At a Glance
- Tasks: Lead the vulnerability management lifecycle and ensure security across technology environments.
- Company: Join a high-performing Business Change and Technology team in Birmingham.
- Benefits: Competitive salary, hybrid work model, and opportunities for professional growth.
- Why this job: Make a real impact on organisational security and work with cutting-edge technology.
- Qualifications: Experience in vulnerability management and strong analytical skills required.
- Other info: Dynamic role with excellent career advancement opportunities.
The predicted salary is between 55000 - 65000 £ per year.
Hybrid role – Birmingham on site 2–3 days per week
£65,000 – £75,000 per annum (DOE)
12-Month Fixed Term Contract
We have an exciting opportunity for a Vulnerability Manager to join a high-performing Business Change and Technology function on a 12-month fixed term salaried contract. Reporting into the Information Security Manager, you will be responsible for managing, maintaining, and continuously improving the vulnerability management programme across a complex enterprise technology estate. This includes the identification, assessment, prioritisation, and remediation tracking of security vulnerabilities across on-premises systems, cloud environments, networks, applications, and endpoint devices. This role plays a critical part in ensuring the organisation's technology environment remains secure, resilient, and aligned with internal security policies, legal and regulatory requirements, and industry best practice.
The Opportunity – Vulnerability Manager
- Vulnerability Management & Analysis
Lead the end-to-end vulnerability management lifecycle, including discovery, scanning, validation, prioritisation, reporting, and remediation tracking. Operate and optimise vulnerability scanning platforms (e.g. Microsoft Defender Vulnerability Management, Edgescan, or equivalent). Conduct regular internal and external vulnerability assessments across infrastructure, applications, and cloud environments. Validate and analyse vulnerability data to ensure findings are accurate, contextualised, and relevant to the organisation's operational environment. Identify and assess critical vulnerabilities and zero-day threats, determining when expedited remediation is required. Assess vulnerability severity based on real-world exploitability, considering threat intelligence, exposure, asset criticality, and compensating controls. Maintain a defensible position on exploitable vs non-exploitable vulnerabilities, clearly documenting risk decisions and rationale. Assess and articulate business risk based on exploitability, asset value, and threat intelligence.
- Remediation Coordination
Work closely with internal technical teams and third-party partners to ensure vulnerabilities are remediated within agreed SLAs and risk tolerances. Develop remediation plans, monitor progress, and escalate high-risk issues where necessary. Support patch governance activities, ensuring both routine and emergency patching meets security requirements.
- Security Governance & Compliance
Ensure vulnerability management activities align with internal information security policies, standards, and procedures. Support compliance with relevant regulatory and security frameworks (e.g. GDPR, PCI DSS). Produce regular vulnerability risk reports, dashboards, and KPIs for senior stakeholders. Provide evidence and reporting to support audits, penetration tests, and regulatory reviews.
- Threat Intelligence & Continuous Improvement
Integrate threat intelligence to prioritise remediation of actively exploited or high-risk vulnerabilities. Recommend and drive improvements to tools, processes, automation, and reporting to enhance programme maturity. Stay current with emerging vulnerabilities, zero-day threats, and vendor advisories. Support incident response activities where vulnerabilities are linked to potential security events.
What You'll Bring
- Proven experience in vulnerability management, cyber security operations, or a related technical security role.
- Strong hands-on experience with vulnerability management tooling (e.g. Microsoft Defender Vulnerability Management, Edgescan, or similar).
- Solid understanding of cloud platforms (Azure), operating systems (Windows, Linux), networking, and enterprise technologies.
- Strong knowledge of CVSS scoring, exploit analysis, and risk-based prioritisation.
- Experience working in large, complex enterprise environments.
- Familiarity with regulatory and compliance requirements relevant to vulnerability management.
- Knowledge of SIEM, SOAR, EDR, and associated security tooling.
- Strong analytical skills with the ability to translate technical risk into clear, executive-level reporting.
- Experience supporting incident response and investigations.
- Excellent stakeholder management skills, with the confidence to challenge and influence both technical and non-technical teams.
- Strong understanding of patch management processes and operational constraints in business-critical environments.
- Able to manage multiple competing priorities and make pragmatic, risk-based decisions.
Qualifications
Proven hands-on experience in vulnerability management or cyber security operations. Demonstrable understanding of security principles, standards, and methodologies. One or more of the following certifications preferred: CISM, CISSP, CEH, CompTIA Security, CompTIA CySA, GIAC GVMS.
Vulnerability Manager in Solihull employer: Amtis Professional Ltd
Contact Detail:
Amtis Professional Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Manager in Solihull
✨Tip Number 1
Network like a pro! Attend industry meetups, webinars, or local tech events in Birmingham. It's a great way to meet people in the field and get your name out there. Plus, you never know who might have a lead on that perfect Vulnerability Manager role!
✨Tip Number 2
Show off your skills! Create a personal project or contribute to open-source initiatives related to vulnerability management. This not only sharpens your skills but also gives you something tangible to discuss during interviews. We love seeing passion in action!
✨Tip Number 3
Prepare for those interviews! Research common questions for Vulnerability Managers and practice your responses. Be ready to discuss your experience with tools like Microsoft Defender and how you've handled vulnerabilities in past roles. Confidence is key!
✨Tip Number 4
Apply through our website! We make it super easy to submit your application for the Vulnerability Manager position. Plus, it shows you're genuinely interested in joining our team. Don't miss out on this opportunity!
We think you need these skills to ace Vulnerability Manager in Solihull
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Manager role. Highlight your experience with vulnerability management tools and any relevant certifications. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about vulnerability management and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Achievements: When detailing your experience, focus on specific achievements in your previous roles. Did you improve a vulnerability management process or reduce response times? We love numbers and results, so share those successes with us!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you're keen on joining StudySmarter!
How to prepare for a job interview at Amtis Professional Ltd
✨Know Your Vulnerability Management Tools
Familiarise yourself with the specific vulnerability management tools mentioned in the job description, like Microsoft Defender and Edgescan. Be ready to discuss your hands-on experience with these platforms and how you've used them to manage vulnerabilities effectively.
✨Understand the Business Impact
Prepare to articulate how vulnerabilities can affect business operations. Think about real-world examples where you assessed risk based on exploitability and asset value, and be ready to explain your decision-making process in prioritising remediation efforts.
✨Showcase Your Stakeholder Management Skills
This role requires excellent stakeholder management. Prepare examples of how you've successfully collaborated with technical teams and non-technical stakeholders to remediate vulnerabilities. Highlight your ability to influence decisions and communicate complex information clearly.
✨Stay Current with Threat Intelligence
Demonstrate your knowledge of emerging vulnerabilities and zero-day threats. Discuss how you integrate threat intelligence into your vulnerability management processes and any improvements you've driven in your previous roles to enhance programme maturity.