role.
  • Strong hands‑on experience with vulnerability management tooling (e.g. Microsoft Defender Vulnerability Management, Edgescan, or similar).
  • Solid understanding of cloud platforms (Azure), operating systems (Windows, Linux), networking, and enterprise technologies.
  • Strong knowledge of CVSS scoring, exploit analysis, and risk‑based prioritisation.
  • Experience working in large, complex enterprise environments.
  • Familiarity with regulatory and compliance requirements relevant to vulnerability management.
  • Knowledge of SIEM, SOAR, EDR, and associated security tooling.
  • Strong analytical skills with the ability to translate technical risk into clear, executive‑level reporting.
  • Experience supporting incident response and investigations.
  • Excellent stakeholder management skills, with the confidence to challenge and influence both technical and non‑technical teams.
  • Strong understanding of patch management processes and operational constraints in business‑critical environments.
  • Able to manage multiple competing priorities and make pragmatic, risk‑based decisions.

Qualifications

  • Proven hands‑on experience in vulnerability management or cyber security operations.
  • Demonstrable understanding of security principles, standards, and methodologies.
  • One or more of the following certifications preferred: CISM, CISSP, CEH, CompTIA Security+, CompTIA CySA+, GIAC GVMS.

Vulnerability Manager in Birmingham employer: Amtis Professional Ltd

Join a dynamic and innovative team as a Vulnerability Manager in Birmingham, where you will play a pivotal role in enhancing our security posture within a supportive and collaborative work environment. We offer competitive salaries, opportunities for professional development, and a hybrid working model that promotes work-life balance. Our commitment to employee growth and a culture of continuous improvement makes us an exceptional employer for those seeking meaningful and rewarding careers in cybersecurity.
A

Contact Detail:

Amtis Professional Ltd Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Vulnerability Manager in Birmingham

✨Tip Number 1

Network like a pro! Attend industry meetups, webinars, or local tech events. It's all about making connections and getting your name out there. You never know who might have the inside scoop on job openings!

✨Tip Number 2

Show off your skills! Create a personal project or contribute to open-source initiatives related to vulnerability management. This not only boosts your portfolio but also demonstrates your passion and expertise in the field.

✨Tip Number 3

Prepare for interviews by practising common questions and scenarios specific to vulnerability management. We recommend doing mock interviews with friends or using online platforms to get comfortable with articulating your experience.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive and engaged with our platform.

We think you need these skills to ace Vulnerability Manager in Birmingham

Vulnerability Management
Cyber Security Operations
Vulnerability Scanning Tools
Microsoft Defender Vulnerability Management
Edgescan
Cloud Platforms (Azure)
Operating Systems (Windows, Linux)
Networking
CVSS Scoring
Exploit Analysis
Risk-Based Prioritisation
Regulatory Compliance (GDPR, PCI DSS)
SIEM
SOAR
EDR
Stakeholder Management

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Vulnerability Manager role. Highlight your experience with vulnerability management tools and any relevant certifications. We want to see how your skills align with what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about vulnerability management and how your background makes you a great fit for our team. Keep it concise but impactful!

Showcase Your Achievements: When detailing your experience, focus on specific achievements in your previous roles. Did you improve a vulnerability management process or reduce response times? We love numbers and results, so share those successes with us!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you're keen on joining our team at StudySmarter!

How to prepare for a job interview at Amtis Professional Ltd

✨Know Your Vulnerability Management Tools

Familiarise yourself with the specific vulnerability management tools mentioned in the job description, like Microsoft Defender Vulnerability Management or Edgescan. Be ready to discuss your hands-on experience with these tools and how you've used them to manage vulnerabilities effectively.

✨Understand the Business Impact

Prepare to articulate how vulnerabilities can impact business operations. Think about real-world examples where you assessed risk based on exploitability and asset value. This will show that you can translate technical risks into business language, which is crucial for stakeholder management.

✨Stay Current with Threat Intelligence

Research recent vulnerabilities and zero-day threats relevant to the industry. Being able to discuss current trends and how they might affect the organisation will demonstrate your proactive approach and commitment to continuous improvement in vulnerability management.

✨Prepare for Scenario-Based Questions

Expect scenario-based questions where you'll need to demonstrate your problem-solving skills. Think of situations where you had to coordinate remediation efforts or manage competing priorities. Use the STAR method (Situation, Task, Action, Result) to structure your responses clearly.

Vulnerability Manager in Birmingham
Amtis Professional Ltd
Location: Birmingham

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

A
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>