At a Glance
- Tasks: Lead vulnerability management initiatives and enhance security across our global infrastructure.
- Company: Join Colt, a dynamic tech company empowering innovation and collaboration.
- Benefits: Flexible working hours, remote options, and extensive development opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience in vulnerability management and strong understanding of security concepts required.
- Other info: Diverse and inclusive culture with a focus on personal growth and well-being.
The predicted salary is between 36000 - 60000 £ per year.
Colt provides network, voice and data centre services to thousands of businesses around the world, allowing them to focus on delivering their business goals instead of the underlying infrastructure.
Why we need this role
We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program.
What you will do
- The development and implementation of the Colt Vulnerability Management Framework.
- Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them.
- Design and manage the periodic penetration testing exercise.
- Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity definition.
- Perform Vulnerability scans using Vulnerability Management tool.
- Responsible for working with leading team to assist with understanding threat data and vulnerabilities found on client's network.
- Prepare and send error free Vulnerability Management reports to respective stakeholders.
- Send scan notification and completion emails as per defined timelines.
- Configuration of vulnerability scans and reporting.
- Troubleshooting in case of scan failures or tool-based issues.
- Identify false positive and connect with vendor and support teams to resolve it.
- Drive remediation connects with multiple stakeholders/resolver groups.
- Understand the Vulnerability in depth and prioritise it.
- Identify vulnerabilities, misconfigurations and weaknesses of systems, applications and data contained within the Colt network and suggest remediation/mitigation plan.
- Monitoring, reporting and where required, supporting, the implementation of remediation plans to ensure vulnerability mitigation efforts are proceeding as required.
- Ensure remediation activities are in alignment with the business objectives and risk management framework.
- Keep track of new vulnerabilities on various network and security devices for different vendors.
- Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices.
What we're looking for
- Self-driven individual with vulnerability management function experience.
- Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc.
- Strong understanding on Windows systems, Linux systems.
- Strong understanding on Networking.
- Should have completed certifications like CEH, ECSA or other equivalent security certifications.
- Degree in Information Technology, Engineering or similar.
- In-depth knowledge of and experience in security concepts such as cyberattacks and techniques, risk management, incident management, threat management, etc.
- Depth insight on all latest vulnerabilities and highlight the risk to client environment.
- Proficient in preparation of reports, dashboards and documentations.
- Knowledge/Experience of security technologies such as Cisco/Juniper Firewalls, Application Firewalls, IPS, SIEM, Proxy, NAC, etc.
Skills
- Network Protocols
- Cyber Security Tools/Products
- Cyber Security Policy Management
- Cyber Security Planning
- Cyber Security Risk Management
What we offer you:
Looking to make a mark? At Colt, you'll make a difference. Because around here, we empower people. We don't tell you what to do. Instead, we employ people we trust, who come together across the globe to create intelligent solutions. Our global teams are full of ambitious, driven people, all working together towards one shared purpose: to put the power of the digital universe in the hands of our customers wherever, whenever and however they want. We give our people the opportunity to inspire and lead teams, and work on projects that connect people, cities, businesses, and ideas. We want you to help us change the world, for the better.
Diversity and inclusion
Inclusion and valuing diversity of thought and experience are at the heart of our culture here at Colt. From day one, you'll be encouraged to be yourself because we believe that's what helps our people to thrive. We welcome people with diverse backgrounds and experiences, regardless of their gender identity or expression, sexual orientation, race, religion, disability, neurodiversity, age, marital status, pregnancy status, or place of birth.
Most recently we have:
- Signed the UN Women Empowerment Principles which guide our Gender Action Plan.
- Trained 60 (and growing) Colties to be Mental Health First Aiders.
Please speak with a member of our recruitment team if you require adjustments to our recruitment process to support you. For more information about our Inclusion and Diversity agenda, visit our DEI pages.
Our benefits support you through all parts of life, for both physical and mental health.
- Flexible working hours and the option to work from home.
- Extensive induction program with experienced mentors and buddies.
- Opportunities for further development and educational opportunities.
- Global Family Leave Policy.
- Employee Assistance Program.
- Internal inclusion & diversity employee networks.
A global network
When you join Colt you become part of our global network. We are proud of our colleagues and the stories and experience they bring – take a look at 'Our People' site including our Empowered Women in Tech.
Tech lead - vulnerability management in London employer: Colt Technology Services Group Ltd.
Contact Detail:
Colt Technology Services Group Ltd. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Tech lead - vulnerability management in London
✨Tip Number 1
Network like a pro! Attend industry meetups, webinars, or conferences related to cybersecurity and vulnerability management. It's a great way to meet potential employers and learn about job openings that might not be advertised.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your experience with vulnerability management tools like Rapid7 or Qualys. This can really set you apart during interviews and give hiring managers a taste of what you can bring to the table.
✨Tip Number 3
Prepare for those tricky interview questions! Brush up on your knowledge of recent vulnerabilities and how they impact security. Being able to discuss these topics confidently will show that you're on top of your game.
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it makes it easier for us to keep track of your application and get back to you quickly.
We think you need these skills to ace Tech lead - vulnerability management in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Vulnerability Management Lead. Highlight your experience with vulnerability management tools like Rapid7, Qualys, or Nessus, and showcase your understanding of cybersecurity concepts. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about vulnerability management and how your background makes you a great fit for our team. Don't forget to mention any relevant certifications like CEH or ECSA that you've completed.
Showcase Your Technical Skills: In your application, be sure to highlight your technical skills, especially your knowledge of Windows and Linux systems, as well as networking. We love candidates who can demonstrate their expertise in these areas, so don't hold back!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us that you're genuinely interested in joining our team at Colt!
How to prepare for a job interview at Colt Technology Services Group Ltd.
✨Know Your Vulnerabilities
Before the interview, brush up on the latest vulnerabilities and security threats relevant to the role. Be prepared to discuss specific examples of how you've identified and managed vulnerabilities in past positions. This shows your proactive approach and expertise in vulnerability management.
✨Familiarise with Tools
Make sure you’re well-versed in the tools mentioned in the job description, like Rapid7, Qualys, and Nessus. If you have experience with these tools, be ready to share specific instances where you used them effectively to enhance vulnerability management processes.
✨Collaboration is Key
Since the role involves working with various stakeholders, think of examples where you successfully collaborated with teams to address vulnerabilities. Highlight your communication skills and how you’ve facilitated discussions to prioritise and remediate security issues.
✨Prepare for Scenario Questions
Expect scenario-based questions that test your problem-solving skills in real-world situations. Practice articulating your thought process when faced with a vulnerability assessment or a security incident. This will demonstrate your analytical skills and ability to think on your feet.