At a Glance
- Tasks: Lead the vulnerability management lifecycle and optimise scanning platforms.
- Company: Dynamic tech firm in Birmingham with a focus on security.
- Benefits: Competitive salary, hybrid work model, and professional development opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: Experience in vulnerability management and strong analytical skills required.
- Other info: Join a collaborative team with excellent career growth potential.
The predicted salary is between 60000 - 84000 Β£ per year.
Overview: Hybrid role, Birmingham on site 2-3 days per week. Salary: Β£70,000 - Β£80,000 per annum (DOE). 12-Month Fixed Term Contract. Reporting into the Information Security Manager, you will be responsible for managing, maintaining, and continuously improving the vulnerability management programme across a complex enterprise technology estate. This includes the identification, assessment, prioritisation, and remediation tracking of security vulnerabilities across on-premises systems, cloud environments, networks, applications, and endpoint devices.
The Opportunity:
- Vulnerability Management & Analysis: Lead the end-to-end vulnerability management lifecycle, including discovery, scanning, validation, prioritisation, reporting, and remediation tracking. Operate and optimise vulnerability scanning platforms (e.g. Microsoft Defender Vulnerability Management, Edgescan, or equivalent). Conduct regular internal and external vulnerability assessments across infrastructure, applications, and cloud environments. Validate and analyse vulnerability data to ensure findings are accurate, contextualised, and relevant to the organisation's operating environment. Identify and assess critical vulnerabilities and zero-day threats, determining when expedited remediation is required. Assess vulnerability severity based on real-world exploitability, considering threat intelligence, exposure, asset criticality, and compensating controls. Maintain a defensible position on exploitable vs non-exploitable vulnerabilities, clearly documenting risk decisions and rationale. Assess and articulate business risk based on exploitability, asset value, and threat intelligence.
- Remediation Coordination: Work closely with internal technical teams and third-party partners to ensure vulnerabilities are remediated within agreed SLAs and risk tolerances. Develop remediation plans, monitor progress, and escalate high-risk issues where necessary. Support patch governance activities, ensuring both routine and emergency patching meets security requirements.
- Security Governance & Compliance: Ensure vulnerability management activities align with internal information security policies, standards, and procedures. Support compliance with relevant regulatory and security frameworks (e.g. GDPR, PCI DSS). Produce regular vulnerability risk reports, dashboards, and KPIs for senior stakeholders. Provide evidence and reporting to support audits, penetration tests, and regulatory reviews.
- Threat Intelligence & Continuous Improvement: Integrate threat intelligence to prioritise remediation of actively exploited or high-risk vulnerabilities. Recommend and drive improvements to tools, processes, automation, and reporting to enhance programme maturity. Stay current with emerging vulnerabilities, zero-day threats, and vendor advisories. Support incident response activities where vulnerabilities are linked to potential security events.
What You'll Bring:
- Proven experience in vulnerability management, cyber security operations, or a related technical security role.
- Strong hands-on experience with vulnerability management tooling (e.g. Microsoft Defender Vulnerability Management, Edgescan, or similar).
- Solid understanding of cloud platforms (Azure), operating systems (Windows, Linux), networking, and enterprise technologies.
- Strong knowledge of CVSS scoring, exploit analysis, and risk-based prioritisation.
- Experience working in large, complex enterprise environments.
- Familiarity with regulatory and compliance requirements relevant to vulnerability management.
- Knowledge of SIEM, SOAR, EDR, and associated security tooling.
- Strong analytical skills with the ability to translate technical risk into clear, executive-level reporting.
- Experience supporting incident response and investigations.
- Excellent stakeholder management skills, with the confidence to challenge and influence both technical and non-technical teams.
- Strong understanding of patch management processes and operational constraints in business-critical environments.
- Able to manage multiple competing priorities and make pragmatic, risk-based decisions.
Qualifications:
- Proven hands-on experience in vulnerability management or cyber security operations.
- Demonstrable understanding of security principles, standards, and methodologies.
- One or more of the following certifications preferred: CISM, CISSP, CEH, CompTIA Security+, CompTIA CySA+, GIAC GVMS.
Vulnerability Manager employer: Amtis Professional Ltd
Contact Detail:
Amtis Professional Ltd Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Vulnerability Manager
β¨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes itβs not just what you know, but who you know that can help you land that Vulnerability Manager role.
β¨Tip Number 2
Prepare for those interviews by brushing up on your vulnerability management knowledge. We suggest creating a list of common interview questions and practicing your answers. Show them youβre the expert they need!
β¨Tip Number 3
Donβt forget to showcase your hands-on experience with tools like Microsoft Defender or Edgescan during interviews. We want to hear about your real-world examples and how youβve tackled vulnerabilities in past roles.
β¨Tip Number 4
Apply through our website! Itβs the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive and take the initiative to connect directly with us.
We think you need these skills to ace Vulnerability Manager
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Manager role. Highlight your experience with vulnerability management tools and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about vulnerability management and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Achievements: When detailing your experience, focus on specific achievements rather than just duties. Did you improve a process or reduce vulnerabilities? We love numbers and results, so share those successes with us!
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way to ensure your application gets into the right hands. Plus, it shows us you're keen on joining our team at StudySmarter!
How to prepare for a job interview at Amtis Professional Ltd
β¨Know Your Vulnerability Management Tools
Familiarise yourself with the specific vulnerability management tools mentioned in the job description, like Microsoft Defender and Edgescan. Be ready to discuss your hands-on experience with these platforms and how you've used them to manage vulnerabilities effectively.
β¨Understand the Business Impact
Prepare to articulate how vulnerabilities can affect business operations. Think about real-world examples where you assessed risk based on exploitability and asset criticality, and be ready to explain your decision-making process in prioritising remediation efforts.
β¨Showcase Your Stakeholder Management Skills
Since this role involves working closely with technical teams and third-party partners, come prepared with examples of how you've successfully managed stakeholder relationships. Highlight instances where you influenced decisions or escalated high-risk issues effectively.
β¨Stay Current with Threat Intelligence
Demonstrate your knowledge of emerging vulnerabilities and zero-day threats. Discuss how you integrate threat intelligence into your vulnerability management processes and any improvements you've driven in tools or reporting to enhance programme maturity.